Ran Canetti

Professor

Former affiliations
1990 …2025

Research activity per year

Search results

  • 2015

    Modular order-preserving encryption, revisited

    Mavroforakis, C., Chenette, N., O'Neill, A., Kollios, G. & Canetti, R., 27 May 2015, SIGMOD 2015 - Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. Association for Computing Machinery, p. 763-777 15 p. (Proceedings of the ACM SIGMOD International Conference on Management of Data; vol. 2015-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    68 Scopus citations
  • Obfuscation of probabilistic circuits and applications

    Canetti, R., Lin, H., Tessaro, S. & Vaikuntanathan, V., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, p. 468-497 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    79 Scopus citations
  • On obfuscation with random oracles

    Canetti, R., Kalai, Y. T. & Paneth, O., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, p. 456-467 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • Succinct garbling and indistinguishability obfuscation for RAM programs

    Canetti, R., Holmgren, J., Jain, A. & Vaikuntanathan, V., 14 Jun 2015, STOC 2015 - Proceedings of the 2015 ACM Symposium on Theory of Computing. Association for Computing Machinery, p. 429-437 9 p. (Proceedings of the Annual ACM Symposium on Theory of Computing; vol. 14-17-June-2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    53 Scopus citations
  • 2014

    Client-server concurrent zero knowledge with constant rounds and guaranteed complexity

    Canetti, R., Jain, A. & Paneth, O., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 337-350 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1 Scopus citations
  • Obfuscation for evasive functions

    Barak, B., Bitansky, N., Canetti, R., Kalai, Y. T., Paneth, O. & Sahai, A., 2014, Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. Springer Verlag, p. 26-51 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8349 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    39 Scopus citations
  • On strong simulation and composable point obfuscation

    Bitansky, N. & Canetti, R., Apr 2014, In: Journal of Cryptology. 27, 2, p. 317-357 41 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    17 Scopus citations
  • On the existence of extractable one-way functions

    Bitansky, N., Canetti, R., Paneth, O. & Rosen, A., 2014, STOC 2014 - Proceedings of the 2014 ACM Symposium on Theory of Computing. Association for Computing Machinery, p. 505-514 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    71 Scopus citations
  • On virtual grey box obfuscation for general circuits

    Bitansky, N., Canetti, R., Kalai, Y. T. & Paneth, O., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 108-125 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    29 Scopus citations
  • Practical UC security with a global random oracle

    Canetti, R., Jain, A. & Scafuro, A., 3 Nov 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 597-608 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    69 Scopus citations
  • Secure key exchange and sessions without credentials

    Canetti, R., Kolesnikov, V., Rackoff, C. & Vahlis, Y., 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. Abdalla, M. & de Prisco, R. (eds.). Springer Verlag, p. 40-56 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • The impossibility of obfuscation with auxiliary input or a universal simulator

    Bitansky, N., Canetti, R., Cohn, H., Goldwasser, S., Kalai, Y. T., Paneth, O. & Rosen, A., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. Springer Verlag, p. 71-89 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    37 Scopus citations
  • Verifiable set operations over outsourced databases

    Canetti, R., Paneth, O., Papadopoulos, D. & Triandopoulos, N., 2014, Public-Key Cryptography, PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Springer Verlag, p. 113-130 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8383 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    39 Scopus citations
  • 2013

    From unprovability to environmentally friendly protocols

    Canetti, R., Lin, H. & Pass, R., 2013, Proceedings - 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, FOCS 2013. p. 70-79 10 p. 6686142. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Public-coin concurrent zero-knowledge in the global hash model

    Canetti, R., Lin, H. & Paneth, O., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 80-99 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    20 Scopus citations
  • Recursive composition and bootstrapping for SNARKs and proof-carrying data

    Bitansky, N., Canetti, R., Chiesa, A. & Tromer, E., 2013, STOC 2013 - Proceedings of the 2013 ACM Symposium on Theory of Computing. p. 111-120 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    198 Scopus citations
  • Refereed delegation of computation

    Canetti, R., Riva, B. & Rothblum, G. N., 1 May 2013, In: Information and Computation. 226, p. 16-36 21 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    24 Scopus citations
  • Security and composition of cryptographic protocols: A tutorial

    Canetti, R., 2013, Secure Multi-Party Computation. IOS Press, p. 61-119 59 p. (Cryptology and Information Security Series; vol. 10).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    4 Scopus citations
  • 2012

    Efficient password authenticated key exchange via oblivious transfer

    Canetti, R., Dachman-Soled, D., Vaikuntanathan, V. & Wee, H., 2012, Public Key Cryptography, PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. p. 449-466 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7293 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    28 Scopus citations
  • From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again

    Bitansky, N., Canetti, R., Chiesa, A. & Tromer, E., 2012, ITCS 2012 - Innovations in Theoretical Computer Science Conference. p. 326-349 24 p. (ITCS 2012 - Innovations in Theoretical Computer Science Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    344 Scopus citations
  • Leakage-tolerant interactive protocols

    Bitansky, N., Canetti, R. & Halevi, S., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 266-284 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    48 Scopus citations
  • 7 Scopus citations
  • Two protocols for delegation of computation

    Canetti, R., Riva, B. & Rothblum, G. N., 2012, Information Theoretic Security - 6th International Conference, ICITS 2012, Proceedings. p. 37-61 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7412 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    34 Scopus citations
  • Universally composable security with local adversaries

    Canetti, R. & Vald, M., 2012, Security and Cryptography for Networks - 8th International Conference, SCN 2012, Proceedings. p. 281-301 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7485 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    20 Scopus citations
  • 2011

    Composable security analysis of OS services

    Canetti, R., Chari, S., Halevi, S., Pfitzmann, B., Roy, A., Steiner, M. & Venema, W., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Proceedings. p. 431-448 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6715 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Practical delegation of computation using multiple servers

    Ran, C., Ben, R. & Rothblum, G. N., 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 445-454 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    105 Scopus citations
  • Program obfuscation with leaky hardware

    Bitansky, N., Canetti, R., Goldwasser, S., Halevi, S., Kalai, Y. T. & Rothblum, G. N., 2011, Advances in Cryptology, ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 722-739 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7073 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    29 Scopus citations
  • Secure computation without authentication

    Barak, B., Canetti, R., Lindell, Y., Pass, R. & Rabin, T., Oct 2011, In: Journal of Cryptology. 24, 4, p. 720-760 41 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    16 Scopus citations
  • Towards a game theoretic view of secure computation

    Asharov, G., Canetti, R. & Hazay, C., 2011, Advances in Cryptology - EUROCRYPT 2011, 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 426-445 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6632 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    65 Scopus citations
  • Universally composable symbolic security analysis

    Canetti, R. & Herzog, J., Jan 2011, In: Journal of Cryptology. 24, 1, p. 83-147 65 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    18 Scopus citations
  • 2010

    Adaptive hardness and composable security in the plain model from standard assumptions

    Canetti, R., Lin, H. & Pass, R., 2010, Proceedings - 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010. IEEE Computer Society, p. 541-550 10 p. 5671303. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    68 Scopus citations
  • Obfuscation of hyperplane membership

    Canetti, R., Rothblum, G. N. & Varia, M., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. Springer Verlag, p. 72-89 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    64 Scopus citations
  • On strong simulation and composable point obfuscation

    Bitansky, N. & Canetti, R., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. Springer Verlag, p. 520-537 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    66 Scopus citations
  • On symmetric encryption and point obfuscation

    Canetti, R., Tauman Kalai, Y., Varia, M. & Wichs, D., 2010, Theory of Cryptography - 7th Theory of Cryptography Conference, TCC 2010, Proceedings. Springer Verlag, p. 52-71 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5978 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    57 Scopus citations
  • 2009

    Non-malleable Obfuscation

    Canetti, R. & Varia, M., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 73-90 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    24 Scopus citations
  • Towards a theory of extractable functions

    Canetti, R. & Dakdouk, R. R., 2009, Theory of Cryptography - 6th Theory of Cryptography Conference, TCC 2009, Proceedings. p. 595-613 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Scopus citations
  • 2008

    08491 Executive Summary Theoretical Foundations of Practical Information Security

    Canetti, R., Goldwasser, S., Müller, G. & Steinwandt, R., 2008, In: Dagstuhl Seminar Proceedings. 8491

    Research output: Contribution to journalConference articlepeer-review

  • Analyzing security protocols using time-bounded task-PIOAs

    Canetti, R., Cheung, L., Kaynar, D., Liskov, M., Lynch, N., Pereira, O. & Segala, R., Mar 2008, In: Discrete Event Dynamic Systems: Theory and Applications. 18, 1, p. 111-159 49 p.

    Research output: Contribution to journalArticlepeer-review

    30 Scopus citations
  • Composable formal security analysis: Juggling soundness, simplicity and efficiency

    Canetti, R., 2008, Automata, Languages and Programming - 35th International Colloquium, ICALP 2008, Proceedings. PART 2 ed. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5126 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Extractable perfectly one-way functions

    Canetti, R. & Dakdouk, R. R., 2008, Automata, Languages and Programming - 35th International Colloquium, ICALP 2008, Proceedings. PART 2 ed. p. 449-460 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5126 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    36 Scopus citations
  • How to protect yourself without perfect shredding

    Canetti, R., Eiger, D., Goldwasser, S. & Lim, D. Y., 2008, Automata, Languages and Programming - 35th International Colloquium, ICALP 2008, Proceedings. PART 2 ed. p. 511-523 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5126 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Modeling computational security in long-lived systems

    Canetti, R., Cheung, L., Kaynar, D., Lynch, N. & Pereira, O., 2008, CONCUR 2008 - Concurrency Theory - 19th International Conference, CONCUR 2008, Proceedings. p. 114-130 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5201 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Modeling Computational Security in Long-Lived Systems, Version 2

    Canetti, R., Cheung, L., Kaynar, D., Lynch, N. & Pereira, O., 2008, In: Dagstuhl Seminar Proceedings. 8491

    Research output: Contribution to journalConference articlepeer-review

  • Obfuscating point functions with multibit output

    Canetti, R. & Dakdouk, R. R., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 489-508 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    92 Scopus citations
  • POSH: A generalized CAPTCHA with security applications

    Daher, W. & Canetti, R., 2008, Proceedings of the 1st ACM Workshop on AISec, AISec'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08. p. 1-10 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2007

    A forward-secure public-key encryption scheme

    Canetti, R., Halevi, S. & Katz, J., Jul 2007, In: Journal of Cryptology. 20, 3, p. 265-294 30 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    112 Scopus citations
  • Amplifying collision resistance: A complexity-theoretic treatment

    Canetti, R., Rivest, R., Sudan, M., Trevisan, L., Vadhan, S. & Wee, H., 2007, Advances in Cryptology - CRYPTO 2007 - 27th Annual International Cryptology Conference, Proceedings. Springer Verlag, p. 264-283 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4622 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    24 Scopus citations
  • Chosen-ciphertext secure proxy re-encryption

    Canetti, R. & Hohenberger, S., 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 185-194 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    491 Scopus citations
  • Compositional security for task-PIOAs

    Canetti, R., Cheung, L., Kaynar, D., Lynch, N. & Pereira, O., 2007, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20. p. 125-139 15 p. 4271645. (Proceedings - IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    10 Scopus citations
  • Cryptography from sunspots: How to use an imperfect reference string

    Canetti, R., Pass, R. & Shelat, A., 2007, Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2007. p. 249-259 11 p. 4389497. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    44 Scopus citations