Ran Canetti

Professor

Former affiliations
1990 …2025

Research activity per year

Search results

  • 2007

    Obtaining universally compoable security: Towards the bare bones of trust

    Canetti, R., 2007, Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 88-112 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4833 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    23 Scopus citations
  • Universally composable security with global setup

    Canetti, R., Dodis, Y., Pass, R. & Walfish, S., 2007, Theory of Cryptography - 4th Theory of Cryptography Conference, TCC 2007, Proceedings. Springer Verlag, p. 61-85 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4392 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    213 Scopus citations
  • 2006

    Chosen-ciphertext security from identity-based encryption

    Boneht, D., Canetti, R., Halevi, S. & Katz, J., 2006, In: SIAM Journal on Computing. 36, 5, p. 1301-1328 28 p.

    Research output: Contribution to journalArticlepeer-review

    248 Scopus citations
  • Mitigating dictionary attacks on password-protected local storage

    Canetti, R., Halevi, S. & Steiner, M., 2006, Advances in Cryptology - CRYPTO 2006 - 26th Annual International Cryptology Conference, Proceedings. Springer Verlag, p. 160-179 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4117 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    24 Scopus citations
  • On the limitations of universally composable two-party computation without set-up assumptions

    Canetti, R., Kushilevitz, E. & Lindell, Y., Apr 2006, In: Journal of Cryptology. 19, 2, p. 135-167 33 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    59 Scopus citations
  • Secure computation without authentication

    Barak, B., Canetti, R., Lindell, Y., Pass, R. & Rabin, T., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 361-377 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    58 Scopus citations
  • Securing communication of dynamic groups in dynamic network-centric environments

    Khazan, R. I., Figueiredo, R. A., Canetti, R., Mclain, C. D. & Cunningham, R. K., 2006, Military Communications Conference 2006, MILCOM 2006. Institute of Electrical and Electronics Engineers Inc., 4086716. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Task-structured probabilistic I/O automata

    Canetti, R., Cheung, L., Kaynar, D., Liskov, M., Lynch, N., Pereira, O. & Segala, R., 2006, Proceedings - Eighth International Workshop on Discrete Event Systems, WODES 2006. p. 207-214 8 p. 1678432. (Proceedings - Eighth International Workshop on Discrete Event Systems, WODES 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    25 Scopus citations
  • Time-bounded task-PIQAs: A framework for analyzing security protocols

    Canetti, R., Cheung, L., Kaynar, D., Liskov, M., Lynch, N., Pereira, O. & Segala, R., 2006, Distributed Computing - 20th International Symposium, DISC 2006, Proceedings. Springer Verlag, p. 238-253 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4167 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    33 Scopus citations
  • Universally composable symbolic analysis of mutual authentication and key-exchange protocols

    Canetti, R. & Herzog, J., 2006, Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Proceedings. p. 380-403 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3876 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    83 Scopus citations
  • 2005

    Adaptively-secure, non-interactive public-key encryption

    Canetti, R., Halevi, S. & Katz, J., 2005, In: Lecture Notes in Computer Science. 3378, p. 150-168 19 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    44 Scopus citations
  • Hardness amplification of weakly verifiable puzzles

    Canetti, R., Halevi, S. & Steiner, M., 2005, In: Lecture Notes in Computer Science. 3378, p. 17-33 17 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    49 Scopus citations
  • Journal of Cryptology: Preface

    Canetti, R., Jul 2005, In: Journal of Cryptology. 18, 3, p. 187-189 3 p.

    Research output: Contribution to journalEditorial

    Open Access
  • Universally composable password-based key exchange

    Canetti, R., Halevi, S., Katz, J., Lindell, Y. & MacKenzie, P., 2005, In: Lecture Notes in Computer Science. 3494, p. 404-421 18 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    185 Scopus citations
  • 2004

    Adaptive versus non-adaptive security of multi-party protocols

    Canetti, R., Damgård, I., Dziembowski, S., Ishai, Y. & Malkin, T., Jun 2004, In: Journal of Cryptology. 17, 3, p. 153-207 55 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    30 Scopus citations
  • Chosen-ciphertext security from identity-based encryption

    Canetti, R., Halevi, S. & Katz, J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cachin, C. & Camenisch, J. (eds.). Springer Verlag, p. 207-222 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3027).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    690 Scopus citations
  • Just fast keying: Key agreement in a hostile internet

    Aiello, W., Bellovin, S. M., Blaze, M., Canetti, R., Ioannidis, J., Keromytis, A. D. & Reingold, O., May 2004, In: ACM Transactions on Information and System Security. 7, 2, p. 242-273 32 p.

    Research output: Contribution to journalReview articlepeer-review

    84 Scopus citations
  • On the random-oracle methodology as applied to length-restricted signature schemes

    Canetti, R., Goldreich, O. & Halevi, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Naor, M. (ed.). Springer Verlag, p. 40-57 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2951).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    42 Scopus citations
  • The random oracle methodology, revisited

    Canetti, R., Goldreich, O. & Halevi, S., Jul 2004, In: Journal of the ACM. 51, 4, p. 557-594 38 p.

    Research output: Contribution to journalArticlepeer-review

    686 Scopus citations
  • Universally composable protocols with relaxed set-up assumptions

    Barak, B., Canetti, R., Nielsen, J. B. & Pass, R., 2004, In: Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 186-195 10 p.

    Research output: Contribution to journalConference articlepeer-review

    150 Scopus citations
  • Universally composable signature, certification, and authentication

    Canetti, R., 2004, In: Proceedings of the Computer Security Foundations Workshop. 17, p. 219-233 15 p.

    Research output: Contribution to journalConference articlepeer-review

    167 Scopus citations
  • 2003

    A forward-secure public-key encryption scheme

    Canetti, R., Halevi, S. & Katz, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Biham, E. (ed.). Springer Verlag, p. 255-271 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2656).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    610 Scopus citations
  • A two layered approach for securing an object store network

    Azagury, A., Canetti, R., Factor, M., Halevi, S., Henis, E., Naor, D., Rinetzky, N., Rodeh, O. & Satran, J., 2003, Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002. Institute of Electrical and Electronics Engineers Inc., p. 10-23 14 p. 1183506. (Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    25 Scopus citations
  • Authenticating mandatory access controls and preserving privacy for a high-assurance smart card

    Scherzer, H., Canetti, R., Karger, P. A., Krawczyk, H., Rabin, T. & Toll, D. C., 2003, Computer Security - ESORICS 2003. Snekkenes, E. & Gollmann, D. (eds.). Springer Verlag, p. 181-200 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2808).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds

    Canetti, R., Kilian, J., Petrank, E. & Rosen, A., Jan 2003, In: SIAM Journal on Computing. 32, 1, p. 1-47 47 p.

    Research output: Contribution to journalArticlepeer-review

    37 Scopus citations
  • Environmental requirements for authentication protocols

    Canetti, R., Meadows, C. & Syverson, P., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Okada, M., Pierce, B. C., Scedrov, A., Tokuda, H. & Yonezawa, A. (eds.). Springer Verlag, p. 339-355 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2609).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    15 Scopus citations
  • On the limitations of universally composable two-party computation without set-up assumptions

    Canetti, R., Kushilevitz, E. & Lindell, Y., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Biham, E. (ed.). Springer Verlag, p. 68-86 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2656).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    95 Scopus citations
  • Relaxing chosen-ciphertext security

    Canetti, R., Krawczyk, H. & Nielsen, J. B., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boneh, D. (ed.). Springer Verlag, p. 565-582 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2729).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    215 Scopus citations
  • Universal composition with joint state

    Canetti, R. & Rabin, T., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boneh, D. (ed.). Springer Verlag, p. 265-281 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2729).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    Open Access
    141 Scopus citations
  • 2002

    Efficient, dos-resistant, secure key exchange for internet protocols

    Aiello, W., Bellovin, S. M., Blaze, M., Canetti, R., Ioannidis, J., Keromytis, A. D. & Reingold, O., 2002, Security Protocols - 9th International Workshop, Revised Papers. Roe, M., Christianson, B., Malcolm, J. A. & Crispo, B. (eds.). Springer Verlag, p. 27-39 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2467).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Efficient, DoS-resistant, secure key exchange for internet protocols

    Aiello, W., Bellovin, S. M., Blaze, M., Canetti, R., Ioannidis, J., Keromytis, A. D. & Reingold, O., 2002, In: Proceedings of the ACM Conference on Computer and Communications Security. p. 48-58 11 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    78 Scopus citations
  • Security analysis of IKE’s signature-based key-exchange protocol

    Canetti, R. & Krawczyk, H., 2002, Advances in Cryptology - CRYPTO 2002 - 22nd Annual International Cryptology Conference, Proceedings. Yung, M. (ed.). Springer Verlag, p. 143-161 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2442).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    124 Scopus citations
  • Universally composable notions of key exchange and secure channels

    Canetti, R. & Krawczyk, H., 2002, Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings. Knudsen, L. R. (ed.). Springer Verlag, p. 337-351 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    567 Scopus citations
  • Universally composable two-party and multi-party secure computation

    Canetti, R., Lindell, Y., Ostrovsky, R. & Sahai, A., 2002, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 494-503 10 p.

    Research output: Contribution to journalConference articlepeer-review

    510 Scopus citations
  • 2001

    Analysis of Key-Exchange protocols and their use for building secure channels

    Canetti, R. & Krawczyk, H., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Pfitzmann, B. (ed.). Springer Verlag, p. 453-474 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    1283 Scopus citations
  • Black-box concurrent zero-knowledge requires Ω̃(log n) Rounds

    Canetti, R., Kilian, J., Petrank, E. & Rosen, A., 2001, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 570-579 10 p.

    Research output: Contribution to journalConference articlepeer-review

    96 Scopus citations
  • Efficient and Secure Source Authentication for Multicast

    Perrig, A., Canetti, R., Song, D. & Tygar, J. D., 2001, Proceedings of the Symposium on Network and Distributed System Security, NDSS 2001. The Internet Society, (Proceedings of the Symposium on Network and Distributed System Security, NDSS 2001).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    468 Scopus citations
  • On adaptive vs. Non-adaptive security of multiparty protocols

    Canetti, R., Damgaard, I., Dziembowski, S., Ishai, Y. & Malkin, T., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Pfitzmann, B. (ed.). Springer Verlag, p. 262-279 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • Relating cryptography and cryptographic protocols: A panel

    Scedrov, A., Canetti, R., Guttman, J., Wagner, D. & Waidner, M., 2001, In: Proceedings of the Computer Security Foundations Workshop. p. 111 1 p.

    Research output: Contribution to journalConference articlepeer-review

    1 Scopus citations
  • Selective private function evaluation with applications to private statistics

    Canetti, R., Ishai, Y., Kumar, R., Reiter, M. K., Rubinfeld, R. & Wright, R. N., 2001, p. 293-302. 10 p.

    Research output: Contribution to conferencePaperpeer-review

    61 Scopus citations
  • Universally composable commitments

    Canetti, R. & Fischlin, M., 2001, Advances in Cryptology, CRYPTO 2001 - 21st Annual International Cryptology Conference, Proceedings. Kilian, J. (ed.). Springer Verlag, p. 19-40 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2139 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    385 Scopus citations
  • Universally composable security: A new paradigm for cryptographic protocols

    Canetti, R., 2001, In: Annual Symposium on Foundations of Computer Science - Proceedings. p. 136-145 10 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    2146 Scopus citations
  • 2000

    An IPSec-based Host Architecture for Secure Internet Multicast

    Canetti, R., Cheng, P. C., Giraud, F., Pendarakis, D., Rao, J. R., Rohatgi, P. & Saha, D., 2000, Proceedings of the Symposium on Network and Distributed System Security, NDSS 2000. The Internet Society, (Proceedings of the Symposium on Network and Distributed System Security, NDSS 2000).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Efficient authentication and signing of multicast streams over lossy channels

    Perrig, A., Canetti, R., Tygar, J. D. & Song, D., 2000, In: Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. p. 56-73 18 p.

    Research output: Contribution to journalArticlepeer-review

    782 Scopus citations
  • Exposure-resilient functions and all-or-nothing transforms

    Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E. & Sahai, A., 2000, Advances in Cryptology - EUROCRYPT 2000 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Preneel, B. (ed.). Springer Verlag, p. 453-469 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1807).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    123 Scopus citations
  • Maintaining authenticated communication in the presence of break-ins

    Canetti, R., Halevi, S. & Herzberg, A., 2000, In: Journal of Cryptology. 13, 1, p. 61-105 45 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    23 Scopus citations
  • On the statistical properties of Diffie-Hellman distributions

    Canetti, R., Friedlander, J., Konyagin, S., Larsen, M., Lieman, D. & Shparlinski, I., 2000, In: Israel Journal of Mathematics. 120, p. 23-46 24 p.

    Research output: Contribution to journalArticlepeer-review

    48 Scopus citations
  • Randomness versus fault-tolerance

    Canetti, R., Kushilevitz, E., Ostrovsky, R. & Rosén, A., 2000, In: Journal of Cryptology. 13, 1, p. 107-142 36 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    12 Scopus citations
  • Resettable zero-knowledge (extended abstract)

    Canetti, R., Goldreich, O., Goldwasser, S. & Micali, S., 2000, Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000. p. 235-244 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    193 Scopus citations
  • Security and composition of multiparty cryptographic protocols

    Canetti, R., 2000, In: Journal of Cryptology. 13, 1, p. 143-202 60 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    943 Scopus citations