Author of the publication

A "paradoxical" solution to the signature problem.

, , and . Providing Sound Foundations for Cryptography, ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verifiable Partial Key Escrow., and . IACR Cryptology ePrint Archive, (1996)How to Incentivize Data-Driven Collaboration Among Competing Parties., , and . IACR Cryptology ePrint Archive, (2015)A Note on the Impossibility of Obfuscation with Auxiliary Input., and . IACR Cryptology ePrint Archive, (2013)On the power of interaction., , and . Combinatorica, 10 (1): 3-25 (1990)Primality Testing Using Elliptic Curves., and . J. ACM, 46 (4): 450-472 (1999)A (de)constructive approach to program checking., , , , and . STOC, page 143-152. ACM, (2008)On the Limits of Non-Approximability of Lattice Problems., and . STOC, page 1-9. ACM, (1998)Bounded-Collusion IBE from Key Homomorphism., , and . TCC, volume 7194 of Lecture Notes in Computer Science, page 564-581. Springer, (2012)Secure Computation without Agreement., and . DISC, volume 2508 of Lecture Notes in Computer Science, page 17-32. Springer, (2002)Program Obfuscation and One-Time Programs.. CT-RSA, volume 4964 of Lecture Notes in Computer Science, page 333-334. Springer, (2008)