Ran Canetti

From MaRDI portal
Person:176997

Available identifiers

zbMath Open canetti.ranWikidataQ62007126 ScholiaQ62007126MaRDI QIDQ176997

List of research outcomes

PublicationDate of PublicationType
Triply adaptive UC NIZK2023-08-16Paper
Covert learning: how to learn with an untrusted intermediary2023-04-13Paper
Fully deniable interactive encryption2022-11-09Paper
COA-secure obfuscation and applications2022-08-30Paper
Unclonable polymers and their cryptographic applications2022-08-30Paper
Universally Composable Security2022-03-31Paper
Towards multiparty computation withstanding coercion of all parties2022-03-23Paper
Universal composition with global subroutines: capturing global setup within plain UC2022-03-23Paper
Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model2022-02-08Paper
Universally composable accumulators2020-08-05Paper
Fiat-Shamir: from practice to theory2020-01-30Paper
Certifying trapdoor permutations, revisited2018-12-11Paper
Fiat-Shamir and correlation intractability from strong KDM-secure encryption2018-07-09Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings2018-07-04Paper
Task-structured probabilistic I/O automata2018-04-18Paper
Optimal-rate non-committing encryption2018-02-23Paper
The hunting of the SNARK2018-02-15Paper
Towards doubly efficient private information retrieval2018-01-19Paper
On virtual grey box obfuscation for general circuits2018-01-05Paper
Maintaining authenticated communication in the presence of break-ins2017-09-29Paper
Randomness vs. fault-tolerance2017-09-29Paper
Equivocating Yao2017-08-17Paper
Chosen-Ciphertext Secure Fully Homomorphic Encryption2017-06-13Paper
Better Two-Round Adaptive Multi-party Computation2017-06-13Paper
Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE2017-06-13Paper
Adaptive Succinct Garbled RAM or: How to Delegate Your Database2016-12-22Paper
On the Existence of Extractable One-Way Functions2016-10-28Paper
Toward a game theoretic view of secure computation2016-10-13Paper
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again2016-10-07Paper
Secure computation with honest-looking parties (extended abstract)2016-09-29Paper
Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions2016-09-23Paper
Fully Succinct Garbled RAM2016-04-15Paper
Universally Composable Authentication and Key-Exchange with Global PKI2016-04-13Paper
On the Correlation Intractability of Obfuscated Pseudorandom Functions2016-03-23Paper
Selective private function evaluation with applications to private statistics2016-03-04Paper
A Simpler Variant of Universally Composable Security for Standard Multiparty Computation2015-12-10Paper
Concurrent Secure Computation with Optimal Query Complexity2015-12-10Paper
Keying Hash Functions for Message Authentication2015-11-11Paper
Succinct Garbling and Indistinguishability Obfuscation for RAM Programs2015-08-21Paper
On Obfuscation with Random Oracles2015-07-06Paper
Obfuscation of Probabilistic Circuits and Applications2015-07-06Paper
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation2015-07-06Paper
On the existence of extractable one-way functions2015-06-26Paper
Fast asynchronous Byzantine agreement with optimal resilience2015-05-07Paper
Asynchronous secure computation2015-05-07Paper
Black-box concurrent zero-knowledge requires \tilde {Ω} (log n ) rounds2015-02-27Paper
Secure Key Exchange and Sessions without Credentials2014-10-14Paper
Resettable zero-knowledge (extended abstract)2014-09-26Paper
On strong simulation and composable point obfuscation2014-09-25Paper
Recursive composition and bootstrapping for SNARKS and proof-carrying data2014-08-07Paper
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator2014-08-07Paper
On Virtual Grey Box Obfuscation for General Circuits2014-08-07Paper
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity2014-08-07Paper
Verifiable Set Operations over Outsourced Databases2014-03-25Paper
Obfuscation for Evasive Functions2014-02-18Paper
Refereed delegation of computation2013-12-03Paper
Public-Coin Concurrent Zero-Knowledge in the Global Hash Model2013-03-18Paper
Two Protocols for Delegation of Computation2012-11-06Paper
Universally Composable Security with Local Adversaries2012-09-25Paper
Efficient Password Authenticated Key Exchange via Oblivious Transfer2012-07-20Paper
Leakage-Tolerant Interactive Protocols2012-06-15Paper
Secure computation without authentication2012-01-13Paper
Program Obfuscation with Leaky Hardware2011-12-02Paper
Towards a Game Theoretic View of Secure Computation2011-05-27Paper
Universally composable symbolic security analysis2011-04-01Paper
The random oracle methodology, revisited2011-02-01Paper
On Strong Simulation and Composable Point Obfuscation2010-08-24Paper
Universally composable two-party and multi-party secure computation2010-08-05Paper
On Symmetric Encryption and Point Obfuscation2010-02-24Paper
Obfuscation of Hyperplane Membership2010-02-24Paper
Analyzing security protocols using time-bounded task-PIOAs2009-05-29Paper
Theory of Cryptography2009-05-14Paper
Amplifying Collision Resistance: A Complexity-Theoretic Treatment2009-03-10Paper
Non-malleable Obfuscation2009-03-03Paper
Towards a Theory of Extractable Functions2009-03-03Paper
Just fast keying2008-12-21Paper
Modeling Computational Security in Long-Lived Systems2008-11-25Paper
Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols2008-09-09Paper
Extractable Perfectly One-Way Functions2008-08-19Paper
How to Protect Yourself without Perfect Shredding2008-08-19Paper
Obtaining Universally Compoable Security: Towards the Bare Bones of Trust2008-05-15Paper
Universally Composable Password-Based Key Exchange2008-05-06Paper
Obfuscating Point Functions with Multibit Output2008-04-15Paper
Secure Computation Without Authentication2008-03-17Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Chosen‐Ciphertext Security from Identity‐Based Encryption2007-10-22Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Mitigating Dictionary Attacks on Password-Protected Local Storage2007-09-04Paper
Universally Composable Security with Global Setup2007-08-30Paper
A forward-secure public-key encryption scheme2007-08-20Paper
Theory of Cryptography2007-02-12Paper
On the limitations of universally composable two-party computation without set-up assumptions2006-08-14Paper
https://portal.mardi4nfdi.de/entity/Q33749292006-03-01Paper
Theory of Cryptography2005-12-07Paper
Theory of Cryptography2005-12-07Paper
Adaptive versus non-adaptive security of multi-party protocols2004-10-01Paper
https://portal.mardi4nfdi.de/entity/Q47372552004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44348692003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44348802003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44185872003-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44115352003-07-09Paper
https://portal.mardi4nfdi.de/entity/Q44091152003-06-30Paper
Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds2003-01-05Paper
https://portal.mardi4nfdi.de/entity/Q47837172002-12-08Paper
On the statistical properties of Diffie-Hellman distributions2002-11-12Paper
https://portal.mardi4nfdi.de/entity/Q45425392002-09-24Paper
https://portal.mardi4nfdi.de/entity/Q45425302002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q45425602002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q27788542002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27788612002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q42341102002-02-03Paper
https://portal.mardi4nfdi.de/entity/Q42341112002-02-03Paper
Security and composition of multiparty cryptographic protocols2000-11-27Paper
https://portal.mardi4nfdi.de/entity/Q49418502000-07-19Paper
Maintaining authenticated communication in the presence of break-ins2000-05-08Paper
Randomness versus fault-tolerance2000-05-08Paper
https://portal.mardi4nfdi.de/entity/Q49407142000-03-01Paper
Bandwidth Allocation with Preemption1999-10-28Paper
An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract)1999-10-05Paper
https://portal.mardi4nfdi.de/entity/Q42507811999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42285211999-03-01Paper
Bounding the Power of Preemption in Randomized Scheduling1998-09-20Paper
https://portal.mardi4nfdi.de/entity/Q43645701998-03-17Paper
https://portal.mardi4nfdi.de/entity/Q43645441997-11-17Paper
On Certain Exponential Sums and the Distribution of Diffie-Hellman Triples1997-09-15Paper
Lower bounds for sampling algorithms for estimating the average1997-02-28Paper
More on BPP and the polynomial-time hierarchy1997-02-27Paper
Bounds on tradeoffs between randomness and communication complexity1993-10-18Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Ran Canetti