Vassilis Zikas

Orcid: 0000-0002-5422-7572

According to our database1, Vassilis Zikas authored at least 88 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Pseudo-Equilibria, or: How to Stop Worrying About Crypto and Just Analyze the Game.
CoRR, June, 2025

Trustworthy Reputation Games and Applications to Proof-of-Reputation Blockchains.
CoRR, May, 2025

General-Purpose <i>f</i>-DP Estimation and Auditing in a Black-Box Setting.
CoRR, February, 2025

Distance-Aware OT with Application to Fuzzy PSI.
IACR Cryptol. ePrint Arch., 2025

A Constant-Rate Compiler for MPC over Noisy Networks.
IACR Cryptol. ePrint Arch., 2025

Is It Even Possible? On the Parallel Composition of Asynchronous MPC Protocols.
IACR Cryptol. ePrint Arch., 2025

Cross-chain Lightning Trades: Getting the Advantages of a Custodial Exchange while Keeping Your Assets.
IACR Cryptol. ePrint Arch., 2025

K-Linkable Ring Signatures and Applications in Generalized Voting.
IACR Cryptol. ePrint Arch., 2025

A Unified Treatment of Anamorphic Encryption.
IACR Cryptol. ePrint Arch., 2025

Universal Adaptor Signatures from Blackbox Multi-party Computation.
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025

Two-Tier Black-Box Blockchains and Application to Instant Layer-1 Payments.
Proceedings of the 7th Conference on Advances in Financial Technologies, 2025

Blockchain Governance via Sharp Anonymous Multisignatures.
Proceedings of the 7th Conference on Advances in Financial Technologies, 2025

2024
A Composability Treatment of Bitcoin's Transaction Ledger with Variable Difficulty.
IACR Cryptol. ePrint Arch., 2024

Brief Announcement: Towards Optimal Communication Byzantine Reliable Broadcast Under a Message Adversary.
Proceedings of the 38th International Symposium on Distributed Computing, 2024

Information-Theoretic Multi-server Private Information Retrieval with Client Preprocessing.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

General Adversary Structures in Byzantine Agreement and Multi-party Computation with Active and Omission Corruption.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Eureka: A General Framework for Black-box Differential Privacy Estimators.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Near-Optimal Communication Byzantine Reliable Broadcast Under a Message Adversary.
Proceedings of the 28th International Conference on Principles of Distributed Systems, 2024

Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Adaptor Signatures: New Security Definition and a Generic Construction for NP Relations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Compilation and Backend-Independent Vectorization for Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2023

Fine-Tuning Ideal Worlds for the Xor of Two Permutation Outputs.
IACR Cryptol. ePrint Arch., 2023

Towards Optimal Communication Byzantine Reliable Broadcast under a Message Adversary.
CoRR, 2023

Privacy-Utility Tradeoff of OLS with Random Projections.
CoRR, 2023

Synchrony/Asynchrony vs. Stationary/Mobile? The Latter is Superior...in Theory.
CoRR, 2023

Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Completeness Theorems for Adaptively Secure Broadcast.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

COMBINE: COMpilation and Backend-INdependent vEctorization for Multi-Party Computation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Round-Optimal and Communication-Efficient Multiparty Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Collusion-Preserving Computation without a Mediator.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

Universally Composable Almost-Everywhere Secure Computation.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
Adaptively Secure Broadcast in Resource-Restricted Cryptography.
IACR Cryptol. ePrint Arch., 2021

On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Dynamic Ad Hoc Clock Synchronization.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

A Rational Protocol Treatment of 51% Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback.
IACR Cryptol. ePrint Arch., 2020

How Private Are Commonly-Used Voting Rules?
Proceedings of the Thirty-Sixth Conference on Uncertainty in Artificial Intelligence, 2020

Universal Composition with Global Subroutines: Capturing Global Setup Within Plain UC.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Proof-of-Reputation Blockchain with Nakamoto Fallback.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Broadcast-Optimal Two-Round MPC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Timed Signatures and Zero-Knowledge Proofs - Timestamping in the Blockchain Era -.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Resource-Restricted Cryptography: Honest-Majority MPC from a CRS (and No Broadcast).
IACR Cryptol. ePrint Arch., 2019

Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake.
IACR Cryptol. ePrint Arch., 2019

Cryptography with Disposable Backdoors.
Cryptogr., 2019

PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography.
CoRR, 2019

Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

PD-ML-Lite: Private Distributed Machine Learning from Lightweight Cryptography.
Proceedings of the Information Security - 22nd International Conference, 2019

Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Cryptography with Dispensable Backdoors.
IACR Cryptol. ePrint Arch., 2018

How Private Is Your Voting? A Framework for Comparing the Privacy of Voting Mechanisms.
CoRR, 2018

Secure Two-Party Computation over Unreliable Channels.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Cryptographically Secure Detection of Injection Attacks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols.
Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, 2017

The Price of Low Communication in Secure Multi-party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Bitcoin as a Transaction Ledger: A Composable Treatment.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Constant-Round Asynchronous Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2016

Provably Secure Virus Detection: Using The Observer Effect Against Malware.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

Fair and Robust Multi-party Computation Using a Global Transaction Ledger.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Network-Hiding Communication and Applications to Multi-party Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Probabilistic Termination and Composability of Cryptographic Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware.
IACR Cryptol. ePrint Arch., 2015

Fair Distributed Computation of Reactive Functions.
Proceedings of the Distributed Computing - 29th International Symposium, 2015

How Fair is Your Protocol?: A Utility-based Approach to Protocol Optimality.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015

The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality.
IACR Cryptol. ePrint Arch., 2014

Distributing the setup in universally composable multi-party computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

Secure Multi-Party Computation with Identifiable Abort.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Efficient Three-Party Computation from Cut-and-Choose.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Information-Theoretic Secure Multiparty Computation.
Proceedings of the Secure Multi-Party Computation, 2013

Universally Composable Synchronous Computation.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Feasibility and Completeness of Cryptographic Tasks in the Quantum World.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Rational Protocol Design: Cryptography against Incentive-Driven Adversaries.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

2012
Byzantine Agreement with a Rational Adversary.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012

Collusion-Preserving Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Player-Centric Byzantine Agreement.
Proceedings of the Automata, Languages and Programming - 38th International Colloquium, 2011

2010
Generalized corruption models in secure multi-party computation.
PhD thesis, 2010

Adaptively Secure Broadcast.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

2009
Realistic Failures in Secure Multi-party Computation.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

2008
MPC vs. SFE: Perfect Security in a Unified Corruption Model.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

MPC vs. SFE : Unconditional and Computational Security.
Proceedings of the Advances in Cryptology, 2008


  Loading...