» home » publications

» by year | by topic

    2014

  1. Partial Garbling Schemes and Their Applications
    with Yuval Ishai
    ICALP 2014

  2. On the Complexity of UC Commitments
    with Juan Garary, Yuval Ishai and Ranjit Kumaresan
    Eurocrypt 2014

  3. Dual System Encryption via Predicate Encodings
    TCC 2014 | pdf

    2013

  4. On the Security of the TLS Protocol: A Systematic Analysis
    with Hugo Krawczyk and Kenneth G. Paterson
    Crypto 2013 | eprint

  5. Fully, (Almost) Tightly Secure IBE and Dual Systems Groups
    with Jie Chen
    Crypto 2013 | eprint | github

  6. Functional Encryption: New Perspectives and Lower Bounds
    with Shweta Agrawal, Sergey Gorbunov and Vinod Vaikuntanathan
    Crypto 2013 | eprint

  7. Attribute-Based Encryption for Circuits
    with Sergey Gorbunov and Vinod Vaikuntanathan
    STOC 2013. Invited to SICOMP special issue | eprint

  8. Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
    with Dov Gordon, Tal Malkin and Mike Rosulek
    Eurocrypt 2013 | eprint

  9. Leakage-Resilient Cryptography from Minimal Assumptions
    with Carmit Hazay, Adriana López-Alt and Daniel Wichs
    Eurocrypt 2013 | eprint

  10. Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
    with Seung-Geol Choi, Jonathan Katz and Hongsheng Zhou
    PKC 2013 | eprint

    2012

  11. Functional Encryption with Bounded Collusions via Multi-Party Computation
    with Sergey Gorbunov and Vinod Vaikuntanathan
    Crypto 2012 | eprint

  12. Lossy Trapdoor Functions from Homomorphic Reproducible Encryption
    with Seung Geol Choi
    Information Processing Letters (IPL) 2012 |  doi

  13. Shorter IBE and Signatures via Asymmetric Pairings
    with Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
    Pairing 2012 | eprint

  14. Functional Encryption for Threshold Functions (or, Fuzzy IBE) from Lattices
    with Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris
    PKC 2012 | eprint

  15. Efficient Password Authenticated Key Exchange via Oblivious Transfer
    with Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan
    PKC 2012 | doi

  16. Public Key Encryption Against Related Key Attacks
    PKC 2012 | pdf | blog

  17. Dual Projective Hashing and its Applications - Lossy Trapdoor Functions and More
    Eurocrypt 2012 | pdf

    2011

  18. Threshold and Revocation Cryptosystems via Extractable Hash Proofs
    Eurocrypt 2011 | pdf

    2010

  19. Black-Box, Round-Efficient Secure Computation via Non-Malleability Amplification
    FOCS 2010 | pdf

  20. Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
    CRYPTO, 2010 | pdf

  21. Constant-Round Non-Malleable Commitments from Sub-Exponential One-Way Functions
    with Rafael Pass
    Eurocrypt, 2010 | pdf

  22. Encryption Schemes Secure Against Chosen-Ciphertext Selective Opening Attacks
    with Serge Fehr, Dennis Hofheinz and Eike Kiltz
    Eurocrypt, 2010 | pdf

  23. Universal One-Way Hash Functions via Inaccessible Entropy
    with Iftach Haitner, Thomas Holenstein, Omer Reingold and Salil Vadhan
    Eurocrypt, 2010 | eprint

  24. On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations
    with S. Dov Gordon, David Xiao and Arkady Yerukhimovich
    Latincrypt, 2010 | pdf

    2009

  25. Inaccessible Entropy
    with Iftach Haitner, Omer Reingold and Salil Vadhan
    STOC, 2009 | eccc

  26. Black-Box Constructions of Two-Party Protocols from One-Way Functions
    with Rafael Pass
    TCC 2009 | pdf

  27. Simple, Black-Box Constructions of Adaptively Secure Protocols
    with Seung Geol Choi, Dana Dachman-Soled, Tal Malkin
    TCC, 2009 | pdf

  28. Improved Non-Committing Encryption with Applications to Adaptively Secure Protocols
    with Seung Geol Choi, Dana Dachman-Soled, Tal Malkin
    Asiacrypt, 2009 | pdf

  29. Zero Knowledge in the Random Oracle Model, Revisited
    Asiacrypt, 2009 | pdf

    2008

  30. Black-Box Construction of a Non-Malleable Encryption Scheme from Any Semantically Secure One
    with Seung Geol Choi, Dana Dachman-Soled, Tal Malkin
    TCC, 2008 | pdf

  31. Optimal Cryptographic Hardness of Learning Monotone Functions
    with Dana Dachman-Soled, Homin Lee, Tal Malkin, Rocco Servedio, Andrew Wan
    ICALP (Track A), 2008 | pdf

    2004 — 2007

  32. Amplifying Collision Resistance: A Complexity-Theoretic Treatment
    with Ran Canetti, Ron Rivest, Madhu Sudan, Luca Trevisan and Salil Vadhan
    CRYPTO, 2007 | pdf

  33. One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
    4th TCC, 2007 | pdf

  34. Lower Bounds for Non-Interactive Zero-Knowledge
    4th TCC, 2007 | pdf

  35. Finding Pessiland
    3rd TCC, 2006 | pdf

  36. On Obfuscating Point Functions
    37th STOC, 2005 | pdf

  37. On Hardness Amplification of One-Way Functions
    with Henry Lin and Luca Trevisan
    2nd TCC, 2005| pdf

  38. Pebbling and Proofs of Work
    with Cynthia Dwork and Moni Naor
    CRYPTO, 2005 | pdf

  39. On Round-Efficient Argument Systems
    32nd ICALP (Track C), 2005 | pdf

  40. Towards Privacy in Public Databases
    with Shuchi Chawla, Cynthia Dwork, Frank McSherry, and Adam Smith
    2nd TCC, 2005 | pdf

  41. More on Non-Commutative Polynomial Identity Testing
    with Andrej Bogdanov
    20th CCC, 2005 | pdf

  42. On Pseudoentropy versus Compressibility
    19th CCC, 2004 | pdf

  43. A Stateful Implementation of a Random Function Supporting Parity Queries over Hypercubes
    with Andrej Bogdanov
    RANDOM, 2004 | pdf

  44. Selfish Caching in Distributed Systems: A Game-Theoretic Analysis
    with Byung-Gon Chun, Kamalika Chaudhuri, Marco Barreno, Christos H. Papadimitriou, and John Kubiatowicz
    23rd PODC, 2004 | pdf