20122024

Research activity per year

Search results

  • 2024

    Batch Proofs Are Statistically Hiding

    Bitansky, N., Kamath, C., Paneth, O., Rothblum, R. D. & Vasudevan, P. N., 10 Jun 2024, STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing. Mohar, B., Shinkar, I. & O�Donnell, R. (eds.). Association for Computing Machinery, p. 435-443 9 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    2 Scopus citations
  • Monotone-Policy Aggregate Signatures

    Brodsky, M. F., Choudhuri, A. R., Jain, A. & Paneth, O., 2024, Advances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Joye, M. & Leander, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 168-195 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14654 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Public-Coin, Complexity-Preserving, Succinct Arguments of Knowledge for NP from Collision-Resistance

    Freitag, C., Paneth, O. & Pass, R., 2024, Advances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Joye, M. & Leander, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 112-141 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14654 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Reusable Online-Efficient Commitments

    Bitansky, N., Paneth, O. & Shamir, D., 2024, Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-35 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14927 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    Non-interactive Universal Arguments

    Bitansky, N., Paneth, O., Shamir, D. & Solomon, T., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings, Part II. Handschuh, H. & Lysyanskaya, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 132-158 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14082 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • SNARGs for Monotone Policy Batch NP

    Brakerski, Z., Brodsky, M. F., Kalai, Y. T., Lombardi, A. & Paneth, O., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings, Part II. Handschuh, H. & Lysyanskaya, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 252-283 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14082 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • WEAK ZERO-KNOWLEDGE BEYOND THE BLACK-BOX BARRIER

    Bitansky, N., Khurana, D. & Paneth, O., Apr 2023, In: SIAM Journal on Computing. 52, 2, p. 156-199 44 p.

    Research output: Contribution to journalArticlepeer-review

  • 2022

    Incrementally Verifiable Computation via Rate-1 Batch Arguments

    Paneth, O. & Pass, R., 2022, Proceedings - 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science, FOCS 2022. IEEE Computer Society, p. 1045-1056 12 p. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2022-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • PPAD is as Hard as LWE and Iterated Squaring

    Bitansky, N., Choudhuri, A. R., Holmgren, J., Kamath, C., Lombardi, A., Paneth, O. & Rothblum, R. D., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 593-622 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Succinct Non-Interactive Arguments via Linear Interactive Proofs

    Bitansky, N., Chiesa, A., Ishai, Y., Ostrovsky, R. & Paneth, O., Jul 2022, In: Journal of Cryptology. 35, 3, 15.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    2 Scopus citations
  • Verifiable Private Information Retrieval

    Ben-David, S., Kalai, Y. T. & Paneth, O., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-32 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13749 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2021

    Reusable Fuzzy Extractors for Low-Entropy Distributions

    Canetti, R., Fuller, B., Paneth, O., Reyzin, L. & Smith, A., Jan 2021, In: Journal of Cryptology. 34, 1, 2.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    33 Scopus citations
  • 2020

    Delegation with updatable unambiguous proofs and ppad-hardness

    Kalai, Y. T., Paneth, O. & Yang, L., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 652-673 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12172 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • Weakly extractable one-way functions

    Bitansky, N., Eizenstadt, N. & Paneth, O., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 596-626 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12550 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2019

    How to delegate computations publicly

    Kalai, Y. T., Paneth, O. & Yang, L., 23 Jun 2019, STOC 2019 - Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. Charikar, M. & Cohen, E. (eds.). Association for Computing Machinery, p. 1115-1124 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    52 Scopus citations
  • Incrementally Verifiable Computation via Incremental PCPs

    Naor, M., Paneth, O. & Rothblum, G. N., 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). Springer, p. 552-576 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • On Round Optimal Statistical Zero Knowledge Arguments

    Bitansky, N. & Paneth, O., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 128-156 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Weak zero-knowledge beyond the black-box barrier

    Bitansky, N., Khurana, D. & Paneth, O., 23 Jun 2019, STOC 2019 - Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. Charikar, M. & Cohen, E. (eds.). Association for Computing Machinery, p. 1091-1102 12 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • 2018

    Multi-collision resistance: A paradigm for keyless hash functions

    Bitansky, N., Kalai, Y. T. & Paneth, O., 20 Jun 2018, STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. Henzinger, M., Kempe, D. & Diakonikolas, I. (eds.). Association for Computing Machinery, p. 1283-1296 14 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    41 Scopus citations
  • 2017

    On removing graded encodings from functional encryption

    Bitansky, N., Lin, H. & Paneth, O., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J.-S. & Nielsen, J. B. (eds.). Springer Verlag, p. 3-29 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • On Virtual Grey Box Obfuscation for General Circuits

    Bitansky, N., Canetti, R., Kalai, Y. T. & Paneth, O., 1 Dec 2017, In: Algorithmica. 79, 4, p. 1014-1051 38 p.

    Research output: Contribution to journalArticlepeer-review

    8 Scopus citations
  • On zero-testable homomorphic encryption and publicly verifiable non-interactive arguments

    Paneth, O. & Rothblum, G. N., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer Verlag, p. 283-315 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • 2016

    3-message zero knowledge against human ignorance

    Bitansky, N., Brakerski, Z., Kalai, Y., Paneth, O. & Vaikuntanathan, V., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 57-83 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Delegating RAM computations

    Kalai, Y. & Paneth, O., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 91-118 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9986 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • On the existence of extractable one-way functions

    Bitansky, N., Canetti, R., Paneth, O. & Rosen, A., 2016, In: SIAM Journal on Computing. 45, 5, p. 1910-1952 43 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    16 Scopus citations
  • Perfect structure on the edge of chaos trapdoor permutations from indistinguishability obfuscation

    Bitansky, N., Paneth, O. & Wichs, D., 2016, Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer Verlag, p. 474-502 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    44 Scopus citations
  • Reusable fuzzy extractors for low-entropy distributions

    Canetti, R., Fuller, B., Paneth, O., Reyzin, L. & Smith, A., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Coron, J.-S. (eds.). Springer Verlag, p. 117-146 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    69 Scopus citations
  • Time-lock puzzles from randomized encodings

    Bitansky, N., Goldwasser, S., Jain, A., Paneth, O. & Vaikuntanathan, V., 14 Jan 2016, ITCS 2016 - Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science. Association for Computing Machinery, Inc, p. 345-356 12 p. (ITCS 2016 - Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    81 Scopus citations
  • 2015

    Aps and non-interactive witness indistinguishability from indistinguishability obfuscation

    Bitansky, N. & Paneth, O., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, p. 401-427 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    68 Scopus citations
  • On non-black-box simulation and the impossibility of approximate obfuscation

    Bitansky, N. & Paneth, O., 2015, In: SIAM Journal on Computing. 44, 5, p. 1325-1383 59 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    14 Scopus citations
  • On obfuscation with random oracles

    Canetti, R., Kalai, Y. T. & Paneth, O., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, p. 456-467 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • On the Cryptographic Hardness of Finding a Nash Equilibrium

    Bitansky, N., Paneth, O. & Rosen, A., 11 Dec 2015, Proceedings - 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, FOCS 2015. IEEE Computer Society, p. 1480-1498 19 p. 7354468. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2015-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    76 Scopus citations
  • 2014

    Client-server concurrent zero knowledge with constant rounds and guaranteed complexity

    Canetti, R., Jain, A. & Paneth, O., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 337-350 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • Obfuscation for evasive functions

    Barak, B., Bitansky, N., Canetti, R., Kalai, Y. T., Paneth, O. & Sahai, A., 2014, Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. Springer Verlag, p. 26-51 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8349 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    37 Scopus citations
  • On the existence of extractable one-way functions

    Bitansky, N., Canetti, R., Paneth, O. & Rosen, A., 2014, STOC 2014 - Proceedings of the 2014 ACM Symposium on Theory of Computing. Association for Computing Machinery, p. 505-514 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    70 Scopus citations
  • On virtual grey box obfuscation for general circuits

    Bitansky, N., Canetti, R., Kalai, Y. T. & Paneth, O., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 108-125 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    29 Scopus citations
  • Protecting obfuscation against algebraic attacks

    Barak, B., Garg, S., Kalai, Y. T., Paneth, O. & Sahai, A., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, p. 221-238 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    140 Scopus citations
  • The impossibility of obfuscation with auxiliary input or a universal simulator

    Bitansky, N., Canetti, R., Cohn, H., Goldwasser, S., Kalai, Y. T., Paneth, O. & Rosen, A., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 71-89 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    37 Scopus citations
  • Verifiable set operations over outsourced databases

    Canetti, R., Paneth, O., Papadopoulos, D. & Triandopoulos, N., 2014, Public-Key Cryptography, PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Springer Verlag, p. 113-130 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8383 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    38 Scopus citations
  • 2013

    On the achievability of simulation-based security for functional encryption

    De Caro, A., Iovino, V., Jain, A., O'Neill, A., Paneth, O. & Persiano, G., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 2 ed. p. 519-535 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8043 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    62 Scopus citations
  • On the impossibility of approximate obfuscation and applications to resettable cryptography

    Bitansky, N. & Paneth, O., 2013, STOC 2013 - Proceedings of the 2013 ACM Symposium on Theory of Computing. p. 241-250 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    40 Scopus citations
  • Public-coin concurrent zero-knowledge in the global hash model

    Canetti, R., Lin, H. & Paneth, O., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 80-99 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    19 Scopus citations
  • Succinct non-interactive arguments via linear interactive proofs

    Bitansky, N., Chiesa, A., Ishai, Y., Paneth, O. & Ostrovsky, R., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 315-333 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    170 Scopus citations
  • 2012

    From the impossibility of obfuscation to a new non-black-box simulation technique

    Bitansky, N. & Paneth, O., 2012, In: Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 223-232 10 p., 6375300.

    Research output: Contribution to journalConference articlepeer-review

    26 Scopus citations
  • Point obfuscation and 3-round zero-knowledge

    Bitansky, N. & Paneth, O., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 189-207 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    22 Scopus citations