Publications
2026
Eurocrypt 2026
Eurocrypt 2026
Eurocrypt 2026
2025
Asiacrypt 2025
QCrypt 2025 Oral Presentation
QCrypt 2025 Oral Presentation
IACR Communications in Cryptology 2025
Eurocrypt 2025 · QCrypt 2024 Oral Presentation
QIP 2025 Oral Presentation
QIP 2025 Oral Presentation · QCrypt 2025 Oral Presentation
2024
TCC 2024 · TQC 2024 Oral Presentation
TCC 2024 · TQC 2025 Oral Presentation · QCrypt 2025 Oral Presentation
TCC 2024
TCC 2024 · QCrypt 2023 · IEEE Trans. on Information Theory
Asiacrypt 2024
SCN 2024 · IACR Journal of Cryptology 2025
Eurocrypt 2024
2023
Crypto 2023 · QCrypt 2023
Crypto 2023
TQC 2023
ITC 2023
2022
Eurocrypt 2022
Eurocrypt 2022
2021
Crypto 2021
Eurocrypt 2021
Eurocrypt 2021
Eurocrypt 2021
Eurocrypt 2021
Financial Cryptography 2021
2020
Guaranteed Output Delivery Comes Free in Honest-Majority MPC
Crypto 2020
Eurocrypt 2020
2019
Eurocrypt 2019
2018
STOC 2018
Eurocrypt 2018
2017
HOP: Hardware makes Obfuscation Practical
NDSS 2017
Hierarchical Functional Encryption
ITCS 2017
2016
Breaking the Three Round Barrier for Non-Malleable Commitments
FOCS 2016
Bounded-Communication Leakage Resilience via Parity-Resilient Circuits
FOCS 2016
STOC 2016
Non-Malleable Extractors and Codes, with their Many Tampered Extensions
STOC 2016
Asiacrypt 2016
Asiacrypt 2016
ICALP 2016
2015
Fast Non-Malleable Commitments
ACM CCS 2015
2014
FOCS 2014 · SICOMP 2021
STOC 2014
Eurocrypt 2014
2013
Crypto 2013 · Invited to Journal of Cryptology
Accuracy-Privacy Tradeoffs for Two-party Differentially-Private Protocols
Crypto 2013
Non-Black-Box Simulation in the Fully Concurrent Setting
STOC 2013
TCC 2013 · Asiacrypt 2013
2012
Positive Results for Concurrently Secure Computation in the Plain Model
FOCS 2012
Constructing Non-Malleable Commitments: A Black-Box Approach
FOCS 2012
Concurrently Secure Computation in Constant Rounds
Eurocrypt 2012
2011 and earlier
Stateless Cryptographic Protocols
FOCS 2011
Crypto 2011 · QIP 2011 (plenary) · SICOMP 2014
Constant Round Non-Malleable Protocols using One Way Functions
STOC 2011
Efficient Two Party and Multi Party Computation against Covert Adversaries
Eurocrypt 2008
Covert Multi-Party Computation
FOCS 2007
Reducing Trust in the PKG in Identity Based Cryptosystems
Crypto 2007
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
Test of Time Award
ACM CCS 2006 · Winner of 2016 ACM CCS Test of Time Award