×
Compute Distance To:
Author ID: canetti.ran Recent zbMATH articles by "Canetti, Ran"
Published as: Canetti, Ran
all top 5

Co-Authors

6 single-authored
16 Halevi, Shai
14 Bitansky, Nir
12 Paneth, Omer
8 Goldreich, Oded
7 Goldwasser, Shafi
7 Krawczyk, Hugo
7 Lindell, Yehuda
7 Poburinnaya, Oxana
7 Tauman Kalai, Yael
6 Holmgren, Justin
6 Katz, Jonathan N.
5 Chen, Yilei
5 Lin, Huijia
5 Ostrovsky, Rafail
5 Pass, Rafael
5 Rabin, Tal
5 Rosen, Alon
5 Rothblum, Guy N.
5 Vaikuntanathan, Vinod
4 Cheung, Ling
4 Jain, Abhishek
4 Kaynar, Dilsun Kırlı
4 Kushilevitz, Eyal
4 Lynch, Nancy Ann
4 Malkin, Tal G.
4 Pereira, Olivier
4 Reyzin, Leonid
4 Tromer, Eran
3 Barak, Boaz
3 Chiesa, Alessandro
3 Dakdouk, Ronny Ramzi
3 Herzberg, Amir
3 Ishai, Yuval
3 Liskov, Moses D.
3 Reingold, Omer
3 Segala, Roberto
3 Varia, Mayank
3 Venkitasubramaniam, Muthuramakrishnan
2 Aiello, William A.
2 Asharov, Gilad
2 Bar-Noy, Amotz
2 Bellare, Mihir
2 Bellovin, Steven M.
2 Blaze, Matthew
2 Damgård, Ivan Bjerre
2 Dodis, Yevgeniy
2 Dziembowski, Stefan
2 Friedlander, John Benjamin
2 Fuller, Benjamin
2 Garay, Juan A.
2 Hazay, Carmit
2 Herzog, Jonathan C.
2 Ioannidis, John P. A.
2 Irani, Sandy
2 Keromytis, Angelos D.
2 Kilian, Joe
2 Kutten, Shay
2 Mansour, Yishay
2 Naor, Moni
2 Petrank, Erez
2 Raykova, Mariana
2 Richelson, Silas
2 Riva, Ben
2 Rosén, Adi
2 Rothblum, Ron D.
2 Sahai, Amit
2 Schieber, Baruch
2 Shparlinski, Igor E.
2 Steiner, Michael
2 Vald, Margarita
2 Wee, Hoeteck
2 Wichs, Daniel
1 Almashaqbeh, Ghada
1 Badertscher, Christian
1 Badimtsi, Foteini
1 Ben-Or, Michael
1 Boneh, Dan
1 Chakraborty, Suvradip
1 Cohen, Asaf
1 Cohn, Henry Lee
1 Dachman-Soled, Dana
1 Dwork, Cynthia
1 Eiger, Dror
1 Erlich, Yaniv
1 Even, Guy
1 Feige, Uriel
1 Fischlin, Marc
1 Garg, Sanjam
1 Gennaro, Rosario
1 Gershoni, Jonathan
1 Goyal, Vipul
1 Hesse, Julia
1 Jarecki, Stanisław
1 Khurana, Dakshita
1 Kolesnikov, Vladimir
1 Konyagin, Sergeĭ Vladimirovich
1 Kumar, Nishant
1 Larsen, Michael Jeffrey
1 Lichtenberg, Amit
1 Lieman, Daniel B.
...and 34 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

125 Publications have been cited 2,194 times in 1,252 Documents Cited by Year
Security and composition of multiparty cryptographic protocols. Zbl 0957.68040
Canetti, Ran
110
2000
Chosen-ciphertext security from identity-based encryption. Zbl 1122.94358
Canetti, Ran; Halevi, Shai; Katz, Jonathan
107
2004
The random oracle methodology, revisited. Zbl 1204.94063
Canetti, Ran; Goldreich, Oded; Halevi, Shai
104
2004
Universally composable two-party and multi-party secure computation. Zbl 1192.94112
Canetti, Ran; Lindell, Yehuda; Ostrovsky, Rafail; Sahai, Amit
100
2002
Analysis of key-exchange protocols and their use for building secure channels. Zbl 0981.94032
Canetti, Ran; Krawczyk, Hugo
93
2001
The random oracle methodology, revisited. Zbl 1027.68603
Canetti, Ran; Goldreich, Oded; Halevi, Shai
74
1998
A forward-secure public-key encryption scheme. Zbl 1037.68532
Canetti, Ran; Halevi, Shai; Katz, Jonathan
71
2003
Keying hash functions for message authentication. Zbl 1329.94051
Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo
69
1996
Universally composable commitments (extended abstract). Zbl 1002.94528
Canetti, Ran; Fischlin, Marc
68
2001
Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010
Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan
56
2006
Adaptively secure multi-party computation. Zbl 0922.68048
Canetti, Ran; Feige, Uri; Goldreich, Oded; Naor, Moni
52
1996
Universally composable security with global setup. Zbl 1129.94014
Canetti, Ran; Dodis, Yevgeniy; Pass, Rafael; Walfish, Shabsi
46
2007
Towards realizing random oracles: hash functions that hide all partial information. Zbl 0884.68048
Canetti, Ran
43
1997
A modular approach to the design and analysis of authentication and key exchange protocols. Zbl 1028.68015
Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo
42
1998
Relaxing chosen-ciphertext security. Zbl 1122.94359
Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper B.
39
2003
Resettable zero-knowledge (extended abstract). Zbl 1296.94093
Canetti, Ran; Goldreich, Oded; Goldwasser, Shafi; Micali, Silvio
38
2000
Obfuscation of probabilistic circuits and applications. Zbl 1382.94078
Canetti, Ran; Lin, Huijia; Tessaro, Stefano; Vaikuntanathan, Vinod
37
2015
Universal composition with joint state. Zbl 1122.94360
Canetti, Ran; Rabin, Tal
31
2003
Universally composable notions of key exchange and secure channels. Extended Abstract. Zbl 1056.94511
Canetti, Ran; Krawczyk, Hugo
30
2002
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. Zbl 1347.68129
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Tromer, Eran
28
2012
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. Zbl 0948.94008
Canetti, Ran; Goldwasser, Shafi
28
1999
Recursive composition and bootstrapping for SNARKs and proof-carrying data. Zbl 1293.68264
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Tromer, Eran
26
2013
Deniable encryption. Zbl 0882.94019
Canetti, Ran; Dwork, Cynthia; Naor, Moni; Ostrovsky, Rafail
24
1997
Perfectly one-way probabilistic hash functions. (Preliminary version). Zbl 1029.68536
Canetti, Ran; Micciancio, Daniele; Reingold, Omer
24
1998
On the statistical properties of Diffie-Hellman distributions. Zbl 0997.11066
Canetti, Ran; Friedlander, John; Konyagin, Sergei; Larsen, Michael; Lieman, Daniel; Shparlinski, Igor
23
2000
Fiat-Shamir: from practice to theory. Zbl 1434.94060
Canetti, Ran; Chen, Yilei; Holmgren, Justin; Lombardi, Alex; Rothblum, Guy N.; Rothblum, Ron D.; Wichs, Daniel
23
2019
Universally composable password-based key exchange. Zbl 1137.94367
Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil
22
2005
Succinct garbling and indistinguishability obfuscation for RAM programs. Zbl 1321.94050
Canetti, Ran; Holmgren, Justin; Jain, Abhishek; Vaikuntanathan, Vinod
21
2015
Adaptive security for threshold cryptosystems. Zbl 0972.94031
Canetti, Ran; Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal
20
1999
On the existence of extractable one-way functions. Zbl 1315.94059
Bitansky, Nir; Canetti, Ran; Paneth, Omer; Rosen, Alon
20
2014
Leakage-tolerant interactive protocols. Zbl 1296.94088
Bitansky, Nir; Canetti, Ran; Halevi, Shai
19
2012
Adaptive hardness and composable security in the plain model from standard assumptions. Zbl 1406.94033
Canetti, Ran; Lin, Huijia; Pass, Rafael
18
2016
Bounding the power of preemption in randomized scheduling. Zbl 0907.68007
Canetti, Ran; Irani, Sandy
18
1998
Black-box concurrent zero-knowledge requires \(\tilde{\omega}(\log n)\) rounds. Zbl 1317.68064
Canetti, Ran; Kilian, Joe; Petrank, Erez; Rosen, Alon
18
2001
Universally composable symbolic analysis of mutual authentication and key-exchange protocols. Zbl 1112.94025
Canetti, Ran; Herzog, Jonathan
17
2006
Obfuscating point functions with multibit output. Zbl 1149.94306
Canetti, Ran; Dakdouk, Ronny Ramzi
17
2008
Asynchronous secure computation. Zbl 1310.68044
Ben-Or, Michael; Canetti, Ran; Goldreich, Oded
16
1993
Hardness amplification of weakly verifiable puzzles. Zbl 1079.94538
Canetti, Ran; Halevi, Shai; Steiner, Michael
16
2005
Constraint-hiding constrained PRFs for \(\text{NC}^1\) from LWE. Zbl 1410.94055
Canetti, Ran; Chen, Yilei
16
2017
Security analysis of IKE’s signature-based key-exchange protocol. Zbl 1026.94524
Canetti, Ran; Krawczyk, Hugo
15
2002
On the limitations of universally composable two-party computation without set-up assumptions. Zbl 1038.94523
Canetti, Ran; Kushilevitz, Eyal; Lindell, Yehuda
15
2003
Lower bounds for sampling algorithms for estimating the average. Zbl 0875.68529
Canetti, Ran; Even, Guy; Goldreich, Oded
15
1995
A forward-secure public-key encryption scheme. Zbl 1121.68044
Canetti, Ran; Halevi, Shai; Katz, Jonathan
15
2007
Adaptively-secure, non-interactive public-key encryption. Zbl 1079.94537
Canetti, Ran; Halevi, Shai; Katz, Jonathan
15
2005
On virtual grey box obfuscation for general circuits. Zbl 1296.94089
Bitansky, Nir; Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer
15
2014
More on BPP and the polynomial-time hierarchy. Zbl 0875.68425
Canetti, Ran
14
1996
A simpler variant of universally composable security for standard multiparty computation. Zbl 1351.94031
Canetti, Ran; Cohen, Asaf; Lindell, Yehuda
14
2015
The impossibility of obfuscation with auxiliary input or a universal simulator. Zbl 1296.94087
Bitansky, Nir; Canetti, Ran; Cohn, Henry; Goldwasser, Shafi; Kalai, Yael Tauman; Paneth, Omer; Rosen, Alon
14
2014
Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508
Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai
14
2000
On the limitations of universally composable two-party computation without set-up assumptions. Zbl 1101.68549
Canetti, Ran; Kushilevitz, Eyal; Lindell, Yehuda
14
2006
Adaptively secure two-party computation from indistinguishability obfuscation. Zbl 1382.94077
Canetti, Ran; Goldwasser, Shafi; Poburinnaya, Oxana
14
2015
The hunting of the SNARK. Zbl 1386.94066
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran
14
2017
Fast asynchronous Byzantine agreement with optimal resilience. Zbl 1310.68038
Canetti, Ran; Rabin, Tal
13
1993
On symmetric encryption and point obfuscation. Zbl 1274.94048
Canetti, Ran; Tauman Kalai, Yael; Varia, Mayank; Wichs, Daniel
13
2010
On strong simulation and composable point obfuscation. Zbl 1283.94052
Bitansky, Nir; Canetti, Ran
13
2010
Analyzing security protocols using time-bounded task-PIOAs. Zbl 1161.93320
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; Pereira, Olivier; Segala, Roberto
13
2008
Secure computation without authentication. Zbl 1145.94457
Barak, Boaz; Canetti, Ran; Lindell, Yehuda; Pass, Rafael; Rabin, Tal
13
2005
Time-Bounded Task-PIOAs: A framework for analyzing security protocols. Zbl 1155.68326
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; Pereira, Olivier; Segala, Roberto
13
2007
Fiat-Shamir and correlation intractability from strong KDM-secure encryption. Zbl 1423.94058
Canetti, Ran; Chen, Yilei; Reyzin, Leonid; Rothblum, Ron D.
12
2018
Fully succinct garbled RAM. Zbl 1334.68064
Canetti, Ran; Holmgren, Justin
12
2016
Obfuscation of hyperplane membership. Zbl 1274.94047
Canetti, Ran; Rothblum, Guy N.; Varia, Mayank
11
2010
Extractable perfectly one-way functions. Zbl 1155.94364
Canetti, Ran; Dakdouk, Ronny Ramzi
11
2008
Efficient communication-storage tradeoffs for multicast encryption. Zbl 0937.68043
Canetti, Ran; Malkin, Tal; Nissim, Kobbi
11
1999
On obfuscation with random oracles. Zbl 1355.94049
Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer
10
2015
Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds. Zbl 1037.94004
Canetti, Ran; Kilian, Joe; Petrank, Erez; Rosen, Alon
8
2002
Adaptive succinct garbled RAM or: how to delegate your database. Zbl 1397.94052
Canetti, Ran; Chen, Yilei; Holmgren, Justin; Raykova, Mariana
8
2016
On the correlation intractability of obfuscated pseudorandom functions. Zbl 1388.94038
Canetti, Ran; Chen, Yilei; Reyzin, Leonid
8
2016
Towards a game theoretic view of secure computation. Zbl 1290.94143
Asharov, Gilad; Canetti, Ran; Hazay, Carmit
8
2011
Non-malleable obfuscation. Zbl 1213.68203
Canetti, Ran; Varia, Mayank
8
2009
Towards a theory of extractable functions. Zbl 1213.94089
Canetti, Ran; Dakdouk, Ronny Ramzi
8
2009
Obfuscation for evasive functions. Zbl 1296.94077
Barak, Boaz; Bitansky, Nir; Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer; Sahai, Amit
8
2014
Reusable fuzzy extractors for low-entropy distributions. Zbl 1347.94022
Canetti, Ran; Fuller, Benjamin; Paneth, Omer; Reyzin, Leonid; Smith, Adam
7
2016
Public-coin concurrent zero-knowledge in the global hash model. Zbl 1296.94096
Canetti, Ran; Lin, Huijia; Paneth, Omer
7
2013
Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Zbl 1270.94007
7
2013
Mitigating dictionary attacks on password-protected local storage. Zbl 1161.94436
Canetti, Ran; Halevi, Shai; Steiner, Michael
7
2006
Obtaining universally compoable security: Towards the bare bones of trust. Zbl 1153.94358
Canetti, Ran
7
2007
Adaptive versus non-adaptive security of multi-party protocols. Zbl 1091.94020
Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal
6
2004
On certain exponential sums and the distribution of Diffie-Hellman triples. Zbl 0935.11028
Canetti, Ran; Friedlander, John; Shparlinski, Igor
6
1999
Just Fast Keying: key agreement in a hostile internet. Zbl 1291.94041
Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer
6
2004
On the random-oracle methodology as applied to length-restricted signature schemes. Zbl 1197.94215
Canetti, Ran; Goldreich, Oded; Halevi, Shai
6
2004
Certifying trapdoor permutations, revisited. Zbl 1443.94049
Canetti, Ran; Lichtenberg, Amit
6
2018
Maintaining security in the presence of transient faults. Zbl 0939.94536
Canetti, Ran; Herzberg, Amir
5
1994
Amplifying collision resistance: a complexity-theoretic treatment. Zbl 1215.94036
Canetti, Ran; Rivest, Ron; Sudan, Madhu; Trevisan, Luca; Vadhan, Salil; Wee, Hoeteck
5
2007
Towards doubly efficient private information retrieval. Zbl 1416.68063
Canetti, Ran; Holmgren, Justin; Richelson, Silas
5
2017
Bounds on tradeoffs between randomness and communication complexity. Zbl 0783.68053
Canetti, Ran; Goldreich, Oded
4
1993
Bandwidth allocation with preemption. Zbl 0928.68008
Bar-Noy, Amotz; Canetti, Ran; Kutten, Shay; Mansour, Yishay; Schieber, Baruch
4
1999
Two protocols for delegation of computation. Zbl 1295.94030
Canetti, Ran; Riva, Ben; Rothblum, Guy N.
4
2012
Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Zbl 1270.94006
4
2013
On strong simulation and composable point obfuscation. Zbl 1296.94086
Bitansky, Nir; Canetti, Ran
4
2014
How to protect yourself without perfect shredding. Zbl 1155.68383
Canetti, Ran; Eiger, Dror; Goldwasser, Shafi; Lim, Dah-Yoh
4
2008
Bounding the power of preemption in randomized scheduling. Zbl 0978.68502
Canetti, Ran; Irani, Sandy
4
1995
Chosen-ciphertext secure fully homomorphic encryption. Zbl 1400.94131
Canetti, Ran; Raghuraman, Srinivasan; Richelson, Silas; Vaikuntanathan, Vinod
4
2017
Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model. Zbl 1369.68206
Canetti, Ran; Poburinnaya, Oxana; Venkitasubramaniam, Muthuramakrishnan
4
2017
Universally composable authentication and key-exchange with global PKI. Zbl 1395.94271
Canetti, Ran; Shahaf, Daniel; Vald, Margarita
4
2016
Efficient password authenticated key exchange via oblivious transfer. Zbl 1296.94148
Canetti, Ran; Dachman-Soled, Dana; Vaikuntanathan, Vinod; Wee, Hoeteck
3
2012
Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Zbl 1246.94010
3
2012
Environmental requirements for authentication protocols. Zbl 1033.94553
Canetti, Ran; Meadows, Catherine; Syverson, Paul
3
2003
On adaptive vs. non-adaptive security of multiparty protocols. Zbl 0981.94040
Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal
3
2001
Secure computation with honest-looking parties: what if nobody is truly honest? (extended abstract). Zbl 1345.68017
Canetti, Ran; Ostrovsky, Rafail
3
1999
Selective private function evaluation with applications to private statistics. Zbl 1333.94052
Canetti, Ran; Ishai, Yuval; Kumar, Ravi; Reiter, Michael K.; Rubinfeld, Ronitt; Wright, Rebecca N.
3
2001
Universally composable security. Zbl 1491.68036
Canetti, Ran
2
2020
Universally composable accumulators. Zbl 1457.94094
Badimtsi, Foteini; Canetti, Ran; Yakoubov, Sophia
1
2020
Universal composition with global subroutines: capturing global setup within plain UC. Zbl 1485.94051
Badertscher, Christian; Canetti, Ran; Hesse, Julia; Tackmann, Björn; Zikas, Vassilis
1
2020
Blazing fast OT for three-round UC OT extension. Zbl 07436976
Canetti, Ran; Sarkar, Pratik; Wang, Xiao
1
2020
Fiat-Shamir: from practice to theory. Zbl 1434.94060
Canetti, Ran; Chen, Yilei; Holmgren, Justin; Lombardi, Alex; Rothblum, Guy N.; Rothblum, Ron D.; Wichs, Daniel
23
2019
Fiat-Shamir and correlation intractability from strong KDM-secure encryption. Zbl 1423.94058
Canetti, Ran; Chen, Yilei; Reyzin, Leonid; Rothblum, Ron D.
12
2018
Certifying trapdoor permutations, revisited. Zbl 1443.94049
Canetti, Ran; Lichtenberg, Amit
6
2018
Task-structured probabilistic I/O automata. Zbl 1390.68382
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; Pereira, Olivier; Segala, Roberto
3
2018
Indistinguishability obfuscation for RAM programs and succinct randomized encodings. Zbl 1396.68041
Bitansky, Nir; Canetti, Ran; Garg, Sanjam; Holmgren, Justin; Jain, Abhishek; Lin, Huijia; Pass, Rafael; Telang, Sidharth; Vaikuntanathan, Vinod
2
2018
Constraint-hiding constrained PRFs for \(\text{NC}^1\) from LWE. Zbl 1410.94055
Canetti, Ran; Chen, Yilei
16
2017
The hunting of the SNARK. Zbl 1386.94066
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran
14
2017
Towards doubly efficient private information retrieval. Zbl 1416.68063
Canetti, Ran; Holmgren, Justin; Richelson, Silas
5
2017
Chosen-ciphertext secure fully homomorphic encryption. Zbl 1400.94131
Canetti, Ran; Raghuraman, Srinivasan; Richelson, Silas; Vaikuntanathan, Vinod
4
2017
Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model. Zbl 1369.68206
Canetti, Ran; Poburinnaya, Oxana; Venkitasubramaniam, Muthuramakrishnan
4
2017
Better two-round adaptive multi-party computation. Zbl 1400.94130
Canetti, Ran; Poburinnaya, Oxana; Venkitasubramaniam, Muthuramakrishnan
3
2017
Optimal-rate non-committing encryption. Zbl 1417.94049
Canetti, Ran; Poburinnaya, Oxana; Raykova, Mariana
2
2017
On virtual grey box obfuscation for general circuits. Zbl 1397.94050
Bitansky, Nir; Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer
2
2017
Adaptive hardness and composable security in the plain model from standard assumptions. Zbl 1406.94033
Canetti, Ran; Lin, Huijia; Pass, Rafael
18
2016
Fully succinct garbled RAM. Zbl 1334.68064
Canetti, Ran; Holmgren, Justin
12
2016
Adaptive succinct garbled RAM or: how to delegate your database. Zbl 1397.94052
Canetti, Ran; Chen, Yilei; Holmgren, Justin; Raykova, Mariana
8
2016
On the correlation intractability of obfuscated pseudorandom functions. Zbl 1388.94038
Canetti, Ran; Chen, Yilei; Reyzin, Leonid
8
2016
Reusable fuzzy extractors for low-entropy distributions. Zbl 1347.94022
Canetti, Ran; Fuller, Benjamin; Paneth, Omer; Reyzin, Leonid; Smith, Adam
7
2016
Universally composable authentication and key-exchange with global PKI. Zbl 1395.94271
Canetti, Ran; Shahaf, Daniel; Vald, Margarita
4
2016
Toward a game theoretic view of secure computation. Zbl 1365.94475
Asharov, Gilad; Canetti, Ran; Hazay, Carmit
1
2016
Obfuscation of probabilistic circuits and applications. Zbl 1382.94078
Canetti, Ran; Lin, Huijia; Tessaro, Stefano; Vaikuntanathan, Vinod
37
2015
Succinct garbling and indistinguishability obfuscation for RAM programs. Zbl 1321.94050
Canetti, Ran; Holmgren, Justin; Jain, Abhishek; Vaikuntanathan, Vinod
21
2015
A simpler variant of universally composable security for standard multiparty computation. Zbl 1351.94031
Canetti, Ran; Cohen, Asaf; Lindell, Yehuda
14
2015
Adaptively secure two-party computation from indistinguishability obfuscation. Zbl 1382.94077
Canetti, Ran; Goldwasser, Shafi; Poburinnaya, Oxana
14
2015
On obfuscation with random oracles. Zbl 1355.94049
Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer
10
2015
Concurrent secure computation with optimal query complexity. Zbl 1351.94032
Canetti, Ran; Goyal, Vipul; Jain, Abhishek
1
2015
On the existence of extractable one-way functions. Zbl 1315.94059
Bitansky, Nir; Canetti, Ran; Paneth, Omer; Rosen, Alon
20
2014
On virtual grey box obfuscation for general circuits. Zbl 1296.94089
Bitansky, Nir; Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer
15
2014
The impossibility of obfuscation with auxiliary input or a universal simulator. Zbl 1296.94087
Bitansky, Nir; Canetti, Ran; Cohn, Henry; Goldwasser, Shafi; Kalai, Yael Tauman; Paneth, Omer; Rosen, Alon
14
2014
Obfuscation for evasive functions. Zbl 1296.94077
Barak, Boaz; Bitansky, Nir; Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer; Sahai, Amit
8
2014
On strong simulation and composable point obfuscation. Zbl 1296.94086
Bitansky, Nir; Canetti, Ran
4
2014
Verifiable set operations over outsourced databases. Zbl 1296.94097
Canetti, Ran; Paneth, Omer; Papadopoulos, Dimitrios; Triandopoulos, Nikos
2
2014
Client-server concurrent zero knowledge with constant rounds and guaranteed complexity. Zbl 1296.94094
Canetti, Ran; Jain, Abhishek; Paneth, Omer
1
2014
Recursive composition and bootstrapping for SNARKs and proof-carrying data. Zbl 1293.68264
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Tromer, Eran
26
2013
Public-coin concurrent zero-knowledge in the global hash model. Zbl 1296.94096
Canetti, Ran; Lin, Huijia; Paneth, Omer
7
2013
Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Zbl 1270.94007
7
2013
Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Zbl 1270.94006
4
2013
Refereed delegation of computation. Zbl 1290.68013
Canetti, Ran; Riva, Ben; Rothblum, Guy N.
3
2013
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. Zbl 1347.68129
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Tromer, Eran
28
2012
Leakage-tolerant interactive protocols. Zbl 1296.94088
Bitansky, Nir; Canetti, Ran; Halevi, Shai
19
2012
Two protocols for delegation of computation. Zbl 1295.94030
Canetti, Ran; Riva, Ben; Rothblum, Guy N.
4
2012
Efficient password authenticated key exchange via oblivious transfer. Zbl 1296.94148
Canetti, Ran; Dachman-Soled, Dana; Vaikuntanathan, Vinod; Wee, Hoeteck
3
2012
Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Zbl 1246.94010
3
2012
Universally composable security with local adversaries. Zbl 1296.94098
Canetti, Ran; Vald, Margarita
2
2012
Towards a game theoretic view of secure computation. Zbl 1290.94143
Asharov, Gilad; Canetti, Ran; Hazay, Carmit
8
2011
Program obfuscation with leaky hardware. Zbl 1227.68023
Bitansky, Nir; Canetti, Ran; Goldwasser, Shafi; Halevi, Shai; Kalai, Yael Tauman; Rothblum, Guy N.
3
2011
Secure computation without authentication. Zbl 1243.94024
Barak, Boaz; Canetti, Ran; Lindell, Yehuda; Pass, Rafael; Rabin, Tal
2
2011
Universally composable symbolic security analysis. Zbl 1208.94039
Canetti, Ran; Herzog, Jonathan
2
2011
On symmetric encryption and point obfuscation. Zbl 1274.94048
Canetti, Ran; Tauman Kalai, Yael; Varia, Mayank; Wichs, Daniel
13
2010
On strong simulation and composable point obfuscation. Zbl 1283.94052
Bitansky, Nir; Canetti, Ran
13
2010
Obfuscation of hyperplane membership. Zbl 1274.94047
Canetti, Ran; Rothblum, Guy N.; Varia, Mayank
11
2010
Non-malleable obfuscation. Zbl 1213.68203
Canetti, Ran; Varia, Mayank
8
2009
Towards a theory of extractable functions. Zbl 1213.94089
Canetti, Ran; Dakdouk, Ronny Ramzi
8
2009
Obfuscating point functions with multibit output. Zbl 1149.94306
Canetti, Ran; Dakdouk, Ronny Ramzi
17
2008
Analyzing security protocols using time-bounded task-PIOAs. Zbl 1161.93320
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; Pereira, Olivier; Segala, Roberto
13
2008
Extractable perfectly one-way functions. Zbl 1155.94364
Canetti, Ran; Dakdouk, Ronny Ramzi
11
2008
How to protect yourself without perfect shredding. Zbl 1155.68383
Canetti, Ran; Eiger, Dror; Goldwasser, Shafi; Lim, Dah-Yoh
4
2008
Modeling computational security in long-lived systems. Zbl 1160.94382
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Lynch, Nancy; Pereira, Olivier
1
2008
Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Zbl 1130.94001
1
2008
Universally composable security with global setup. Zbl 1129.94014
Canetti, Ran; Dodis, Yevgeniy; Pass, Rafael; Walfish, Shabsi
46
2007
A forward-secure public-key encryption scheme. Zbl 1121.68044
Canetti, Ran; Halevi, Shai; Katz, Jonathan
15
2007
Time-Bounded Task-PIOAs: A framework for analyzing security protocols. Zbl 1155.68326
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; Pereira, Olivier; Segala, Roberto
13
2007
Obtaining universally compoable security: Towards the bare bones of trust. Zbl 1153.94358
Canetti, Ran
7
2007
Amplifying collision resistance: a complexity-theoretic treatment. Zbl 1215.94036
Canetti, Ran; Rivest, Ron; Sudan, Madhu; Trevisan, Luca; Vadhan, Salil; Wee, Hoeteck
5
2007
Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010
Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan
56
2006
Universally composable symbolic analysis of mutual authentication and key-exchange protocols. Zbl 1112.94025
Canetti, Ran; Herzog, Jonathan
17
2006
On the limitations of universally composable two-party computation without set-up assumptions. Zbl 1101.68549
Canetti, Ran; Kushilevitz, Eyal; Lindell, Yehuda
14
2006
Mitigating dictionary attacks on password-protected local storage. Zbl 1161.94436
Canetti, Ran; Halevi, Shai; Steiner, Michael
7
2006
Universally composable password-based key exchange. Zbl 1137.94367
Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil
22
2005
Hardness amplification of weakly verifiable puzzles. Zbl 1079.94538
Canetti, Ran; Halevi, Shai; Steiner, Michael
16
2005
Adaptively-secure, non-interactive public-key encryption. Zbl 1079.94537
Canetti, Ran; Halevi, Shai; Katz, Jonathan
15
2005
Secure computation without authentication. Zbl 1145.94457
Barak, Boaz; Canetti, Ran; Lindell, Yehuda; Pass, Rafael; Rabin, Tal
13
2005
Chosen-ciphertext security from identity-based encryption. Zbl 1122.94358
Canetti, Ran; Halevi, Shai; Katz, Jonathan
107
2004
The random oracle methodology, revisited. Zbl 1204.94063
Canetti, Ran; Goldreich, Oded; Halevi, Shai
104
2004
Adaptive versus non-adaptive security of multi-party protocols. Zbl 1091.94020
Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal
6
2004
Just Fast Keying: key agreement in a hostile internet. Zbl 1291.94041
Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer
6
2004
On the random-oracle methodology as applied to length-restricted signature schemes. Zbl 1197.94215
Canetti, Ran; Goldreich, Oded; Halevi, Shai
6
2004
A forward-secure public-key encryption scheme. Zbl 1037.68532
Canetti, Ran; Halevi, Shai; Katz, Jonathan
71
2003
Relaxing chosen-ciphertext security. Zbl 1122.94359
Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper B.
39
2003
Universal composition with joint state. Zbl 1122.94360
Canetti, Ran; Rabin, Tal
31
2003
On the limitations of universally composable two-party computation without set-up assumptions. Zbl 1038.94523
Canetti, Ran; Kushilevitz, Eyal; Lindell, Yehuda
15
2003
Environmental requirements for authentication protocols. Zbl 1033.94553
Canetti, Ran; Meadows, Catherine; Syverson, Paul
3
2003
Universally composable two-party and multi-party secure computation. Zbl 1192.94112
Canetti, Ran; Lindell, Yehuda; Ostrovsky, Rafail; Sahai, Amit
100
2002
Universally composable notions of key exchange and secure channels. Extended Abstract. Zbl 1056.94511
Canetti, Ran; Krawczyk, Hugo
30
2002
Security analysis of IKE’s signature-based key-exchange protocol. Zbl 1026.94524
Canetti, Ran; Krawczyk, Hugo
15
2002
Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds. Zbl 1037.94004
Canetti, Ran; Kilian, Joe; Petrank, Erez; Rosen, Alon
8
2002
Efficient, DoS-resistant, secure key exchange for internet protocols. Zbl 1017.68556
Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer
2
2002
Analysis of key-exchange protocols and their use for building secure channels. Zbl 0981.94032
Canetti, Ran; Krawczyk, Hugo
93
2001
Universally composable commitments (extended abstract). Zbl 1002.94528
Canetti, Ran; Fischlin, Marc
68
2001
Black-box concurrent zero-knowledge requires \(\tilde{\omega}(\log n)\) rounds. Zbl 1317.68064
Canetti, Ran; Kilian, Joe; Petrank, Erez; Rosen, Alon
18
2001
On adaptive vs. non-adaptive security of multiparty protocols. Zbl 0981.94040
Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal
3
2001
Selective private function evaluation with applications to private statistics. Zbl 1333.94052
Canetti, Ran; Ishai, Yuval; Kumar, Ravi; Reiter, Michael K.; Rubinfeld, Ronitt; Wright, Rebecca N.
3
2001
Security and composition of multiparty cryptographic protocols. Zbl 0957.68040
Canetti, Ran
110
2000
Resettable zero-knowledge (extended abstract). Zbl 1296.94093
Canetti, Ran; Goldreich, Oded; Goldwasser, Shafi; Micali, Silvio
38
2000
On the statistical properties of Diffie-Hellman distributions. Zbl 0997.11066
Canetti, Ran; Friedlander, John; Konyagin, Sergei; Larsen, Michael; Lieman, Daniel; Shparlinski, Igor
23
2000
Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508
Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai
14
2000
...and 25 more Documents
all top 5

Cited by 1,750 Authors

28 Canetti, Ran
24 Lindell, Yehuda
23 Hofheinz, Dennis
23 Ishai, Yuval
23 Libert, Benoît
22 Hazay, Carmit
22 Ostrovsky, Rafail
21 Pass, Rafael
20 Susilo, Willy
19 Bitansky, Nir
18 Kiltz, Eike
18 Sahai, Amit
18 Yung, Moti
17 Bellare, Mihir
17 Waters, Brent
16 Wichs, Daniel
15 Goldreich, Oded
15 Lin, Huijia
15 Venkitasubramaniam, Muthuramakrishnan
14 Katz, Jonathan N.
14 Vaikuntanathan, Vinod
13 Hanaoka, Goichiro
13 Jager, Tibor
13 Liu, Shengli
13 Mu, Yi
13 Nielsen, Jesper Buus
12 Shparlinski, Igor E.
12 Weng, Jian
11 Fischlin, Marc
11 Goldwasser, Shafi
11 Gu, Dawu
11 Khurana, Dakshita
11 Venturi, Daniele
11 Wang, Huaxiong
11 Zikas, Vassilis
10 Ananth, Prabhanjan Vijendra
10 Boneh, Dan
10 Brakerski, Zvika
10 Camenisch, Jan L.
10 Chen, Kefei
10 Chevalier, Céline
10 Chiesa, Alessandro
10 Emura, Keita
10 Garay, Juan A.
10 Paneth, Omer
10 Wong, Duncan S.
10 Yang, Guomin
9 Abdalla, Michel
9 Backes, Michael
9 Chung, Kai-Min
9 Garg, Sanjam
9 Gennaro, Rosario
9 Nishimaki, Ryo
9 Smart, Nigel P.
9 Visconti, Ivan
9 Wee, Hoeteck
9 Zhandry, Mark
8 Asharov, Gilad
8 Boyle, Elette
8 Catalano, Dario
8 Cohen, Ran
8 Farshim, Pooya
8 Fiore, Dario
8 Kiayias, Aggelos
8 Lee, Kwangsu
8 Ling, San
8 Maurer, Ueli M.
8 Paterson, Kenneth G.
8 Pietrzak, Krzysztof
8 Rosen, Alon
8 Rothblum, Guy N.
8 Srinivasan, Akshayaram
8 Stebila, Douglas
8 Unruh, Dominique
8 Warinschi, Bogdan
8 Zhou, Hong-Sheng
7 Cao, Zhenfu
7 Choudhary, Ashish
7 Coretti, Sandro
7 Dodis, Yevgeniy
7 Guo, Fuchun
7 Herranz, Javier
7 Kiyoshima, Susumu
7 Küsters, Ralf
7 Matsuda, Takahiro
7 Müller-Quade, Jörn
7 Park, Jonghwan
7 Patra, Arpita
7 Qin, Baodong
7 Rothblum, Ron D.
7 Schröder, Dominique
7 Segev, Gil
7 Seo, Jae Hong
7 Shi, Elaine
7 Tanaka, Keisuke
7 Tauman Kalai, Yael
7 Wu, Qianhong
7 Yoneyama, Kazuki
7 Zhao, Yunlei
6 Abe, Masayuki
...and 1,650 more Authors
all top 5

Cited in 88 Serials

163 Journal of Cryptology
77 Theoretical Computer Science
59 Designs, Codes and Cryptography
47 Information Sciences
23 Information and Computation
21 Journal of Computer and System Sciences
21 SIAM Journal on Computing
18 Information Processing Letters
12 Algorithmica
12 Distributed Computing
8 Quantum Information Processing
7 Computational Complexity
7 Science in China. Series F
6 International Journal of Foundations of Computer Science
6 Soft Computing
6 Journal of Shanghai Jiaotong University (Science)
6 Journal of Mathematical Cryptology
6 Science China. Information Sciences
5 Discrete Applied Mathematics
5 Mathematical and Computer Modelling
5 Finite Fields and their Applications
5 Journal of Discrete Mathematical Sciences & Cryptography
5 Advances in Mathematics of Communications
5 Frontiers of Computer Science
4 International Journal of Computer Mathematics
4 Applicable Algebra in Engineering, Communication and Computing
4 Theory of Computing Systems
3 European Journal of Operational Research
3 Journal of Scheduling
3 Matematicheskie Voprosy Kriptografii
2 Computers & Mathematics with Applications
2 International Journal of Theoretical Physics
2 Mathematics of Computation
2 Journal of Number Theory
2 The Journal of Symbolic Logic
2 Proceedings of the American Mathematical Society
2 Operations Research Letters
2 Journal of Symbolic Computation
2 Computers & Operations Research
2 Formal Aspects of Computing
2 MSCS. Mathematical Structures in Computer Science
2 Formal Methods in System Design
2 Nonlinear Dynamics
2 Journal of Combinatorial Optimization
2 Journal of the ACM
2 Informatica (Vilnius)
2 International Journal of Applied Mathematics and Computer Science
2 The Journal of Logic and Algebraic Programming
2 International Journal of Quantum Information
2 Mathematical Biosciences and Engineering
2 Journal of Zhejiang University. Science A
1 Acta Informatica
1 Artificial Intelligence
1 Discrete Mathematics
1 Israel Journal of Mathematics
1 Rocky Mountain Journal of Mathematics
1 Canadian Mathematical Bulletin
1 Computing
1 Mathematika
1 Synthese
1 Cryptologia
1 Annals of Pure and Applied Logic
1 Journal of Complexity
1 Journal of Automated Reasoning
1 SIAM Journal on Discrete Mathematics
1 Journal of Parallel and Distributed Computing
1 Discrete Event Dynamic Systems
1 Bulletin of the American Mathematical Society. New Series
1 Mathematical Programming. Series A. Series B
1 The Electronic Journal of Combinatorics
1 Annals of Mathematics and Artificial Intelligence
1 Mathematical Problems in Engineering
1 Wuhan University Journal of Natural Sciences (WUJNS)
1 LMS Journal of Computation and Mathematics
1 Journal of Systems Science and Complexity
1 Electronic Commerce Research
1 Sādhanā
1 Comptes Rendus. Mathématique. Académie des Sciences, Paris
1 ACM Transactions on Information and System Security (TISSEC)
1 Journal of Discrete Algorithms
1 Annales Universitatis Mariae Curie-Skłodowska. Sectio A1. Informatica
1 Journal of Physics A: Mathematical and Theoretical
1 Cryptography and Communications
1 Symmetry
1 Arabian Journal for Science and Engineering
1 Computer Science Review
1 Proceedings of the Royal Society of London. A. Mathematical, Physical and Engineering Sciences
1 Prikladnaya Diskretnaya Matematika

Citations by Year