Rafael Pass

About

Work

Tel Aviv University
|

Professor

Israel

Cornell Tech
|

Professor

US

Cornell Tech
|

Associate Professor

US

Cornell University
|

Associate Professor

US

Cornell University
|

Assistant Professor

US

Education

Massachusetts Institute of Technology
United States of America

Ph.D

Publications

Communication complexity of byzantine agreement, revisited

Published by

Distributed Computing

Summary

journal-article

Characterizing Derandomization Through Hardness of Levin-Kolmogorov Complexity

Published by

Leibniz International Proceedings in Informatics, LIPIcs

Summary

conference-paper

Concurrently Composable Non-interactive Secure Computation

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Incrementally Verifiable Computation via Rate-1 Batch Arguments

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

Locality-Preserving Oblivious RAM

Published by

Journal of Cryptology

Summary

journal-article

ONE-WAY FUNCTIONS AND (IM)PERFECT OBFUSCATION

Published by

SIAM Journal on Computing

Summary

journal-article

On One-Way Functions from NP-Complete Problems

Published by

Leibniz International Proceedings in Informatics, LIPIcs

Summary

conference-paper

On the Complexity of Compressing Obfuscation

Published by

Journal of Cryptology

Summary

journal-article

Parallelizable Delegation from LWE

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Universal Reductions: Reductions Relative to Stateful Oracles

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Preface

Published by

OpenAccess Series in Informatics

Summary

conference-paper

On the Possibility of Basing Cryptography on EXP≠ BPP

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Cryptography from sublinear-time average-case hardness of time-bounded Kolmogorov complexity

Published by

Proceedings of the Annual ACM Symposium on Theory of Computing

Summary

conference-paper

Indistinguishability obfuscation from circular security

Published by

Proceedings of the Annual ACM Symposium on Theory of Computing

Summary

conference-paper

Non-malleable Codes for Bounded Parallel-Time Tampering

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Non-malleable Time-Lock Puzzles and Applications

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Sequential Equilibrium in Games of Imperfect Recall

Published by

ACM Transactions on Economics and Computation

Summary

journal-article

Two-round and non-interactive concurrent non-malleable commitments from time-lock puzzles

Published by

SIAM Journal on Computing

Summary

journal-article

Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions?

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Bucket oblivious sort: An extremely simple oblivious sort

Published by

arXiv

Summary

other

Continuous verifiable delay functions

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Impossibility of strong kdm security with auxiliary input

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Is it easier to prove theorems that are guaranteed to be true?

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

On One-way functions and kolmogorov complexity

Published by

arXiv

Summary

other

On one-way functions and kolmogorov complexity

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

On the Adaptive Security of MACs and PRFs

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Preface

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Preface

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Preface

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Sparks: Succinct parallelizable arguments of knowledge

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Sublinear-Round Byzantine Agreement Under Corrupt Majority

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Succinct Non-interactive Secure Computation

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Unprovability of leakage-resilient cryptography beyond the information-theoretic limit

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Minimizing Trust in Hardware Wallets with Two Factor Signatures

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

A Conceptually Well-Founded Characterization of Iterated Admissibility Using an “All I Know” Operator

Published by

arXiv

Summary

other

A conceptually well-founded characterization of iterated admissibility using an “all I know” operator

Published by

Electronic Proceedings in Theoretical Computer Science, EPTCS

Summary

conference-paper

Blind certificate authorities

Published by

Proceedings - IEEE Symposium on Security and Privacy

Summary

conference-paper

Communication complexity of byzantine agreement, revisited

Published by

Proceedings of the Annual ACM Symposium on Principles of Distributed Computing

Summary

conference-paper

Consensus through herding

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Is it easier to prove theorems that are guaranteed to be true?

Published by

arXiv

Summary

other

Locality-preserving oblivious RAM

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

On the Existence of Nash Equilibrium in Games with Resource-Bounded Players

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Paradoxes in fair computer-aided decision making

Published by

AIES 2019 - Proceedings of the 2019 AAAI/ACM Conference on AI, Ethics, and Society

Summary

conference-paper

Sequential equilibrium in computational games

Published by

ACM Transactions on Economics and Computation

Summary

journal-article

Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Synchronous, with a Chance of Partition Tolerance

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

The truth behind the myth of the Folk theorem

Published by

Games and Economic Behavior

Summary

journal-article

On the security loss of unique signatures

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Thunderella: Blockchains with optimistic instant confirmation

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Game theoretic notions of fairness in multi-party coin toss

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Game theory with translucent players

Published by

International Journal of Game Theory

Summary

journal-article

Achieving fair treatment in algorithmic classification

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Indistinguishability obfuscation for ram programs and succinct randomized encodings

Published by

SIAM Journal on Computing

Summary

journal-article

On the complexity of compressing obfuscation

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Communication complexity of byzantine agreement, revisited

Published by

arXiv

Summary

other

Formal abstractions for attested execution secure processors

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

FruitChains: A fair blockchain

Published by

Proceedings of the Annual ACM Symposium on Principles of Distributed Computing

Summary

conference-paper

Hybrid consensus: Efficient consensus in the permissionless model

Published by

Leibniz International Proceedings in Informatics, LIPIcs

Summary

conference-paper

On the Impossibility of Cryptography with Tamperable Randomness

Published by

Algorithmica

Summary

journal-article

Paradoxes in fair computer-aided decision making

Published by

arXiv

Summary

other

Reasoning about rationality

Published by

Games and Economic Behavior

Summary

journal-article

Rethinking Large-Scale Consensus

Published by

Proceedings - IEEE Computer Security Foundations Symposium

Summary

conference-paper

A knowledge-based analysis of the blockchain protocol

Published by

arXiv

Summary

other

Socially optimal mining pools

Published by

arXiv

Summary

other

The sleepy model of consensus

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Two-round and non-interactive concurrent non-malleable commitments from time-lock puzzles

Published by

Annual Symposium on Foundations of Computer Science - Proceedings

Summary

conference-paper

A knowledge-based analysis of the blockchain protocol

Published by

Electronic Proceedings in Theoretical Computer Science, EPTCS

Summary

conference-paper

Socially optimal mining pools

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Analysis of the blockchain protocol in asynchronous networks

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Can we access a database both locally and privately?

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Lower bounds on assumptions behind indistinguishability obfuscation

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Oblivious parallel RAM and applications

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Sequential equilibrium in games of imperfect recall

Published by

Proceedings of the International Conference on Knowledge Representation and Reasoning

Summary

conference-paper

Unprovable Security of Perfect NIZK and Non-interactive Non-malleable Commitments

Published by

Computational Complexity

Summary

journal-article

Adaptive hardness and composable security in the plain model from standard assumptions

Published by

SIAM Journal on Computing

Summary

journal-article

Bayesian games with intentions

Published by

Electronic Proceedings in Theoretical Computer Science, EPTCS

Summary

conference-paper

Bounded KDM security from iO and OWF

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Output-compressing randomized encodings and applications

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Computational extensive-form games

Published by

EC 2016 - Proceedings of the 2016 ACM Conference on Economics and Computation

Summary

conference-paper

Cryptography and game theory

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Impossibility of VBB obfuscation with ideal constant-degree graded encodings

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Indistinguishability obfuscation with non-trivial efficiency

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Non-black-box simulation from one-way functions and applications to resettable security

Published by

SIAM Journal on Computing

Summary

journal-article

Outlier privacy

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Algorithmic rationality: Game theory with costly computation

Published by

Journal of Economic Theory

Summary

journal-article

An overview of ANONIZE: A large-scale anonymous survey system

Published by

IEEE Security and Privacy

Summary

journal-article

Constant-round concurrent zero-knowledge from indistinguishability obfuscation

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Constant-round nonmalleable commitments from any one-way function

Published by

Journal of the ACM

Summary

journal-article

From weak to Strong Zero-knowledge and applications

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Large-scale secure computation: Multi-party computation for (parallel) RAM programs

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Limits of extractability assumptions with distributional auxiliary input

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Micropayments for Decentralized Currencies

Published by

Proceedings of the ACM Conference on Computer and Communications Security

Summary

conference-paper

Round-efficient concurrently composable secure computation via a robust extraction lemma

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Succinct randomized encodings and their applications

Published by

Proceedings of the Annual ACM Symposium on Theory of Computing

Summary

conference-paper

Tight Revenue Bounds With Possibilistic Beliefs and Level-k Rationality

Published by

Econometrica

Summary

journal-article

Tight parallel repetition theorems for public-coin arguments using kl-divergence

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Decision theory with resource-bounded agents

Published by

Topics in Cognitive Science

Summary

journal-article

Indistinguishability obfuscation from semantically-secure multilinear encodings

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

ANONIZE: A large-scale anonymous survey system

Published by

Proceedings - IEEE Symposium on Security and Privacy

Summary

conference-paper

4-round resettably-sound zero knowledge

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Not just an empty threat: Subgame-perfect equilibrium in repeated games played by computationally bounded players

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

On extractability obfuscation

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

On the impossibility of black-box transformations in mechanism design

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

On the impossibility of cryptography with tamperable randomness

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

One-way functions and (im)perfect obfuscation

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

Statistically-secure ORAM with Õ(log<sup>2</sup> n) overhead

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

The truth behind the myth of the folk theorem

Published by

ITCS 2014 - Proceedings of the 2014 Conference on Innovations in Theoretical Computer Science

Summary

conference-paper

Axiomatizing rationality

Published by

Proceedings of the International Conference on Knowledge Representation and Reasoning

Summary

conference-paper

Concurrent zero knowledge, revisited

Published by

Journal of Cryptology

Summary

journal-article

Sequential equilibrium in computational games

Published by

IJCAI International Joint Conference on Artificial Intelligence

Summary

conference-paper

Simultaneous resettability from one-way functions

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

Unprovable security of perfect NIZK and non-interactive non-malleable commitments

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Language-based games

Published by

IJCAI International Joint Conference on Artificial Intelligence

Summary

conference-paper

Conservative belief and rationality

Published by

Games and Economic Behavior

Summary

journal-article

Can theories be tested? A cryptographic treatment of forecast testing

Published by

ITCS 2013 - Proceedings of the 2013 ACM Conference on Innovations in Theoretical Computer Science

Summary

conference-paper

Constant-round concurrent zero knowledge from P-certificates

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

From unprovability to environmentally friendly protocols

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

Game theory with translucent players

Published by

Proceedings of the 14th Conference on Theoretical Aspects of Rationality and Knowledge, TARK 2013

Summary

conference-paper

Knowledge-preserving interactive coding

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

Language-based games

Published by

Proceedings of the 14th Conference on Theoretical Aspects of Rationality and Knowledge, TARK 2013

Summary

conference-paper

Non-black-box simulation from one-way functions and applications to resettable security

Published by

Proceedings of the Annual ACM Symposium on Theory of Computing

Summary

conference-paper

On the power of many one-bit provers

Published by

ITCS 2013 - Proceedings of the 2013 ACM Conference on Innovations in Theoretical Computer Science

Summary

conference-paper

On the power of nonuniformity in proofs of security

Published by

ITCS 2013 - Proceedings of the 2013 ACM Conference on Innovations in Theoretical Computer Science

Summary

conference-paper

Public-coin parallel zero-knowledge for NP

Published by

Journal of Cryptology

Summary

journal-article

Randomness-dependent message security

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

A parallel repetition theorem for constant-round Arthur-Merlin Proofs

Published by

ACM Transactions on Computation Theory

Summary

journal-article

A unified framework for UC from only OT

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Black-box constructions of composable protocols without set-up

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Crowd-blending privacy

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

I'm doing as well as I can: Modeling people as rational finite automata

Published by

Proceedings of the National Conference on Artificial Intelligence

Summary

conference-paper

Iterated regret minimization: A new solution concept

Published by

Games and Economic Behavior

Summary

journal-article

Multi-verifier signatures

Published by

Journal of Cryptology

Summary

journal-article

The curious case of non-interactive commitments - On the power of black-box vs. non-black-box use of primitives

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

The knowledge tightness of parallel zero-knowledge

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Reasoning about justified belief

Published by

ACM International Conference Proceeding Series

Summary

conference-paper

Approximately strategy-proof voting

Published by

IJCAI International Joint Conference on Artificial Intelligence

Summary

conference-paper

Concurrent non-malleable zero knowledge with adaptive inputs

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Concurrent security and non-malleability

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Constant-round non-malleable commitments from any one-way function

Published by

Proceedings of the Annual ACM Symposium on Theory of Computing

Summary

conference-paper

Limits of provable security from standard assumptions

Published by

Proceedings of the Annual ACM Symposium on Theory of Computing

Summary

conference-paper

On the composition of public-coin zero-knowledge protocols

Published by

SIAM Journal on Computing

Summary

journal-article

Secure computation without authentication

Published by

Journal of Cryptology

Summary

journal-article

The randomness complexity of parallel repetition

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

Towards non-black-box lower bounds in cryptography

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Towards privacy for social networks: A zero-knowledge based definition of privacy

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Adaptive hardness and composable security in the plain model from standard assumptions

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

An efficient parallel repetition theorem

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Concurrent non-malleable zero knowledge proofs

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Constant-round non-malleable commitments from sub-exponential one-way functions

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Eye for an eye: Efficient concurrent zero-knowledge in the timing model

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

I don't want to think about it now: Decision theory with costly computation

Published by

Proceedings of the International Conference on Knowledge Representation and Reasoning

Summary

conference-paper

Private coins versus public coins in zero-knowledge proof systems

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

A logical characterization of iterated admissibility

Published by

Proceedings of the 12th Conference on Theoretical Aspects of Rationality and Knowledge, TARK '09

Summary

conference-paper

A unified framework for concurrent security: Universal composability from stand-alone non-malleability

Published by

Proceedings of the Annual ACM Symposium on Theory of Computing

Summary

conference-paper

An epistemic characterization of zero knowledge

Published by

Proceedings of the 12th Conference on Theoretical Aspects of Rationality and Knowledge, TARK '09

Summary

conference-paper

Black-box constructions of two-party protocols from one-way functions

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Iterated regret minimization: A new solution concept

Published by

IJCAI International Joint Conference on Artificial Intelligence

Summary

conference-paper

Non-malleability amplification

Published by

Proceedings of the Annual ACM Symposium on Theory of Computing

Summary

conference-paper

On the composition of public-coin zero-knowledge protocols

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Adaptive one-way functions and applications

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Concurrent non-malleable commitments from any one-way function

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

New and improved constructions of nonmalleable cryptographic protocols

Published by

SIAM Journal on Computing

Summary

journal-article

On constant-round concurrent zero-knowledge

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Precise concurrent zero knowledge

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

An efficient parallel repetition theorem for Arthur-Merlin games

Published by

Proceedings of the Annual ACM Symposium on Theory of Computing

Summary

conference-paper

Bounded CCA2-secure encryption

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Concurrent nonmalleable commitments

Published by

SIAM Journal on Computing

Summary

journal-article

Cryptography from sunspots: How to use an imperfect reference string

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

Relations among notions of non-malleability for encryption

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Universally composable security with global setup

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Construction of a non-malleable encryption scheme from any semantically secure one

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Input-indistinguishable computation

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

Local zero knowledge

Published by

Proceedings of the Annual ACM Symposium on Theory of Computing

Summary

conference-paper

Parallel repetition of zero-knowledge proofs and the possibility of basing cryptography on NP-hardness

Published by

Proceedings of the Annual IEEE Conference on Computational Complexity

Summary

conference-paper

Secure computation without authentication

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Unconditional characterizations of non-interactive zero-knowledge

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Concurrent non-malleable commitments

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

New and improved constructions of non-malleable cryptographic protocols

Published by

Proceedings of the Annual ACM Symposium on Theory of Computing

Summary

conference-paper

Bounded-concurrent secure multi-party computation with a dishonest majority

Published by

Conference Proceedings of the Annual ACM Symposium on Theory of Computing

Summary

conference-paper

On the possibility of one-message weak zero-knowledge

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Universally composable protocols with relaxed set-up assumptions

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

Simulation in quasi-polynomial time, and its application to protocol composition

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Bounded-concurrent secure two-party computation in a constant number of rounds

Published by

Annual Symposium on Foundations of Computer Science - Proceedings

Summary

conference-paper

Bounded-concurrent secure two-party computation in a constant number of rounds

Published by

Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS

Summary

conference-paper

On deniability in the common reference string and random oracle model

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book