Zvika Brakerski

Orcid: 0000-0002-4867-7999

According to our database1, Zvika Brakerski authored at least 110 papers between 2002 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
On the Importance of Error Mitigation for Quantum Computation.
CoRR, March, 2025

State-Based Classical Shadows.
IACR Cryptol. ePrint Arch., 2025

Threshold FHE with Efficient Asynchronous Decryption.
IACR Cryptol. ePrint Arch., 2025

REFHE: Fully Homomorphic ALU.
IACR Cryptol. ePrint Arch., 2025

2024
Limits on Adaptive Security for Attribute-Based Encryption.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Real-Valued Somewhat-Pseudorandom Unitaries.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Quantum State Obfuscation from Classical Oracles.
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024

On Algebraic Embedding for Unstructured Lattices.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

2023
Pseudorandomness with Proof of Destruction and Applications.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Lattice Problems beyond Polynomial Time.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

On the Computational Hardness Needed for Quantum Cryptography.
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

Simple Tests of Quantumness Also Certify Qubits.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

SNARGs for Monotone Policy Batch NP.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Black-Hole Radiation Decoding Is Quantum Cryptography.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Quantum garbled circuits.
Proceedings of the STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20, 2022

Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Factoring and Pairings Are Not Necessary for IO: Circular-Secure LWE Suffices.
Proceedings of the 49th International Colloquium on Automata, Languages, and Programming, 2022

Batch-OT with Optimal Rate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Constructive Post-Quantum Reductions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Unitary Subgroup Testing.
CoRR, 2021

Classical Binding for Quantum Commitments.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Impossibility of Quantum Virtual Black-Box Obfuscation of Classical Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

On the Hardness of Average-Case k-SUM.
Proceedings of the Approximation, 2021

2020
Simpler Proofs of Quantumness.
Proceedings of the 15th Conference on the Theory of Quantum Computation, 2020

FHE-Based Bootstrapping of Designated-Prover NIZK.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Lossiness and Entropic Hardness for Ring-LWE.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Separating Two-Round Secure Computation From Oblivious Transfer.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

Deterministic and Efficient Interactive Coding from Hard-to-Decode Tree Codes.
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

Candidate iO from Homomorphic Encryption Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Hardness of LWE on General Entropic Distributions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Scalable Pseudorandom Quantum States.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
(Pseudo) Random Quantum States with Binary Phase.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Degree 2 is Complete for the Round-Complexity of Malicious MPC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

On Quantum Advantage in Information Theoretic Single-Server PIR.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Order-LWE and the Hardness of Ring-LWE with Entropic Secrets.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

Fundamentals of fully homomorphic encryption.
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019

2018
Order-LWE and the Hardness of Ring-LWE with Entropic Secrets.
IACR Cryptol. ePrint Arch., 2018

Monotone Batch NP-Delegation with Applications to Access Control.
IACR Cryptol. ePrint Arch., 2018

Two-Message Statistical Sender-Private OT from LWE.
IACR Cryptol. ePrint Arch., 2018

Fundamentals of Fully Homomorphic Encryption - A Survey.
Electron. Colloquium Comput. Complex., 2018

Certifiable Randomness from a Single Quantum Device.
CoRR, 2018

Two-Message Statistically Sender-Private OT from LWE.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Perfect Secure Computation in Two Rounds.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Non-trivial Witness Encryption and Null-iO from Standard Assumptions.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Zero-Knowledge Protocols for Search Problems.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Learning with Errors and Extrapolated Dihedral Cosets.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Brief Announcement: Zero-Knowledge Protocols for Search Problems.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018

A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device.
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018

Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation).
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Quantum FHE (Almost) As Secure As Classical.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Private Constrained PRFs (and More) from LWE.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Four Round Secure Computation Without Setup.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Non-interactive delegation and batch NP verification from standard computational assumptions.
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017

FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Hierarchical Functional Encryption.
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

Succinct Spooky Free Compilers Are Not Black Box Sound.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Non-Interactive RAM and Batch NP Delegation from any PIR.
Electron. Colloquium Comput. Complex., 2016

Targeted Homomorphic Attribute-Based Encryption.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

3-Message Zero Knowledge Against Human Ignorance.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Shorter Circuit Obfuscation in Challenging Security Models.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Obfuscating Conjunctions under Entropic Ring LWE.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

On Statistically Secure Obfuscation with Approximate Correctness.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Hierarchical Functional Encryption.
IACR Cryptol. ePrint Arch., 2015

From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of the Quadratic Zero-Testing of GGH.
IACR Cryptol. ePrint Arch., 2015

Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions - Or: How to Secretly Embed a Circuit in Your PRF.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Function-Private Functional Encryption in the Private-Key Setting.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Obfuscating Circuits via Composite-Order Graded Encoding.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

From Selective to Adaptive Security in Functional Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$.
SIAM J. Comput., 2014

Fast Interactive Coding against Adversarial Noise.
J. ACM, 2014

The Trojan Method in Functional Encryption: From Selective to Adaptive Security, Generically.
IACR Cryptol. ePrint Arch., 2014

Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Lattice-based FHE as secure as PKE.
Proceedings of the Innovations in Theoretical Computer Science, 2014

Black-box obfuscation for d-CNFs.
Proceedings of the Innovations in Theoretical Computer Science, 2014

2013
When Homomorphism Becomes a Liability.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Classical hardness of learning with errors.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Fast Algorithms for Interactive Coding.
Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, 2013

Packed Ciphertexts in LWE-Based Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Obfuscating Conjunctions.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
A Parallel Repetition Theorem for Leakage Resilience.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

(Leveled) fully homomorphic encryption without bootstrapping.
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012

Efficient Interactive Coding against Adversarial Noise.
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012

Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Fully Homomorphic Encryption without Bootstrapping.
Electron. Colloquium Comput. Complex., 2011

Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Black-Box Circular-Secure Encryption beyond Affine Functions.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Efficient Fully Homomorphic Encryption from (Standard) LWE.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

From Absolute Distinguishability to Positive Distinguishability.
Proceedings of the Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation, 2011

2010
A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model.
IACR Cryptol. ePrint Arch., 2010

Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back).
Proceedings of the Advances in Cryptology, 2010

2009
From absolute distinguishability to positive distinguishability.
Electron. Colloquium Comput. Complex., 2009

Weak Verifiable Random Functions.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Distributed discovery of large near-cliques.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Hedged Public-Key Encryption: How to Protect against Bad Randomness.
Proceedings of the Advances in Cryptology, 2009

2004
Jitter-Approximation Tradeoff for Periodic Scheduling.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

2003
Dispatching in perfectly-periodic schedules.
J. Algorithms, 2003

2002
General perfectly periodic scheduling.
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002


  Loading...