» by year | by topic
-
2014
- Partial Garbling Schemes and Their Applications
with Yuval Ishai
ICALP 2014 - On the Complexity of UC Commitments
with Juan Garary, Yuval Ishai and Ranjit Kumaresan
Eurocrypt 2014 - Dual System Encryption via Predicate Encodings
TCC 2014 | pdf2013
- On the Security of the TLS Protocol: A Systematic Analysis
with Hugo Krawczyk and Kenneth G. Paterson
Crypto 2013 | eprint - Fully, (Almost) Tightly Secure IBE and Dual Systems Groups
with Jie Chen
Crypto 2013 | eprint | github - Functional Encryption: New Perspectives and Lower Bounds
with Shweta Agrawal, Sergey Gorbunov and Vinod Vaikuntanathan
Crypto 2013 | eprint - Attribute-Based Encryption for Circuits
with Sergey Gorbunov and Vinod Vaikuntanathan
STOC 2013. Invited to SICOMP special issue | eprint - Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
with Dov Gordon, Tal Malkin and Mike Rosulek
Eurocrypt 2013 | eprint - Leakage-Resilient Cryptography from Minimal Assumptions
with Carmit Hazay, Adriana López-Alt and Daniel Wichs
Eurocrypt 2013 | eprint - Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
with Seung-Geol Choi, Jonathan Katz and Hongsheng Zhou
PKC 2013 | eprint2012
- Functional Encryption with Bounded Collusions via Multi-Party Computation
with Sergey Gorbunov and Vinod Vaikuntanathan
Crypto 2012 | eprint - Lossy Trapdoor Functions from Homomorphic Reproducible Encryption
with Seung Geol Choi
Information Processing Letters (IPL) 2012 | doi - Shorter IBE and Signatures via Asymmetric Pairings
with Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
Pairing 2012 | eprint - Functional Encryption for Threshold Functions (or, Fuzzy IBE) from Lattices
with Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris
PKC 2012 | eprint - Efficient Password Authenticated Key Exchange via Oblivious Transfer
with Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan
PKC 2012 | doi - Public Key Encryption Against Related Key Attacks
PKC 2012 | pdf | blog - Dual Projective Hashing and its Applications - Lossy Trapdoor Functions and More
Eurocrypt 2012 | pdf2011
- Threshold and Revocation Cryptosystems via Extractable Hash Proofs
Eurocrypt 2011 | pdf2010
- Black-Box, Round-Efficient Secure Computation via Non-Malleability Amplification
FOCS 2010 | pdf - Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
CRYPTO, 2010 | pdf - Constant-Round Non-Malleable Commitments from Sub-Exponential One-Way Functions
with Rafael Pass
Eurocrypt, 2010 | pdf - Encryption Schemes Secure Against Chosen-Ciphertext Selective Opening Attacks
with Serge Fehr, Dennis Hofheinz and Eike Kiltz
Eurocrypt, 2010 | pdf - Universal One-Way Hash Functions via Inaccessible Entropy
with Iftach Haitner, Thomas Holenstein, Omer Reingold and Salil Vadhan
Eurocrypt, 2010 | eprint - On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations
with S. Dov Gordon, David Xiao and Arkady Yerukhimovich
Latincrypt, 2010 | pdf2009
- Inaccessible Entropy
with Iftach Haitner, Omer Reingold and Salil Vadhan
STOC, 2009 | eccc - Black-Box Constructions of Two-Party Protocols from One-Way Functions
with Rafael Pass
TCC 2009 | pdf - Simple, Black-Box Constructions of Adaptively Secure Protocols
with Seung Geol Choi, Dana Dachman-Soled, Tal Malkin
TCC, 2009 | pdf - Improved Non-Committing Encryption with Applications to Adaptively Secure Protocols
with Seung Geol Choi, Dana Dachman-Soled, Tal Malkin
Asiacrypt, 2009 | pdf - Zero Knowledge in the Random Oracle Model, Revisited
Asiacrypt, 2009 | pdf2008
- Black-Box Construction of a Non-Malleable Encryption Scheme from Any Semantically Secure One
with Seung Geol Choi, Dana Dachman-Soled, Tal Malkin
TCC, 2008 | pdf - Optimal Cryptographic Hardness of Learning Monotone Functions
with Dana Dachman-Soled, Homin Lee, Tal Malkin, Rocco Servedio, Andrew Wan
ICALP (Track A), 2008 | pdf2004 — 2007
- Amplifying Collision Resistance: A Complexity-Theoretic Treatment
with Ran Canetti, Ron Rivest, Madhu Sudan, Luca Trevisan and Salil Vadhan
CRYPTO, 2007 | pdf - One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
4th TCC, 2007 | pdf - Lower Bounds for Non-Interactive Zero-Knowledge
4th TCC, 2007 | pdf - Finding Pessiland
3rd TCC, 2006 | pdf - On Obfuscating Point Functions
37th STOC, 2005 | pdf - On Hardness Amplification of One-Way Functions
with Henry Lin and Luca Trevisan
2nd TCC, 2005| pdf - Pebbling and Proofs of Work
with Cynthia Dwork and Moni Naor
CRYPTO, 2005 | pdf - On Round-Efficient Argument Systems
32nd ICALP (Track C), 2005 | pdf - Towards Privacy in Public Databases
with Shuchi Chawla, Cynthia Dwork, Frank McSherry, and Adam Smith
2nd TCC, 2005 | pdf - More on Non-Commutative Polynomial Identity Testing
with Andrej Bogdanov
20th CCC, 2005 | pdf - On Pseudoentropy versus Compressibility
19th CCC, 2004 | pdf - A Stateful Implementation of a Random Function Supporting Parity Queries over Hypercubes
with Andrej Bogdanov
RANDOM, 2004 | pdf - Selfish Caching in Distributed Systems: A Game-Theoretic Analysis
with Byung-Gon Chun, Kamalika Chaudhuri, Marco Barreno, Christos H. Papadimitriou, and John Kubiatowicz
23rd PODC, 2004 | pdf