» home » publications

» by year | by topic

    2016

  1. Tightly CCA-Secure Encryption without Pairings
    with Romain Gay, Dennis Hofheinz and Eike Kiltz
    Eurocrypt 2016. Best paper | eprint

  2. The OPTLS Protocol and TLS 1.3
    with Hugo Krawczyk
    IEEE EuroS&P 2016 | eprint

  3. Déjà Q: Encore! Un Petit IBE
    TCC 2016A | eprint

  4. Obfuscating Conjunctions under Entropic Ring LWE
    with Zvika Brakerski, Vinod Vaikuntanathan and Daniel Wichs
    ITCS 2016 | pdf

  5. KDM-Security via Homomorphic Smooth Projective Hashing
    PKC 2016 | eprint

    2015

  6. Security Against Related Randomness Attacks via Reconstructive Extractors
    with Kenneth G. Paterson, Jacob C. N. Schuldt and Dale L. Sibborn
    IMA Cryptography and Coding 2015. Best paper | eprint

  7. Predicate Encryption for Circuits from LWE
    with Sergey Gorbunov and Vinod Vaikuntanathan
    Crypto 2015. Invited to JoC special issue | eprint

  8. Structure-Preserving Signatures from Standard Assumptions, Revisited
    with Eike Kiltz and Jiaxin Pan
    Crypto 2015 | eprint

  9. Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption
    with Iordanis Kerenidis and Romain Gay
    Crypto 2015 | eprint

  10. Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting
    with Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval
    Crypto 2015 | eprint

  11. Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
    with Jie Chen and Romain Gay
    Eurocrypt 2015 | eprint

  12. Quasi-Adaptive NIZK for Linear Subspaces Revisited
    with Eike Kiltz
    Eurocrypt 2015 | eprint

  13. Predicate Encryption for Multi-Dimensional Range Queries from Lattices
    with Romain Gay and Pierrick Méaux
    PKC 2015 | eprint

    2014

  14. Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
    with Jie Chen
    SCN 2014 | eprint

  15. Partial Garbling Schemes and Their Applications
    with Yuval Ishai
    ICALP 2014 | eprint

  16. On the Complexity of UC Commitments
    with Juan Garary, Yuval Ishai and Ranjit Kumaresan
    Eurocrypt 2014

  17. Dual System Encryption via Predicate Encodings
    TCC 2014 | eprint

    2013

  18. On the Security of the TLS Protocol: A Systematic Analysis
    with Hugo Krawczyk and Kenneth G. Paterson
    Crypto 2013 | eprint

  19. Fully, (Almost) Tightly Secure IBE and Dual Systems Groups
    with Jie Chen
    Crypto 2013 | eprint I | eprint II | github

  20. Functional Encryption: New Perspectives and Lower Bounds
    with Shweta Agrawal, Sergey Gorbunov and Vinod Vaikuntanathan
    Crypto 2013 | eprint

  21. Attribute-Based Encryption for Circuits
    with Sergey Gorbunov and Vinod Vaikuntanathan
    STOC 2013. Invited to SICOMP special issue | eprint | JACM

  22. Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction
    with Dov Gordon, Tal Malkin and Mike Rosulek
    Eurocrypt 2013 | eprint

  23. Leakage-Resilient Cryptography from Minimal Assumptions
    with Carmit Hazay, Adriana López-Alt and Daniel Wichs
    Eurocrypt 2013 | eprint

  24. Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS
    with Seung-Geol Choi, Jonathan Katz and Hongsheng Zhou
    PKC 2013 | eprint

    2012

  25. Functional Encryption with Bounded Collusions via Multi-Party Computation
    with Sergey Gorbunov and Vinod Vaikuntanathan
    Crypto 2012 | eprint

  26. Lossy Trapdoor Functions from Homomorphic Reproducible Encryption
    with Seung Geol Choi
    Information Processing Letters (IPL) 2012 |  doi

  27. Shorter IBE and Signatures via Asymmetric Pairings
    with Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang
    Pairing 2012 | eprint

  28. Functional Encryption for Threshold Functions (or, Fuzzy IBE) from Lattices
    with Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris
    PKC 2012 | eprint

  29. Efficient Password Authenticated Key Exchange via Oblivious Transfer
    with Ran Canetti, Dana Dachman-Soled, Vinod Vaikuntanathan
    PKC 2012 | doi

  30. Public Key Encryption Against Related Key Attacks
    PKC 2012 | pdf | blog

  31. Dual Projective Hashing and its Applications - Lossy Trapdoor Functions and More
    Eurocrypt 2012 | pdf

    2011

  32. Threshold and Revocation Cryptosystems via Extractable Hash Proofs
    Eurocrypt 2011 | pdf

    2010

  33. Black-Box, Round-Efficient Secure Computation via Non-Malleability Amplification
    FOCS 2010 | pdf | draft of full version

  34. Efficient Chosen-Ciphertext Security via Extractable Hash Proofs
    CRYPTO, 2010 | pdf

  35. Constant-Round Non-Malleable Commitments from Sub-Exponential One-Way Functions
    with Rafael Pass
    Eurocrypt, 2010 | pdf

  36. Encryption Schemes Secure Against Chosen-Ciphertext Selective Opening Attacks
    with Serge Fehr, Dennis Hofheinz and Eike Kiltz
    Eurocrypt, 2010 | pdf

  37. Universal One-Way Hash Functions via Inaccessible Entropy
    with Iftach Haitner, Thomas Holenstein, Omer Reingold and Salil Vadhan
    Eurocrypt, 2010 | eprint

  38. On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations
    with S. Dov Gordon, David Xiao and Arkady Yerukhimovich
    Latincrypt, 2010 | pdf

    2009

  39. Inaccessible Entropy
    with Iftach Haitner, Omer Reingold and Salil Vadhan
    STOC, 2009 | eccc

  40. Black-Box Constructions of Two-Party Protocols from One-Way Functions
    with Rafael Pass
    TCC 2009 | pdf

  41. Simple, Black-Box Constructions of Adaptively Secure Protocols
    with Seung Geol Choi, Dana Dachman-Soled, Tal Malkin
    TCC, 2009 | pdf

  42. Improved Non-Committing Encryption with Applications to Adaptively Secure Protocols
    with Seung Geol Choi, Dana Dachman-Soled, Tal Malkin
    Asiacrypt, 2009 | pdf

  43. Zero Knowledge in the Random Oracle Model, Revisited
    Asiacrypt, 2009 | pdf

    2008

  44. Black-Box Construction of a Non-Malleable Encryption Scheme from Any Semantically Secure One
    with Seung Geol Choi, Dana Dachman-Soled, Tal Malkin
    TCC, 2008 | pdf

  45. Optimal Cryptographic Hardness of Learning Monotone Functions
    with Dana Dachman-Soled, Homin Lee, Tal Malkin, Rocco Servedio, Andrew Wan
    ICALP (Track A), 2008 | pdf

    2004 — 2007

  46. Amplifying Collision Resistance: A Complexity-Theoretic Treatment
    with Ran Canetti, Ron Rivest, Madhu Sudan, Luca Trevisan and Salil Vadhan
    CRYPTO, 2007 | pdf

  47. One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments
    4th TCC, 2007 | pdf

  48. Lower Bounds for Non-Interactive Zero-Knowledge
    4th TCC, 2007 | pdf

  49. Finding Pessiland
    3rd TCC, 2006 | pdf

  50. On Obfuscating Point Functions
    37th STOC, 2005 | pdf

  51. On Hardness Amplification of One-Way Functions
    with Henry Lin and Luca Trevisan
    2nd TCC, 2005| pdf

  52. Pebbling and Proofs of Work
    with Cynthia Dwork and Moni Naor
    CRYPTO, 2005 | pdf

  53. On Round-Efficient Argument Systems
    32nd ICALP (Track C), 2005 | pdf

  54. Towards Privacy in Public Databases
    with Shuchi Chawla, Cynthia Dwork, Frank McSherry, and Adam Smith
    2nd TCC, 2005 | pdf

  55. More on Non-Commutative Polynomial Identity Testing
    with Andrej Bogdanov
    20th CCC, 2005 | pdf

  56. On Pseudoentropy versus Compressibility
    19th CCC, 2004 | pdf

  57. A Stateful Implementation of a Random Function Supporting Parity Queries over Hypercubes
    with Andrej Bogdanov
    RANDOM, 2004 | pdf

  58. Selfish Caching in Distributed Systems: A Game-Theoretic Analysis
    with Byung-Gon Chun, Kamalika Chaudhuri, Marco Barreno, Christos H. Papadimitriou, and John Kubiatowicz
    23rd PODC, 2004 | pdf