Publications

For more details about my research, and more informal descriptions of my papers, click here

For copies of papers not available here, please send me email

Books

  1. "CSCML 2022: 6th International Symposium on Cybersecurity, Cryptography, and Machine Learning" (edited volume), with Shlomi Dolev and Amnon Meisels
    LNCS, Springer, 2022

  2. "Cloud Computing Security: Foundations and Research Directions," with A. Chakraborti, R. Curtmola, J. Nieh, A.-R. Sadeghi, R. Sion, and Y. Zhang
    Foundations and Trends in Privacy and Security 3(2):102-213, 2022.

  3. "Introduction to Modern Cryptography (third edition)," with Y. Lindell
    CRC Press, 2020

  4. "CCS'20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security" (edited volume), with Giovanni Vigna
    ACM Press, 2020

  5. "CCS'19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security" (edited volume), with XiaoFeng Wang
    ACM Press, 2019

  6. "Advances in Cryptology -- Crypto 2017" (edited volume), with Hovav Shacham
    LNCS vols. 10401, 10402, and 10403, Springer, 2017

  7. "Advances in Cryptology -- Crypto 2016" (edited volume), with Matt Robshaw
    LNCS vols. 9814, 9815, and 9816, Springer, 2016

  8. "Public-Key Cryptography (PKC) 2015" (edited volume)
    LNCS vol. 9020, Springer, 2015

  9. "Introduction to Modern Cryptography (second edition)," with Y. Lindell
    CRC Press, 2014

  10. "Decision and Game Theory for Security (GameSec) 2011" (edited volume), with J. Baras and E. Altman
    LNCS vol. 7037, Springer, 2011

  11. "Digital Signatures"
    Springer, 2010

  12. "Solutions Manual for 'Introduction to Modern Cryptography'," with Y. Lindell
    CRC Press, 2009

  13. "Introduction to Modern Cryptography," with Y. Lindell
    CRC Press, 2007

  14. "Applied Cryptography and Network Security (ACNS) 2007" (edited volume), with M. Yung
    LNCS vol. 4521, Springer, 2007

Book chapters

  1. "Privacy-Preserving Distributed Computation"
    In Handbook of Sharing Confidential Data: Differential Privacy, Secure Multiparty Computation, and Synthetic Data, J. Drechsler, D. Kifer, J. Reiter, and A. Slavkovic, eds., Chapman & Hall/CRC Press, 2024.

  2. "Cryptography"
    In Computing Handbook (3rd edition), vol. 1: Computer Science and Software Engineering, A. Tucker, T. Gonzalez, and J. Diaz-Herrera, eds., Chapman & Hall/CRC Press, 2014.

  3. "Public-Key Cryptography"
    In Handbook of Information and Communication Security, P. Stavroulakis and M. Stamp, eds., Springer, 2010.

  4. "Cryptography"
    In Wiley Encyclopedia of Computer Science and Engineering, B.W. Wah, ed., John Wiley & Sons, Inc., 2008.

  5. "Symmetric-Key Encryption"
    In Handbook of Information Security, H. Bidgoli, ed., John Wiley & Sons, Inc., 2005.

  6. "Cryptography"
    In Computer Science Handbook, 2nd edition, A. Tucker, ed., CRC Press, 2004.

Journal articles

Published/Awaiting Publication

  1. "Manticore: Efficient and Scalable Secure Multiparty Computation," with M.G. Belorgey et al.
    J. Cryptology, to appear.

  2. "FORGE: A Fake Online Repository Generation Engine for Cyber Deception," with Tanmoy Chakraborty, Sushil Jajodia, Antonio Picariello, Giancarlo Sperli, and V.S. Subrahmanian
    IEEE Trans. on Dependable and Secure Computing 18(2): 518-533, 2021.

  3. "Feasibility and Infeasibility of Secure Computation with Malicious PUFs," with Dana Dachman-Soled, Nils Fleischhacker, Anna Lysyanskaya, and Dominique Schröder
    J. Cryptology 33(2): 595-617, 2020.

  4. "(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens," with Seung Geol Choi, Dominique Schröder, Arkady Yerukhimovich, and Hong-Sheng Zhou
    Journal of Cryptology 32:459-497, 2019. (One of 3 papers from TCC 2014 invited to the Journal of Cryptology.)

  5. "Verifiable Graph Processing," with Yupeng Zhang and Babis Papamanthou
    ACM Trans. on Privacy and Security 21(4), article 20, 2018.

  6. "Anon-Pass: Practical Anonymous Subscriptions," with Michael Lee, Alan Dunn, Brent Waters, and Emmett Witchel
    IEEE Security & Privacy 12(3): 20-27, 2014. (Part of a special issue for selected papers from the 2013 IEEE Symposium on Security & Privacy.)
    The full version is available. See here for a link to source code.

  7. "Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure," with S. Dov Gordon, Ranjit Kumaresan, and Arkady Yerukhimovich
    Information & Computation 234: 17-25, 2014. (Invited to a special issue for selected papers from SSS 2010.)
    The full version is available.

  8. "One-Round Multi-Party Communication Complexity of Distinguishing Sums," with Daniel Apon and Alex Malozemoff
    Theoretical Computer Science 501: 101-108, 2013.
    The full version is available: ECCC, arXiv

  9. "Round-Optimal Password-Based Authenticated Key Exchange," with Vinod Vaikuntanathan
    J. Cryptology 26(4): 714-743, 2013. (One of 3 papers from TCC 2011 invited to the Journal of Cryptology.)
    The full version is available.

  10. "Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products," with Amit Sahai and Brent Waters
    Journal of Cryptology 26(2): 191-224, 2013. (One of 4 papers from Eurocrypt 2008 invited to the Journal of Cryptology.)
    The full version is available. Note: this version differs slightly from what was published.

  11. "Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets," with Yevgeniy Dodis, Bhavana Kanukurthi, Leo Reyzin, and Adam Smith
    IEEE Transactions on Information Theory 58(9): 6207-6222, 2012.
    The full version is available. Note: this version differs slightly from what was published.

  12. "Two-Server Password-Only Authenticated Key Exchange," with Phil MacKenzie, Gelareh Taban, and Virgil Gligor
    Journal of Computer and System Sciences 78(2): 651--669, 2012.
    The full version is available.

  13. "Which Languages Have 4-Round Zero-Knowledge Proofs?"
    Journal of Cryptology 25(1): 41-56, 2012. (One of 3 papers from TCC 2008 invited to the Journal of Cryptology.)
    The full version is available. Note: this version differs slightly from what was published.

  14. "Partial Fairness in Secure Two-Party Computation," with Dov Gordon
    Journal of Cryptology 25(1): 14-40, 2012.
    The full version is available. Note: this version differs slightly from what was published.

  15. "Complete Fairness in Secure Two-Party Computation," with S. Dov Gordon, Carmit Hazay, and Yehuda Lindell
    Journal of the ACM 58(6): 1-36, 2011.
    The extended full version is available.

  16. "On Achieving the 'Best of Both Worlds' in Secure Multiparty Computation," with Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, and Erez Petrank
    SIAM J. Computing 40(1): 122-141, 2011.
    The full version is available.

  17. "Parallel and Concurrent Security of the HB and HB+ Protocols," with Ji-Sun Shin and Adam Smith
    Journal of Cryptology 23(3): 402-421, 2010.
    The full version is available.

  18. "Bounds on the Efficiency of 'Black-Box' Commitment Schemes," with Omer Horvitz
    Theoretical Computer Science 411(10): 1251-1260, 2010.
    The full version is available.

  19. "Efficient and Secure Authenticated Key Exchange Using Weak Passwords," with Rafail Ostrovsky and Moti Yung
    Journal of the ACM 57(1): 78-116, 2009.
    The full version is available. Note: this version differs slightly from what was published.

  20. "Improving the Round Complexity of VSS in Point-to-Point Networks," with Chiu-Yuen Koo and Ranjit Kumaresan
    Information & Computation 207(8): 889-899, 2009.
    The full version is available.

  21. "Reducing Complexity Assumptions for Statistically-Hiding Commitment," with Iftach Haitner, Omer Horvitz, Chiu-Yuen Koo, Ruggero Morselli, and Ronen Shaltiel
    Journal of Cryptology 22(3): 283-310, 2009.
    The full version is available. Note: this version differs slightly from what was published (most notably in Section 4).

  22. "Ring Signatures: Stronger Definitions, and Constructions without Random Oracles," with Adam Bender and Ruggero Morselli
    Journal of Cryptology 22(1): 114-138, 2009.
    The full version is available.

  23. "On Expected Constant-Round Protocols for Byzantine Agreement," with Chiu-Yuen Koo
    Journal of Computer and System Sciences 75(2): 91-112, 2009.
    The full version is available.

  24. "Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs," with Yehuda Lindell
    Journal of Cryptology 21(3): 303-349, 2008.
    The full version is available.

  25. "Efficient Signature Schemes with Tight Security Reductions to the Diffie-Hellman Problems," with Eu-Jin Goh, Stanislaw Jarecki, and Nan Wang
    Journal of Cryptology 20(4): 493-514, 2007.
    The full version is available.

  26. "A Forward-Secure Public-Key Encryption Scheme," with Ran Canetti and Shai Halevi
    Journal of Cryptology 20(3): 265-294, 2007.
    The full version is available. An open-source implementation (done independently of the authors) is also available

  27. "Scalable Protocols for Authenticated Group Key Exchange," with Moti Yung
    Journal of Cryptology 20(1): 85-113, 2007.
    The full version is available.

  28. "Chosen-Ciphertext Security From Identity-Based Encryption," with Dan Boneh, Ran Canetti, and Shai Halevi
    SIAM Journal on Computing 36(5): 1301-1328, 2007.
    The full version is available.

  29. "Characterization of Security Notions for Probabilistic Private-Key Encryption," with Moti Yung
    Journal of Cryptology 19(1): 67-96, 2006.
    The full version is available.

  30. "A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks," with Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, and Aram Khalili
    ACM Transactions on Information and System Security 8(2): 228-258, 2005.
    The full version is available.

  31. "Bounds on the Efficiency of Generic Cryptographic Constructions," with Rosario Gennaro, Yael Gertner, and Luca Trevisan
    SIAM Journal on Computing 35(1): 217-246, 2005.
    The full version is available.

Articles in refereed conferences and workshops

  1. "Zero-Knowledge Proofs of Training for Deep Neural Networks," with Kasra Abbaszadeh, Christodoulos Pappas, and Dimitrios Papadopoulos
    ACM Conference on Computer and Communications Security (CCS) 2024

  2. "Two-Round Threshold Lattice-Based Signatures from Threshold Homomorphic Encryption," with Kamil Doruk Gur and Tjerand Silde
    PQCrypto 2024

  3. "Post-Quantum Security of Tweakable Even-Mansour, and Applications," with Gorjan Alagic, Chen Bai, Christian Majenz, and Patrick Struck
    Eurocrypt 2024

  4. "Scalable Mixed-Mode MPC," with Radhika Garg, Kang Yang, and Xiao Wang
    IEEE Symposium on Security & Privacy (Oakland) 2024

  5. "Fiat-Shamir Security of FRI and Related SNARKs," with Alex Block, Albert Garreta, Justin Thaler, Pratyush Tiwari, and Michal Zajac
    Asiacrypt 2023

  6. "Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus," with Erica Blum, Julian Loss, Kartik Nayak, and Simon Ochsenreither
    ACM Conference on Computer and Communications Security (CCS) 2023

  7. "Analyzing the Real-World Security of the Algorand Blockchain," with Erica Blum, Derek Leung, Julian Loss, and Tal Rabin
    ACM Conference on Computer and Communications Security (CCS) 2023

  8. "A Watermark for Large Language Models," with John Kirchenbauer, Jonas Geiping, Yuxin Wen, Ian Miers, and Tom Goldstein
    Recipient of outstanding paper award
    ICML 2023 (accepted for short live presentation)

  9. "State Machine Replication under Changing Network Conditions," with Andreea Alexandru, Erica Blum, and Julian Loss
    Asiacrypt 2022

  10. An Analysis of the Algebraic Group Model," with Cong Zhang and Hong-Sheng Zhou
    Asiacrypt 2022

  11. "Private Anomaly Detection in Linear Controllers: Garbled Circuits vs. Homomorphic Encryption," with Andreea Alexandru, Luis Burbano, Alvaro Cardenas, Mestan Celiktug, Juanita Gomez, and Murat Kantarcioglu
    61st IEEE Conference on Decision and Control 2022

  12. "A Provably Secure, Lightweight Protocol for Anonymous Authentication"
    13th Conference on Security and Cryptography for Networks (SCN) 2022

  13. "Post-Quantum Security of the Even-Mansour Cipher," with Gorjan Alagic, Chen Bai, and Christian Majenz (also available at arXiv)
    Eurocrypt 2022
    Also accepted for presentation at QIP 2022

  14. "Spreading the Privacy Blanket: Differentially Oblivious Shuffling for Differential Privacy," with Dov Gordon, Mingyu Liang, and Jiayu Xu
    Applied Cryptography and Network Security (ACNS) 2022

  15. "Boosting the Security of Blind Signature Schemes," with Julian Loss and Michael Rosenberg
    Asiacrypt 2021

  16. "Tardigrade: An Atomic Broadcast Protocol for Arbitrary Network Conditions," with Erica Blum and Julian Loss
    Asiacrypt 2021

  17. "Algebraic Adversaries in the Universal Composability Framework," with Michel Abdalla, Manuel Barbosa, Julian Loss, and Jiayu Xu
    Asiacrypt 2021

  18. "Constant-Overhead Zero-Knowledge for RAM Programs," with Nicholas Franzese, Steve Lu, Rafail Ostrovsky, Xiao Wang, and Chenkai Weng
    ACM Conference on Computer and Communications Security (CCS) 2021

  19. "EasyPQC: Verifying Post-Quantum Cryptography," with Manuel Barbosa, Gilles Barthe, Xiong Fan, Benjamin Gregoire, Shih-Han Hung, Pierre-Yves Strub, Xiaodi Wu, and Li Zhou
    ACM Conference on Computer and Communications Security (CCS) 2021

  20. "Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning," with Chenkai Weng, Kang Yang, Xiang Xie, and Xiao Wang
    USENIX Security Symposium 2021

  21. "Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits," with Chenkai Weng, Kang Yang, and Xiao Wang
    IEEE Symposium on Security & Privacy (Oakland) 2021

  22. "RPPLNS: Pay-per-last-N-shares with a Randomised Twist," with Philip Lazos, Francisco Javier Marmolejo-Cossio, and Xinyu Zhou
    20th Intl. Conf. on Autonomous Agents and Multiagent Systems (AAMAS) 2021 (extended abstract)
    Also accepted for presentation at the Workshop on Game Theory in Blockchain 2020

  23. "Asynchronous Byzantine Agreement with Subquadratic Communication," with Erica Blum, Chen-Da Liu-Zhang, and Julian Loss
    18th Theory of Cryptography Conference (TCC) 2020

  24. "On the Security of Time-Lock Puzzles and Timed Commitments," with Julian Loss and Jiayu Xu
    18th Theory of Cryptography Conference (TCC) 2020

  25. "2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely," with Tuyet Duong, Lei Fan, Phuc Thai, and Hong-Sheng Zhou
    ESORICS 2020

  26. "Universally Composable Relaxed Password Authenticated Key Exchange," with Michel Abdalla, Manuel Barbosa, Tatiana Bradley, Stanislaw Jarecki, and Jiayu Xu
    Crypto 2020

  27. "Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)," with Chun Guo, Xiao Wang, Chenkai Weng, and Yu Yu
    Crypto 2020

  28. "Efficient 3-Party Distributed ORAM," with Paul Bunn, Eyal Kushilevitz, and Rafail Ostrovsky
    12th Conference on Security and Cryptography for Networks (SCN) 2020

  29. "Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers," with Chun Guo, Xiao Wang, and Yu Yu
    IEEE Symposium on Security & Privacy (Oakland) 2020

  30. "Adversarial Classification Under Differential Privacy," with Jairo Giraldo, Alvaro Cardenas, and Murat Kantarcioglu
    Network and Distributed System Security Conference (NDSS) 2020

  31. "Synchronous Consensus with Optimal Asynchronous Fallback Guarantees", with Erica Blum and Julian Loss
    17th Theory of Cryptography Conference (TCC) 2019

  32. "Competing (Semi-)Selfish Miners in Bitcoin," with Francisco J. Marmolejo-Cossio, Eric Brigham, and Benjamin Sela
    ACM Conference on Advances in Financial Technologies 2019

  33. "Covert Security with Public Verifiability: Faster, Leaner, and Simpler," with Cheng Hong, Vlad Kolesnikov, Wen-jie Lu, and Xiao Wang
    Eurocrypt 2019

  34. "Constant-Round Group Key Exchange from the Ring-LWE Assumption," with Daniel Apon, Dana Dachman-Soled, and Huijing Gong
    PQCrypto 2019

  35. "Statistical Privacy in Distributed Average Consensus on Bounded Real Inputs," with Nirupam Gupta and Nikhil Chopra
    American Control Conference 2019

  36. "Simple and Efficient Two-Server ORAM," with Dov Gordon and Xiao Wang
    Asiacrypt 2018

  37. "More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting," with T-H. Hubert Chan, Kartik Nayak, Antigoni Polychroniadou, and Elaine Shi
    Asiacrypt 2018

  38. "Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures," with Vlad Kolesnikov and Xiao Wang
    ACM Conference on Computer and Communications Security (CCS) 2018

  39. "Optimizing Authenticated Garbling for Faster Secure Two-Party Computation," with Samuel Ranellucci, Mike Rosulek, and Xiao Wang
    Crypto 2018

  40. "Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks," with Benoît Cogliati, Yevgeniy Dodis, Jooyoung Lee, John Steinberger, Aishwarya Thiruvengadam, and Zhe Zhang
    Crypto 2018
    This publication is the result of a merge with this paper

  41. "vRAM: Faster Verifiable RAM With Program-Independent Preprocessing," with Yupeng Zhang, Daniel Genkin, Dimitrios Papadopoulos, and Babis Papamanthou
    IEEE Symposium on Security & Privacy (Oakland) 2018

  42. "Subset Predicate Encryption and Its Applications," with Matteo Maffei, Giulio Malavolta, and Dominique Schröder
    Cryptology and Network Security (CANS) 2017

  43. "Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation," with Xiao Wang and Samuel Ranellucci
    ACM Conference on Computer and Communications Security (CCS) 2017
    Recipient of best paper award
    Code is available as part of the EMP toolkit

  44. "Global-Scale Secure Multi-Party Computation," with Xiao Wang and Samuel Ranellucci
    ACM Conference on Computer and Communications Security (CCS) 2017
    Code is available as part of the EMP toolkit

  45. "Self-Protective Behaviors over Public WiFi Networks," with David Maimon, Michael Becker, and Sushant Patil
    Learning from Authoritative Security Experiment Results (LASER) 2017

  46. "Symmetric-Key Broadcast Encryption: The Multi-Sender Case," with Cody Freitag and Nathan Klein
    International Symposium on Cyber Security, Cryptography, and Machine Learning 2017

  47. "Efficient, Reusable Fuzzy Extractors from LWE," with Daniel Apon, Chongwon Cho, and Karim El Defrawy
    International Symposium on Cyber Security, Cryptography, and Machine Learning 2017
    Available here. Note: This version differs substantially from what was published in the proceedings.

  48. "vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases," with Yupeng Zhang, Daniel Genkin, Dimitrios Papadopoulos, and Babis Papamanthou
    IEEE Symposium on Security & Privacy (Oakland) 2017

  49. "Faster Secure Two-Party Computation in the Single-Execution Setting," with Xiao Wang and Alex Malozemoff
    Eurocrypt 2017
    Code is available as part of the EMP toolkit

  50. "Fixing Cracks in the Concrete: Random Oracles with Auxiliary Input, Revisited," with Yevgeniy Dodis and Siyao Guo
    Eurocrypt 2017
    The full version is available.

  51. "Privacy in Distributed Average Consensus," with Nirupam Gupta and Nikhil Chopra
    20th International Federation of Automatic Control (IFAC) World Congress 2017

  52. "Incentivizing Blockchain Forks via Whale Transactions," with Kevin Liao
    4th Workshop on Bitcoin and Blockchain Research (BITCOIN 2017)
    The preproceedings version is available.

  53. "An Expressive (Zero-Knowledge) Set Accumulator," with Yupeng Zhang and Babis Papamanthou
    IEEE EuroS&P 2017

  54. "Selective-Opening Security in the Presence of Randomness Failures," with Viet Tung Hoang, Adam O'Neill, and Mohammad Zaheri
    Asiacrypt 2016

  55. "Analysis of a Proposed Hash-Based Signature Standard"
    3rd International Conference on Research in Security Standardisation (SSR) 2016
    The proceedings version (© Springer) is available.

  56. "5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs," with Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, and Mariana Raykova
    ACM Conference on Computer and Communications Security (CCS) 2016
    The code is also available.

  57. "Secure Computation of MIPS Machine Code," with Xiao Wang, S. Dov Gordon, and Allen McIntosh
    ESORICS 2016
    The code is also available.

  58. "A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation," with Matthew D. Green, Alex Malozemoff and Hong-Sheng Zhou
    10th Conference on Security and Cryptography for Networks (SCN) 2016

  59. "All Your Queries are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption," with Yupeng Zhang and Babis Papamanthou
    USENIX Security Symposium 2016

  60. "The Cut-and-Choose Game and its Application to Cryptographic Protocols," with Ruiyu Zhu, Yan Huang, and Abhi Shelat
    USENIX Security Symposium 2016

  61. "Revisiting Square-Root ORAM: Efficient Random Access in Multi-Party Computation," with Samee Zahur, Xiao Wang, Mariana Raykova, Adria Gascon, Jack Doerner, and David Evans
    IEEE Symposium on Security & Privacy (Oakland) 2016

  62. "10-Round Feistel is Indifferentiable from an Ideal Cipher," with Dana Dachman-Soled and Aishwarya Thiruvengadam
    Eurocrypt 2016

  63. "Automated Analysis and Synthesis of Authenticated Encryption Schemes," with Viet Tung Hoang and Alex Malozemoff
    ACM Conference on Computer and Communications Security (CCS) 2015
    Recipient of best paper award

  64. "IntegriDB: Verifiable SQL for Outsourced Databases," with Yupeng Zhang and Babis Papamanthou
    ACM Conference on Computer and Communications Security (CCS) 2015
    Paper and code available here

  65. "Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions," with Andrew Miller, Ahmed Kosba, and Elaine Shi
    ACM Conference on Computer and Communications Security (CCS) 2015
    The proceedings version (© ACM) and a fuller version are available

  66. "How Fair is Your Protocol? A Utility-Based Approach to Protocol Optimality," with Juan Garay, Bjoern Tackmann, and Vassilis Zikas
    ACM Symposium on Principles of Distributed Computing (PODC) 2015

  67. "Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds," with Dana Dachman-Soled and Vanishree Rao
    12th Theory of Cryptography Conference (TCC) 2015

  68. "Multi-Client Verifiable Computation with Stronger Security Guarantees," with S. Dov Gordon, Feng-Hao Liu, Elaine Shi, and Hong-Sheng Zhou
    12th Theory of Cryptography Conference (TCC) 2015

  69. "Hash Functions from Defective Ideal Ciphers," with Stefan Lucks and Aishwarya Thiruvengadam
    RSA 2015---Cryptographers' Track

  70. "Alitheia: Towards Practical Verifiable Graph Processing," with Yupeng Zhang and Babis Papamanthou
    ACM Conference on Computer and Communications Security (CCS) 2014

  71. "Amortizing Garbled Circuits," with Yan Huang, Vlad Kolesnikov, Ranjit Kumaresan, and Alex Malozemoff
    Crypto 2014

  72. "Feasibility and Infeasibility of Secure Computation with Malicious PUFs," with Dana Dachman-Soled, Nils Fleischhacker, Anna Lysyanskaya, and Dominique Schröder
    Crypto 2014

  73. "Efficient Three-Party Computation from Cut-and-Choose," with Seung Geol Choi, Alex Malozemoff, and Vassilis Zikas
    Crypto 2014

  74. "Automated Analysis and Synthesis of Block-Cipher Modes of Operation," with Alexis J. Malozemoff and Matthew D. Green
    IEEE Computer Security Foundations Symposium 2014
    The proceedings version, full version, and code are available.

  75. "Distributing the Setup in Universally Composable Multiparty Computation," with Aggelos Kiayias, Hong-Sheng Zhou, and Vassilis Zikas
    ACM Symposium on Principles of Distributed Computing (PODC) 2014

  76. "Automating Efficient RAM-Model Secure Computation," with Chang Liu, Yan Huang, Elaine Shi, and Mike Hicks
    IEEE Symposium on Security & Privacy (Oakland) 2014
    The proceedings version is available

  77. "PermaCoin: Repurposing Bitcoin Work for Long-Term Data Preservation," with Andrew Miller, Ari Juels, Elaine Shi, and Bryan Parno
    IEEE Symposium on Security & Privacy (Oakland) 2014

  78. "Multi-Input Functional Encryption," with Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Feng-Hao Liu, Amit Sahai, Elaine Shi, and Hong-Sheng Zhou
    Eurocrypt 2014
    This publication is the result of a merge with this paper

  79. "Verifiable Oblivious Storage," with Daniel Apon, Elaine Shi, and Aishwarya Thiruvengadam
    Public-Key Cryptography (PKC) 2014

  80. "(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens," with Seung Geol Choi, Dominique Schröder, Arkady Yerukhimovich, and Hong-Sheng Zhou
    11th Theory of Cryptography Conference (TCC) 2014
    Invited to J. Cryptology (one of 3 papers selected from TCC 2014)

  81. "Authenticated Data Structures, Generically," with Andrew Miller, Michael Hicks, and Elaine Shi
    ACM Symposium on Principles of Programming Languages (POPL) 2014

  82. "Functional Encryption from (Small) Hardware Tokens," with Kai-Min Chung and Hong-Sheng Zhou
    Asiacrypt 2013

  83. "Rational Protocol Design: Cryptography Against Incentive-Driven Adversaries," with Juan Garay, Ueli Maurer, Bjoern Tackmann, and Vassilis Zikas
    IEEE Symposium on Foundations of Computer Science (FOCS) 2013

  84. "Coupled-Worlds Privacy: Exploiting Adversarial Uncertainty in Statistical Data Privacy," with Raef Bassily, Adam Groce, and Adam Smith
    IEEE Symposium on Foundations of Computer Science (FOCS) 2013

  85. "Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose," with Yan Huang and David Evans
    Crypto 2013

  86. "Anon-Pass: Practical Anonymous Subscriptions," with Michael Lee, Alan Dunn, Brent Waters, and Emmett Witchel
    IEEE Symposium on Security & Privacy (Oakland) 2013
    The proceedings version is available. See here for a link to source code
    Invited to special issue of IEEE Security & Privacy magazine

  87. "Multi-Client Non-Interactive Verifiable Computation," with Seung Geol Choi, Ranjit Kumaresan, and Carlos Cid
    10th Theory of Cryptography Conference (TCC) 2013

  88. "Feasibility and Completeness of Cryptographic Tasks in the Quantum World," with Serge Fehr, Fang Song, Hong-Sheng Zhou, and Vassilis Zikas
    10th Theory of Cryptography Conference (TCC) 2013
    (An extended abstract of this work was also presented at the 6th International Conference on Information-Theoretic Security (ICITS), 2012 workshop track)

  89. "Universally Composable Synchronous Computation," with Ueli Maurer, Bjorn Tackmann, and Vassilis Zikas
    10th Theory of Cryptography Conference (TCC) 2013

  90. "Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS," with Seung Geol Choi, Hoeteck Wee, and Hong-Sheng Zhou
    Public-Key Cryptography (PKC) 2013

  91. "Feasibility and Infeasibility of Adaptively Secure, Fully Homomorphic Encryption," with Aishwarya Thiruvengadam and Hong-Sheng Zhou
    Public-Key Cryptography (PKC) 2013

  92. "Secure Two-Party Computation in Sublinear Amortized Time," with Dov Gordon, Vladimir Kolesnikov, Fernando Krell, Tal Malkin, Mariana Raykova, and Yevgeniy Vahlis
    ACM Conference on Computer and Communications Security (CCS) 2012
    A preliminary version of this work was accepted as a short paper to the Workshop on Cryptography and Security in Clouds, 2011
    The proceedings version (© ACM) is available. See also here.

  93. "Collusion-Preserving Computation," with Joel Alwen, Ueli Maurer, and Vassilis Zikas
    Crypto 2012

  94. "Byzantine Agreement with a Rational Adversary," with Adam Groce, Aishwarya Thiruvengadam, and Vassilis Zikas
    International Colloquium on Automata, Languages, and Programming (ICALP) 2012

  95. "Knowledge-Oriented Secure Multiparty Computation," with Piotr Mardziel, Michael Hicks, and Mudhakar Srivatsa
    ACM Workshop on Programming Languages and Analysis for Security (PLAS) 2012
    The proceedings version is available.

  96. "Quid Pro Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution," with Yan Huang and David Evans
    IEEE Symposium on Security & Privacy (Oakland) 2012
    The proceedings version is available. (Note: this may not match the actual published version.)

  97. "Constant-Round Multi-Party Private Set Union using Reversed Laurent Series," with Jae Hong Seo and Jung Hee Cheon
    Public-Key Cryptography (PKC) 2012

  98. "Fair Computation with Rational Players," with Adam Groce
    Eurocrypt 2012
    A full version (with a generalization to the multi-party setting) is available

  99. "On the Security of the 'Free-XOR' Technique," with Seung Geol Choi, Ranjit Kumaresan, and Hong-Sheng Zhou
    9th Theory of Cryptography Conference (TCC) 2012

  100. "Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces," with Seung Geol Choi, Kyung-Wook Hwang, Tal Malkin, and Dan Rubenstein
    RSA 2012---Cryptographers' Track
    The code is available here.

  101. "Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?" with Yan Huang and David Evans
    Network and Distributed System Security Conference (NDSS) 2012.
    The proceedings version is available.
    The code is available here.

  102. "Efficient Secure Computation with Garbled Circuits," with Yan Huang, Chih-hao Shen, David Evans, and Abhi Shelat
    Invited paper, International Conference on Information Systems Security 2011

  103. "Constant-Round Private-Function Evaluation with Linear Complexity," with Lior Malka
    Asiacrypt 2011

  104. "Faster Secure Two-Party Computation Using Garbled Circuits," with Yan Huang, David Evans, and Lior Malka
    USENIX Security Symposium 2011.
    The proceedings version is available. (Note: this may not fully match the actual published version.)
    The code is available here.

  105. "Adaptively Secure Broadcast, Revisited," with Juan Garay, Ranjit Kumaresan, and Hong-Sheng Zhou
    ACM Symposium on Principles of Distributed Computing (PODC) 2011.
    The proceedings version is available.

  106. "Round-Optimal Password-Based Authenticated Key Exchange," with Vinod Vaikuntanathan
    8th Theory of Cryptography Conference (TCC) 2011.
    Invited to J. Cryptology (one of 3 papers selected from TCC 2011).

  107. "Limits of Computational Differential Privacy in the Client/Server Setting," with Adam Groce and Arkady Yerukhimovich
    8th Theory of Cryptography Conference (TCC) 2011.
    The proceedings version (© IACR) is available.

  108. "Impossibility of Blind Signatures from One-Way Permutations," with Dominique Schröder and Arkady Yerukhimovich
    8th Theory of Cryptography Conference (TCC) 2011.
    The proceedings version (© IACR) is available.

  109. "Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions," with Zvika Brakerski, Gil Segev, and Arkady Yerukhimovich
    8th Theory of Cryptography Conference (TCC) 2011.
    The proceedings version (© IACR) is available.

  110. "Efficient Privacy-Preserving Biometric Identification," with Yan Huang, Lior Malka, and David Evans
    Network and Distributed System Security Conference (NDSS) 2011.

  111. "A Group Signature Scheme from Lattice Assumptions," with Dov Gordon and Vinod Vaikuntanathan
    Asiacrypt 2010

  112. "Public-Key Cryptography Resilient to Continual Memory Leakage," with Zvika Brakerski, Yael Tauman Kalai, and Vinod Vaikuntanathan
    IEEE Symposium on Foundations of Computer Science (FOCS) 2010

  113. "Secure Text Processing with Applications to Private DNA Matching," with Lior Malka
    ACM Conference on Computer and Communications Security (CCS) 2010
    The proceedings version is available.

  114. "A New Framework for Efficient Password-Based Authenticated Key Exchange," with Adam Groce
    ACM Conference on Computer and Communications Security (CCS) 2010. The full version is available.

  115. "Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure," with S. Dov Gordon, Ranjit Kumaresan, and Arkady Yerukhimovich
    12th Intl. Symp. on Stabilization, Safety, and Security of Distributed Systems (SSS) 2010
    Invited to a special issue of Information & Computation

  116. "Partial Fairness in Secure Two-Party Computation," with Dov Gordon
    Eurocrypt 2010. The full version is available.

  117. "Secure Network Coding Over the Integers," with Rosario Gennaro, Hugo Krawczyk, and Tal Rabin
    Public-Key Cryptography (PKC) 2010

  118. "Efficient Rational Secret Sharing in Standard Communication Networks," with Georg Fuchsbauer and David Naccache
    7th Theory of Cryptography Conference (TCC) 2010. The full version is available.

  119. "Signature Schemes with Bounded Leakage Resilience," with Vinod Vaikuntanathan
    Asiacrypt 2009
    An early version is available; the proceedings version contains some additional results

  120. "On Black-Box Constructions of Predicate Encryption Schemes from Trapdoor Permutations," with Arkady Yerukhimovich
    Asiacrypt 2009
    The proceedings version (© IACR) is available

  121. "Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices," with Vinod Vaikuntanathan
    Asiacrypt 2009
    The proceedings version (© IACR) is available

  122. "Proofs of Storage from Homomorphic Identification Protocols," with Giuseppe Ateniese and Seny Kamara
    Asiacrypt 2009
    The proceedings version (© IACR) is available

  123. "Attacking Cryptographic Schemes Based on 'Perturbation Polynomials'," with Martin Albrecht, Craig Gentry, and Shai Halevi
    ACM Conference on Computer and Communications Security (CCS) 2009

  124. "Collusion-Free Multiparty Computation in the Mediated Model," with Joel Alwen, Yehuda Lindell, Giuseppe Persiano, Abhi Shelat, and Ivan Visconti
    Crypto 2009
    An early version is available (note: this is different from the proceedings version).

  125. "Signing a Linear Subspace: Signatures for Network Coding," with Dan Boneh, David Freeman, and Brent Waters
    Public-Key Cryptography (PKC) 2009

  126. "Composability and On-Line Deniability of Authentication," with Yevgeniy Dodis, Adam Smith, and Shabsi Walfish
    6th Theory of Cryptography Conference (TCC) 2009
    The proceedings version (© IACR) is available.

  127. "Complete Fairness in Multi-Party Computation without an Honest Majority," with Dov Gordon
    6th Theory of Cryptography Conference (TCC) 2009

  128. "Improving the Round Complexity of VSS in Point-to-Point Networks," with Chiu-Yuen Koo and Ranjit Kumaresan
    International Colloquium on Automata, Languages, and Programming (ICALP) 2008
    The full version is available above.

  129. "Complete Fairness in Secure Two-Party Computation," with S. Dov Gordon, Carmit Hazay, and Yehuda Lindell
    ACM Symposium on Theory of Computing (STOC) 2008
    The proceedings version (© ACM) is available, and the full version is available above

  130. "Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products," with Amit Sahai and Brent Waters
    Eurocrypt 2008
    Invited to J. Cryptology (one of 4 papers selected from Eurocrypt 2008)
    The proceedings version (© IACR) is available, as is the full version

  131. "How to Encrypt with a Malicious Random Number Generator," with Seny Kamara
    Fast Software Encryption (FSE) 2008

  132. "Aggregate Message Authentication Codes," with Yehuda Lindell
    RSA 2008---Cryptographers' Track
    The full version is available

  133. "Bridging Game Theory and Cryptography: Recent Results and Future Directions"
    Invited paper, 5th Theory of Cryptography Conference (TCC) 2008
    The proceedings version (© IACR) is available. A full version is in preparation

  134. "Which Languages have 4-Round Zero-Knowledge Proofs?"
    5th Theory of Cryptography Conference (TCC) 2008
    Invited to J. Cryptology (one of 3 papers selected from TCC 2008).

  135. "Universally-Composable Computation with an Unreliable Common Reference String," with Vipul Goyal
    5th Theory of Cryptography Conference (TCC) 2008
    The proceedings version (© IACR) is available

  136. "Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise"
    Invited paper, 11th IMA International Conference on Cryptography and Coding Theory, 2007

  137. "Round Complexity of Authenticated Broadcast with a Dishonest Majority," with Juan Garay, Chiu-Yuen Koo, and Rafail Ostrovsky
    IEEE Symposium on Foundations of Computer Science (FOCS) 2007
    The proceedings version is available.

  138. "Universally-Composable Two-Party Computation in Two Rounds," with Omer Horvitz
    Crypto 2007
    The proceedings version (© IACR) is available.

  139. "On Achieving the 'Best of Both Worlds' in Secure Multiparty Computation"
    ACM Symposium on Theory of Computing (STOC) 2007
    The full version is available above.

  140. "Universally Composable Multi-Party Computation using Tamper-Proof Hardware"
    Eurocrypt 2007
    The proceedings version (© IACR) is available.

  141. "Round-Efficient Secure Computation in Point-to-Point Networks," with Chiu-Yuen Koo
    Eurocrypt 2007
    The proceedings version (© IACR) is available.

  142. "Concurrently-Secure Blind Signatures without Random Oracles or Setup Assumptions," with Carmit Hazay, Chiu-Yuen Koo, and Yehuda Lindell
    4th Theory of Cryptography Conference (TCC) 2007
    The proceedings version (© IACR) is available.

  143. "Exploiting Approximate Transitivity of Trust," with Ruggero Morselli, Bobby Bhattacharjee, and Michael Marsh
    Invited paper, BroadNets 2007

  144. "Rational Secret Sharing, Revisited," with S. Dov Gordon
    Security and Cryptography for Networks 2006
    (An extended abstract of this work was also accepted for presentation at NetEcon 2006)

  145. "Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets," with Yevgeniy Dodis, Leo Reyzin, and Adam Smith
    Crypto 2006
    This paper is superseded by the full version available above.

  146. "On Expected Constant-Round Protocols for Byzantine Agreement," with Chiu-Yuen Koo
    Crypto 2006
    The full version is available above. An older version is available from the eprint archives.

  147. "Reliable Broadcast in Radio Networks: The Bounded Collision Case," with Chiu-Yuen Koo, Vartika Bhandari, and Nitin Vaidya
    PODC 2006

  148. "Parallel and Concurrent Security of the HB and HB+ Protocols," with Ji Sun Shin
    Eurocrypt 2006
    The full version is available.
    This work is superseded by the journal version "Parallel and Concurrent Security of the HB and HB+ Protocols," with Ji-Sun Shin and Adam Smith, available above.

  149. "Ring Signatures: Stronger Definitions, and Constructions without Random Oracles," with Adam Bender and Ruggero Morselli
    3rd Theory of Cryptography Conference (TCC) 2006
    A version available on eprint is an extended version of what appeared in the proceedings. The full version is available above.

  150. "Modeling Insider Attacks on Group Key-Exchange Protocols," with Ji Sun Shin
    ACM Conference on Computer and Communications Security (CCS) 2005
    The full version and the presentation given at the conference are available.

  151. "Lower Bounds on the Efficiency of 'Black-Box' Commitment Schemes," with Omer Horvitz
    International Colloquium on Automata, Languages, and Programming (ICALP) 2005
    Invited to a special issue of Theoretical Computer Science
    The proceedings versionSpringer-Verlag) is available. A full version is available above.

  152. "Two-Server Password-Only Authenticated Key Exchange," with Phil MacKenzie, Gelareh Taban, and Virgil Gligor
    Applied Cryptography and Network Security (ACNS) 2005
    The proceedings versionSpringer-Verlag) is available, and the full version is available above.

  153. "Universally Composable Password-Based Key Exchange," with Ran Canetti, Shai Halevi, Yehuda Lindell, and Phil MacKenzie
    Eurocrypt 2005
    The proceedings version (© IACR) and a preliminary full version are available.

  154. "Secure Remote Authentication Using Biometric Data," with Xavier Boyen, Yevgeniy Dodis, Rafail Ostrovsky, and Adam Smith
    Eurocrypt 2005
    A revised version is available. (Note: this is essentially the same as the proceedings version, except that some mistakes have been fixed.)

  155. "Reducing Complexity Assumptions for Statistically-Hiding Commitment," with Iftach Haitner, Omer Horvitz, Chiu-Yuen Koo, Ruggero Morselli, and Ronen Shaltiel
    Eurocrypt 2005
    The proceedings version (© IACR) is available, and the full version is available above. An earlier version of the paper is also available.

  156. "Adaptively-Secure, Non-Interactive Public-Key Encryption," with Ran Canetti and Shai Halevi
    2nd Theory of Cryptography Conference (TCC) 2005
    The proceedings version (© IACR) and the full version are available.

  157. "Chosen Ciphertext Security of Multiple Encryption," with Yevgeniy Dodis
    2nd Theory of Cryptography Conference (TCC) 2005
    The proceedings version (© IACR) is available

  158. "Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs," with Yehuda Lindell
    2nd Theory of Cryptography Conference (TCC) 2005
    The proceedings version (© IACR) is available, and the full version is available above.

  159. "Improved Efficiency for CCA-Secure Cryptosystems Built Using IBE," with Dan Boneh
    RSA 2005---Cryptographers' Track
    The proceedings version (© Springer-Verlag) is available. The full version is available above.

  160. "Identity-Based Zero Knowledge," with Rafail Ostrovsky and Michael Rabin
    Security in Communication Networks, 2004

  161. "Round-Optimal Secure Two-Party Computation," with Rafail Ostrovsky
    Crypto 2004
    The proceedings version (© IACR) is available.

  162. "A Game-Theoretic Framework for Analyzing Trust-Inference Protocols," with Ruggero Morselli and Bobby Bhattacharjee
    Second Workshop on the Economics of Peer-to-Peer Systems, 2004
    A preliminary manuscript is available, as well as the presentation that was given at the P2Pecon workshop. A full(er) version of the paper is available on request.

  163. "One-Round Protocols for Two-Party Authenticated Key Exchange," with Ik Rae Jeong and Dong Hoon Lee
    Applied Cryptography and Network Security (ACNS) 2004
    A full version is available (this version corrects some minor errors in the prceedings version).

  164. "Chosen-Ciphertext Security From Identity-Based Encryption," with Ran Canetti and Shai Halevi
    Eurocrypt 2004
    An early version is available at the eprint archives. The proceedings version (© IACR) is also available, and the full version is available above.

  165. "Trust Preserving Set Operations," with Ruggero Morselli, Bobby Bhattacharjee, and Pete Keleher
    IEEE Infocom 2004

  166. "A Generic Construction for Intrusion-Resilient Public-Key Encryption," with Yevgeniy Dodis, Matt Franklin, Atsuko Miyaji, and Moti Yung
    RSA 2004---Cryptographers' Track.

  167. "Binary Tree Encryption: Constructions and Applications"
    Invited paper, ICISC 2003
    The proceedings versionSpringer-Verlag) is available.

  168. "Efficiency Improvements for Signature Schemes with Tight Security Reductions," with Nan Wang
    ACM Conference on Computer and Communications Security (CCS) 2003
    The proceedings version (© ACM) is available (note: this version is slightly updated from what actually appears in the proceedings).
    The full version (which does not contain all the results in the proceedings version) is available above as "Efficient Signature Schemes with Tight Security Reductions to the Diffie-Hellman Problems"

  169. "Scalable Protocols for Authenticated Group Key Exchange," with Moti Yung
    Crypto 2003
    The proceedings version (© IACR) is available, and the full version is available above

  170. "Lower Bounds on the Efficiency of Encryption and Digital Signature Schemes," with Rosario Gennaro and Yael Gertner
    ACM Symposium on Theory of Computing (STOC) 2003
    The proceedings version (© ACM) is available, and the full version is available above as "Bounds on the Efficiency of Generic Cryptographic Constructions".

  171. "Round Efficiency of Multi-Party Computation with a Dishonest Majority," with Rafail Ostrovsky and Adam Smith
    Eurocrypt 2003
    The proceedings version (© IACR) and an extended version are available.

  172. "A Forward-Secure Public-Key Encryption Scheme," with Ran Canetti and Shai Halevi
    Eurocrypt 2003
    The proceedings version (© IACR) is available, and the full version is available above. Older versions of the paper are available here and here.

  173. "Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications"
    Eurocrypt 2003
    The proceedings version (© IACR) is available. A slightly extended (but older) version is available at the eprint archives.

  174. "Intrusion-Resilient Public-Key Encryption," with Yevgeniy Dodis, Matt Franklin, Atsuko Miyaji, and Moti Yung
    RSA 2003---Cryptographers' Track

  175. "Toward Secure Key Distribution in Truly Ad-Hoc Networks," with Aram Khalili and William Arbaugh
    IEEE Workshop on Security and Assurance in Ad-Hoc Networks 2003

  176. "Strong Key-Insulated Signature Schemes," with Yevgeniy Dodis, Shouhuai Xu, and Moti Yung
    Public-Key Cryptography (PKC) 2003

  177. "Forward Secrecy in Password-Only Key Exchange Protocols," with Rafail Ostrovsky and Moti Yung
    Security in Communication Networks 2002
    The full version is available as "Efficient and Secure Authenticated Key Exchange Using Weak Passwords," above.

  178. "Threshold Cryptosystems Based on Factoring," with Moti Yung
    Asiacrypt 2002

  179. "Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG," with Kahil Jallad, Jena Lee, and Bruce Schneier
    Information Security Conference 2002

  180. "Key-Insulated Public-Key Cryptosystems," with Yevgeniy Dodis, Shouhuai Xu, and Moti Yung
    Eurocrypt 2002

  181. "Incremental and Unforgeable Encryption," with Enrico Buonanno and Moti Yung
    Fast Software Encryption 2001

  182. "Efficient Password-Authenticated Key Exchange Using Human-Memorizable Passwords," with Rafail Ostrovsky and Moti Yung
    Eurocrypt 2001
    A full version is available as "Efficient and Secure Authenticated Key Exchange Using Weak Passwords," above.
    An older version is available at the eprint archives.

  183. "Efficient and Non-Interactive, Non-Malleable Commitment," with Giovanni Di Crescenzo, Rafail Ostrovsky, and Adam Smith
    Eurocrypt 2001

  184. "Cryptographic Counters and Applications to Electronic Voting," with Rafail Ostrovsky and Steven Myers
    Eurocrypt 2001

  185. "A Chosen-Ciphertext Attack against Several E-mail Encryption Protocols," with Bruce Schneier
    USENIX Security Symposium 2000

  186. "Unforgeable Encryption and Chosen-Ciphertext-Secure Modes of Operation," with Moti Yung
    Fast Software Encryption 2000

  187. "Complete Characterization of Security Notions for Probabilistic, Private-Key Encryption," with Moti Yung
    ACM Symposium on Theory of Computing (STOC) 2000
    The full version is available above.

  188. "On the Efficiency of Local Decoding Procedures for Error-Correcting Codes," with Luca Trevisan
    ACM Symposium on Theory of Computing (STOC) 2000

Other manuscripts

  1. "Large-Scale Private Set Intersection in the Client-Server Setting," with Yunqing Sun, Mariana Raykova, Phillipp Schoppmann, and Xiao Wang
  2. "LATKE: A Framework for Constructing Identity-Binding PAKEs," with Michael Rosenberg
  3. "A Quantum "Lifting Theorem" for Constructions of Pseudorandom Generators from Random Oracles," with Ben Sela
  4. "Round-Optimal Fully Secure Distributed Key Generation"
  5. "Musings on the HashGraph Protocol: Its Security and Its Limitations," with Vinesh Sridhar and Erica Blum
  6. "CoVault: A Secure Analytics Platform," with Roberta De Viti et al.
  7. "A Zero-Knowledge Version of vSQL," with Yupeng Zhang, Daniel Genkin, Dimitrios Papadopoulos, and Charalampos Papamanthou
  8. "An Oblivious Parallel RAM with O(log^2 N) Parallel Runtime Blowup," with Kartik Nayak
  9. "Efficiently Enforcing Input Validity in Secure Two-party Computation," with Alex Malozemoff and Xiao Wang
  10. "Pseudonymous Secure Computation from Cryptographic Puzzles," with Andrew Miller and Elaine Shi
  11. "Cryptography and the Economics of Supervisory Information: Balancing Transparency and Confidentiality," with Mark Flood, Stephen Ong, and Adam Smith
    Presented at Financial Stability Conference: Using the Tools, Finding the Data (2013)
    and Conference on Data Standards, Information, and Financial Stability (2014)
  12. "Implementing Actively Secure MPC with Optimal Security Threshold," with Seung Geol Choi and Arkady Yerukhimovich
  13. "Tracing Insider Attacks in the Context of Predicate Encryption Schemes," with Dominique Schröder
    Annual Conference of the ITA (ACITA) 2011
  14. "A Game-Theoretic Model Motivated by the DARPA Network Challenge," with Rajesh Chitnis, MohammadTaghi Hajiaghayi, and Koyel Mukherjee
    SPAA 2013 brief announcement. Also appeared at the Workshop on Risk Aversion in Algorithmic Game Theory and Mechanism Design, 2012
  15. "On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions," with Chiu-Yuen Koo

    (The following have been superseded by other papers listed above)

  16. "Scalable Incrementally Verifiable Computation with Applications to Zero-Knowledge Proof-of-Learning," with Kasra Abbaszadeh, Christodoulos Pappas, and Dimitrios Papadopoulos
    Presented at Privacy-Preserving Machine Learning Workshop 2023
    This work is superseded by the paper "Zero-Knowledge Proofs of Training for Deep Neural Networks," with Kasra Abbaszadeh, Christodoulos Pappas, and Dimitrios Papadopoulos
  17. "Provable Security of Substitution-Permutation Networks" with Yevgeniy Dodis, John Steinberger, Aishwarya Thiruvengadam, and Zhe Zhang
    (See also here.) This work is superseded by the paper "Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks," with Benoît Cogliati, Yevgeniy Dodis, Jooyoung Lee, John Steinberger, Aishwarya Thiruvengadam, and Zhe Zhang.
  18. "Analysis of a Proposed Hash-Based Signature Standard, rev. 4" and "Analysis of a Proposed Hash-Based Signature Standard"
    These works are superseded by the paper that appeared at SSR 2016.
  19. "Implementing Cryptographic Program Obfuscation," with Daniel Apon, Yan Huang, and Alex J. Malozemoff
    This work is superseded by the paper "5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs" that appeared at ACM CCCS 2016. Adam Foltzer, Kevin Lewi, Alex Malozemoff, Mariana Raykova, and Daniel Wagner.
  20. "VMCrypt---Modular Software Architecture for Scalable Secure Computation," with Lior Malka.
    A revised version of this work appeared at the ACM Conference on Computer and Communications Security 2011.
  21. "Compact Signatures for Network Coding," with Brent Waters
    This work is superseded by the paper "Signing a Linear Subspace: Signatures for Network Coding," with Dan Boneh, David Freeman, and Brent Waters.
  22. "Analyzing the HB and HB+ Protocols in the 'Large Error' Case," with Adam Smith
    This work is superseded by the journal version of the paper "Parallel and Concurrent Security of the HB and HB+ Protocols," with Ji-Sun Shin and Adam Smith.
  23. "KeyChains: A Decentralized Public-Key Infrastructure," with Ruggero Morselli, Bobby Bhattacharjee, and Mike Marsh
    Technical Report CS-TR-4788, Department of Computer Science, University of Maryland, 2006. Also filed as UMIACS-2006-12.
    The results here are described in the paper "Exploiting Approximate Transitivity of Trust," with Ruggero Morselli, Bobby Bhattacharjee, and Michael Marsh.

PhD thesis

"Efficient Cryptographic Protocols Preventing 'Man-in-the-Middle' Attacks"
Columbia University, 2002
Includes results from the following papers (see above for full publication information) and also some additional, unpublished results:

Web Accessibility