×

zbMATH — the first resource for mathematics

Canetti, Ran

Compute Distance To:
Author ID: canetti.ran Recent zbMATH articles by "Canetti, Ran"
Published as: Canetti, Ran
Documents Indexed: 126 Publications since 1993, including 4 Books
all top 5

Co-Authors

5 single-authored
16 Halevi, Shai
14 Bitansky, Nir
12 Paneth, Omer
8 Goldreich, Oded
7 Goldwasser, Shafi
7 Krawczyk, Hugo
7 Lindell, Yehuda
7 Tauman Kalai, Yael
6 Holmgren, Justin
6 Katz, Jonathan N.
5 Chen, Yilei
5 Lin, Huijia
5 Ostrovsky, Rafail
5 Pass, Rafael
5 Rabin, Tal
5 Rosen, Alon
5 Rothblum, Guy N.
5 Vaikuntanathan, Vinod
4 Cheung, Ling
4 Jain, Abhishek
4 Kaynar, Dilsun Kırlı
4 Kushilevitz, Eyal
4 Lynch, Nancy Ann
4 Pereira, Olivier
4 Poburinnaya, Oxana
4 Reyzin, Leonid
3 Barak, Boaz
3 Chiesa, Alessandro
3 Dakdouk, Ronny Ramzi
3 Herzberg, Amir
3 Ishai, Yuval
3 Liskov, Moses D.
3 Malkin, Tal G.
3 Reingold, Omer
3 Segala, Roberto
3 Tromer, Eran
3 Varia, Mayank
2 Aiello, William A.
2 Asharov, Gilad
2 Bar-Noy, Amotz
2 Bellare, Mihir
2 Bellovin, Steven M.
2 Blaze, Matthew
2 Damgård, Ivan Bjerre
2 Dodis, Yevgeniy
2 Dziembowski, Stefan
2 Friedlander, John Benjamin
2 Fuller, Benjamin
2 Garay, Juan A.
2 Hazay, Carmit
2 Herzog, Jonathan C.
2 Ioannidis, John P. A.
2 Irani, Sandy
2 Keromytis, Angelos D.
2 Kilian, Joe
2 Kutten, Shay
2 Mansour, Yishay
2 Naor, Moni
2 Petrank, Erez
2 Raykova, Mariana
2 Richelson, Silas
2 Riva, Ben
2 Rosén, Adi
2 Rothblum, Ron D.
2 Sahai, Amit
2 Schieber, Baruch
2 Shparlinski, Igor E.
2 Steiner, Michael
2 Vald, Margarita
2 Venkitasubramaniam, Muthuramakrishnan
2 Wee, Hoeteck
2 Wichs, Daniel
1 Badimtsi, Foteini
1 Ben-Or, Michael
1 Boneh, Dan
1 Cohen, Asaf
1 Cohn, Henry Lee
1 Dachman-Soled, Dana
1 Dwork, Cynthia
1 Eiger, Dror
1 Even, Guy
1 Feige, Uriel
1 Fischlin, Marc
1 Garg, Sanjam
1 Gennaro, Rosario
1 Goyal, Vipul
1 Jarecki, Stanisław
1 Kolesnikov, Vladimir
1 Konyagin, Sergeĭ Vladimirovich
1 Larsen, Michael Jeffrey
1 Lichtenberg, Amit
1 Lieman, Daniel B.
1 Lim, Dah-Yoh
1 Lombardi, Alex
1 MacKenzie, Phil
1 Meadows, Catherine A.
1 Micali, Silvio
1 Micciancio, Daniele
1 Nielsen, Jesper Buus
1 Nissim, Kobbi
...and 20 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

118 Publications have been cited 1,660 times in 934 Documents Cited by Year
Chosen-ciphertext security from identity-based encryption. Zbl 1122.94358
Canetti, Ran; Halevi, Shai; Katz, Jonathan
92
2004
Security and composition of multiparty cryptographic protocols. Zbl 0957.68040
Canetti, Ran
84
2000
The random oracle methodology, revisited. Zbl 1204.94063
Canetti, Ran; Goldreich, Oded; Halevi, Shai
80
2004
Analysis of key-exchange protocols and their use for building secure channels. Zbl 0981.94032
Canetti, Ran; Krawczyk, Hugo
72
2001
Universally composable two-party and multi-party secure computation. Zbl 1192.94112
Canetti, Ran; Lindell, Yehuda; Ostrovsky, Rafail; Sahai, Amit
69
2002
The random oracle methodology, revisited. Zbl 1027.68603
Canetti, Ran; Goldreich, Oded; Halevi, Shai
66
1998
A forward-secure public-key encryption scheme. Zbl 1037.68532
Canetti, Ran; Halevi, Shai; Katz, Jonathan
61
2003
Universally composable commitments (extended abstract). Zbl 1002.94528
Canetti, Ran; Fischlin, Marc
53
2001
Keying hash functions for message authentication. Zbl 1329.94051
Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo
45
1996
Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010
Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan
41
2006
Adaptively secure multi-party computation. Zbl 0922.68048
Canetti, Ran; Feige, Uri; Goldreich, Oded; Naor, Moni
39
1996
Towards realizing random oracles: hash functions that hide all partial information. Zbl 0884.68048
Canetti, Ran
37
1997
A modular approach to the design and analysis of authentication and key exchange protocols. Zbl 1028.68015
Bellare, Mihir; Canetti, Ran; Krawczyk, Hugo
36
1998
Resettable zero-knowledge (extended abstract). Zbl 1296.94093
Canetti, Ran; Goldreich, Oded; Goldwasser, Shafi; Micali, Silvio
31
2000
Universally composable security with global setup. Zbl 1129.94014
Canetti, Ran; Dodis, Yevgeniy; Pass, Rafael; Walfish, Shabsi
30
2007
Relaxing chosen-ciphertext security. Zbl 1122.94359
Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper B.
27
2003
Universally composable notions of key exchange and secure channels. Extended Abstract. Zbl 1056.94511
Canetti, Ran; Krawczyk, Hugo
25
2002
Universal composition with joint state. Zbl 1122.94360
Canetti, Ran; Rabin, Tal
25
2003
On the statistical properties of Diffie-Hellman distributions. Zbl 0997.11066
Canetti, Ran; Friedlander, John; Konyagin, Sergei; Larsen, Michael; Lieman, Daniel; Shparlinski, Igor
23
2000
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. Zbl 0948.94008
Canetti, Ran; Goldwasser, Shafi
22
1999
Obfuscation of probabilistic circuits and applications. Zbl 1382.94078
Canetti, Ran; Lin, Huijia; Tessaro, Stefano; Vaikuntanathan, Vinod
22
2015
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. Zbl 1347.68129
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Tromer, Eran
20
2012
Perfectly one-way probabilistic hash functions. (Preliminary version). Zbl 1029.68536
Canetti, Ran; Micciancio, Daniele; Reingold, Omer
19
1998
Bounding the power of preemption in randomized scheduling. Zbl 0907.68007
Canetti, Ran; Irani, Sandy
18
1998
Universally composable password-based key exchange. Zbl 1137.94367
Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil
18
2005
Deniable encryption. Zbl 0882.94019
Canetti, Ran; Dwork, Cynthia; Naor, Moni; Ostrovsky, Rafail
17
1997
Black-box concurrent zero-knowledge requires \(\tilde{\omega}(\log n)\) rounds. Zbl 1317.68064
Canetti, Ran; Kilian, Joe; Petrank, Erez; Rosen, Alon
17
2001
Adaptive security for threshold cryptosystems. Zbl 0972.94031
Canetti, Ran; Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal
15
1999
Succinct garbling and indistinguishability obfuscation for RAM programs. Zbl 1321.94050
Canetti, Ran; Holmgren, Justin; Jain, Abhishek; Vaikuntanathan, Vinod
15
2015
On the existence of extractable one-way functions. Zbl 1315.94059
Bitansky, Nir; Canetti, Ran; Paneth, Omer; Rosen, Alon
15
2014
More on BPP and the polynomial-time hierarchy. Zbl 0875.68425
Canetti, Ran
14
1996
Obfuscating point functions with multibit output. Zbl 1149.94306
Canetti, Ran; Dakdouk, Ronny Ramzi
14
2008
Recursive composition and bootstrapping for SNARKs and proof-carrying data. Zbl 1293.68264
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Tromer, Eran
14
2013
Analyzing security protocols using time-bounded task-PIOAs. Zbl 1161.93320
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; Pereira, Olivier; Segala, Roberto
13
2008
Lower bounds for sampling algorithms for estimating the average. Zbl 0875.68529
Canetti, Ran; Even, Guy; Goldreich, Oded
13
1995
Hardness amplification of weakly verifiable puzzles. Zbl 1079.94538
Canetti, Ran; Halevi, Shai; Steiner, Michael
13
2005
Time-Bounded Task-PIOAs: A framework for analyzing security protocols. Zbl 1155.68326
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; Pereira, Olivier; Segala, Roberto
13
2007
On virtual grey box obfuscation for general circuits. Zbl 1296.94089
Bitansky, Nir; Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer
13
2014
Universally composable symbolic analysis of mutual authentication and key-exchange protocols. Zbl 1112.94025
Canetti, Ran; Herzog, Jonathan
13
2006
On strong simulation and composable point obfuscation. Zbl 1283.94052
Bitansky, Nir; Canetti, Ran
12
2010
Adaptively-secure, non-interactive public-key encryption. Zbl 1079.94537
Canetti, Ran; Halevi, Shai; Katz, Jonathan
12
2005
The impossibility of obfuscation with auxiliary input or a universal simulator. Zbl 1296.94087
Bitansky, Nir; Canetti, Ran; Cohn, Henry; Goldwasser, Shafi; Kalai, Yael Tauman; Paneth, Omer; Rosen, Alon
12
2014
On the limitations of universally composable two-party computation without set-up assumptions. Zbl 1101.68549
Canetti, Ran; Kushilevitz, Eyal; Lindell, Yehuda
12
2006
On symmetric encryption and point obfuscation. Zbl 1274.94048
Canetti, Ran; Tauman Kalai, Yael; Varia, Mayank; Wichs, Daniel
11
2010
Leakage-tolerant interactive protocols. Zbl 1296.94088
Bitansky, Nir; Canetti, Ran; Halevi, Shai
11
2012
On the limitations of universally composable two-party computation without set-up assumptions. Zbl 1038.94523
Canetti, Ran; Kushilevitz, Eyal; Lindell, Yehuda
11
2003
Secure computation without authentication. Zbl 1145.94457
Barak, Boaz; Canetti, Ran; Lindell, Yehuda; Pass, Rafael; Rabin, Tal
11
2005
A forward-secure public-key encryption scheme. Zbl 1121.68044
Canetti, Ran; Halevi, Shai; Katz, Jonathan
11
2007
Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508
Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai
11
2000
Efficient communication-storage tradeoffs for multicast encryption. Zbl 0937.68043
Canetti, Ran; Malkin, Tal; Nissim, Kobbi
10
1999
Security analysis of IKE’s signature-based key-exchange protocol. Zbl 1026.94524
Canetti, Ran; Krawczyk, Hugo
10
2002
Asynchronous secure computation. Zbl 1310.68044
Ben-Or, Michael; Canetti, Ran; Goldreich, Oded
10
1993
Adaptive hardness and composable security in the plain model from standard assumptions. Zbl 1406.94033
Canetti, Ran; Lin, Huijia; Pass, Rafael
10
2016
The hunting of the SNARK. Zbl 1386.94066
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran
10
2017
Extractable perfectly one-way functions. Zbl 1155.94364
Canetti, Ran; Dakdouk, Ronny Ramzi
9
2008
A simpler variant of universally composable security for standard multiparty computation. Zbl 1351.94031
Canetti, Ran; Cohen, Asaf; Lindell, Yehuda
9
2015
Adaptively secure two-party computation from indistinguishability obfuscation. Zbl 1382.94077
Canetti, Ran; Goldwasser, Shafi; Poburinnaya, Oxana
9
2015
Obfuscation of hyperplane membership. Zbl 1274.94047
Canetti, Ran; Rothblum, Guy N.; Varia, Mayank
8
2010
Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds. Zbl 1037.94004
Canetti, Ran; Kilian, Joe; Petrank, Erez; Rosen, Alon
8
2002
Fast asynchronous Byzantine agreement with optimal resilience. Zbl 1310.68038
Canetti, Ran; Rabin, Tal
8
1993
On obfuscation with random oracles. Zbl 1355.94049
Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer
7
2015
Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Zbl 1270.94007
Canetti, Ran (ed.); Garay, Juan A. (ed.)
7
2013
Fully succinct garbled RAM. Zbl 1334.68064
Canetti, Ran; Holmgren, Justin
7
2016
Towards a game theoretic view of secure computation. Zbl 1290.94143
Asharov, Gilad; Canetti, Ran; Hazay, Carmit
6
2011
Public-coin concurrent zero-knowledge in the global hash model. Zbl 1296.94096
Canetti, Ran; Lin, Huijia; Paneth, Omer
6
2013
Adaptive versus non-adaptive security of multi-party protocols. Zbl 1091.94020
Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal
6
2004
On certain exponential sums and the distribution of Diffie-Hellman triples. Zbl 0935.11028
Canetti, Ran; Friedlander, John; Shparlinski, Igor
6
1999
Obtaining universally compoable security: Towards the bare bones of trust. Zbl 1153.94358
Canetti, Ran
6
2007
Just Fast Keying: key agreement in a hostile internet. Zbl 1291.94041
Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer
6
2004
Towards a theory of extractable functions. Zbl 1213.94089
Canetti, Ran; Dakdouk, Ronny Ramzi
6
2009
Obfuscation for evasive functions. Zbl 1296.94077
Barak, Boaz; Bitansky, Nir; Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer; Sahai, Amit
6
2014
On the correlation intractability of obfuscated pseudorandom functions. Zbl 1388.94038
Canetti, Ran; Chen, Yilei; Reyzin, Leonid
6
2016
Mitigating dictionary attacks on password-protected local storage. Zbl 1161.94436
Canetti, Ran; Halevi, Shai; Steiner, Michael
6
2006
On the random-oracle methodology as applied to length-restricted signature schemes. Zbl 1197.94215
Canetti, Ran; Goldreich, Oded; Halevi, Shai
5
2004
Non-malleable obfuscation. Zbl 1213.68203
Canetti, Ran; Varia, Mayank
5
2009
Amplifying collision resistance: a complexity-theoretic treatment. Zbl 1215.94036
Canetti, Ran; Rivest, Ron; Sudan, Madhu; Trevisan, Luca; Vadhan, Salil; Wee, Hoeteck
5
2007
Adaptive succinct garbled RAM or: how to delegate your database. Zbl 1397.94052
Canetti, Ran; Chen, Yilei; Holmgren, Justin; Raykova, Mariana
5
2016
Bounding the power of preemption in randomized scheduling. Zbl 0978.68502
Canetti, Ran; Irani, Sandy
4
1995
Bounds on tradeoffs between randomness and communication complexity. Zbl 0783.68053
Canetti, Ran; Goldreich, Oded
4
1993
How to protect yourself without perfect shredding. Zbl 1155.68383
Canetti, Ran; Eiger, Dror; Goldwasser, Shafi; Lim, Dah-Yoh
4
2008
Bandwidth allocation with preemption. Zbl 0928.68008
Bar-Noy, Amotz; Canetti, Ran; Kutten, Shay; Mansour, Yishay; Schieber, Baruch
4
1999
Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Zbl 1270.94006
Canetti, Ran (ed.); Garay, Juan A. (ed.)
4
2013
Constraint-hiding constrained PRFs for \(\text{NC}^1\) from LWE. Zbl 1410.94055
Canetti, Ran; Chen, Yilei
4
2017
Reusable fuzzy extractors for low-entropy distributions. Zbl 1347.94022
Canetti, Ran; Fuller, Benjamin; Paneth, Omer; Reyzin, Leonid; Smith, Adam
4
2016
Program obfuscation with leaky hardware. Zbl 1227.68023
Bitansky, Nir; Canetti, Ran; Goldwasser, Shafi; Halevi, Shai; Kalai, Yael Tauman; Rothblum, Guy N.
3
2011
Efficient password authenticated key exchange via oblivious transfer. Zbl 1296.94148
Canetti, Ran; Dachman-Soled, Dana; Vaikuntanathan, Vinod; Wee, Hoeteck
3
2012
Maintaining security in the presence of transient faults. Zbl 0939.94536
Canetti, Ran; Herzberg, Amir
3
1994
Environmental requirements for authentication protocols. Zbl 1033.94553
Canetti, Ran; Meadows, Catherine; Syverson, Paul
3
2003
On strong simulation and composable point obfuscation. Zbl 1296.94086
Bitansky, Nir; Canetti, Ran
3
2014
Task-structured probabilistic I/O automata. Zbl 1390.68382
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; Pereira, Olivier; Segala, Roberto
3
2018
Secure computation without authentication. Zbl 1243.94024
Barak, Boaz; Canetti, Ran; Lindell, Yehuda; Pass, Rafael; Rabin, Tal
2
2011
Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Zbl 1246.94010
Safavi-Naini, Reihaneh (ed.); Canetti, Ran (ed.)
2
2012
Universally composable security with local adversaries. Zbl 1296.94098
Canetti, Ran; Vald, Margarita
2
2012
Certifying trapdoor permutations, revisited. Zbl 1443.94049
Canetti, Ran; Lichtenberg, Amit
2
2018
On adaptive vs. non-adaptive security of multiparty protocols. Zbl 0981.94040
Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal
2
2001
Verifiable set operations over outsourced databases. Zbl 1296.94097
Canetti, Ran; Paneth, Omer; Papadopoulos, Dimitrios; Triandopoulos, Nikos
2
2014
Refereed delegation of computation. Zbl 1290.68013
Canetti, Ran; Riva, Ben; Rothblum, Guy N.
2
2013
Chosen-ciphertext secure fully homomorphic encryption. Zbl 1400.94131
Canetti, Ran; Raghuraman, Srinivasan; Richelson, Silas; Vaikuntanathan, Vinod
2
2017
Fiat-Shamir and correlation intractability from strong KDM-secure encryption. Zbl 1423.94058
Canetti, Ran; Chen, Yilei; Reyzin, Leonid; Rothblum, Ron D.
2
2018
Selective private function evaluation with applications to private statistics. Zbl 1333.94052
Canetti, Ran; Ishai, Yuval; Kumar, Ravi; Reiter, Michael K.; Rubinfeld, Ronitt; Wright, Rebecca N.
2
2001
Fiat-Shamir: from practice to theory. Zbl 1434.94060
Canetti, Ran; Chen, Yilei; Holmgren, Justin; Lombardi, Alex; Rothblum, Guy N.; Rothblum, Ron D.; Wichs, Daniel
2
2019
Task-structured probabilistic I/O automata. Zbl 1390.68382
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; Pereira, Olivier; Segala, Roberto
3
2018
Certifying trapdoor permutations, revisited. Zbl 1443.94049
Canetti, Ran; Lichtenberg, Amit
2
2018
Fiat-Shamir and correlation intractability from strong KDM-secure encryption. Zbl 1423.94058
Canetti, Ran; Chen, Yilei; Reyzin, Leonid; Rothblum, Ron D.
2
2018
Indistinguishability obfuscation for RAM programs and succinct randomized encodings. Zbl 1396.68041
Bitansky, Nir; Canetti, Ran; Garg, Sanjam; Holmgren, Justin; Jain, Abhishek; Lin, Huijia; Pass, Rafael; Telang, Sidharth; Vaikuntanathan, Vinod
1
2018
The hunting of the SNARK. Zbl 1386.94066
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Goldwasser, Shafi; Lin, Huijia; Rubinstein, Aviad; Tromer, Eran
10
2017
Constraint-hiding constrained PRFs for \(\text{NC}^1\) from LWE. Zbl 1410.94055
Canetti, Ran; Chen, Yilei
4
2017
Chosen-ciphertext secure fully homomorphic encryption. Zbl 1400.94131
Canetti, Ran; Raghuraman, Srinivasan; Richelson, Silas; Vaikuntanathan, Vinod
2
2017
On virtual grey box obfuscation for general circuits. Zbl 1397.94050
Bitansky, Nir; Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer
2
2017
Optimal-rate non-committing encryption. Zbl 1417.94049
Canetti, Ran; Poburinnaya, Oxana; Raykova, Mariana
2
2017
Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model. Zbl 1369.68206
Canetti, Ran; Poburinnaya, Oxana; Venkitasubramaniam, Muthuramakrishnan
1
2017
Towards doubly efficient private information retrieval. Zbl 1416.68063
Canetti, Ran; Holmgren, Justin; Richelson, Silas
1
2017
Adaptive hardness and composable security in the plain model from standard assumptions. Zbl 1406.94033
Canetti, Ran; Lin, Huijia; Pass, Rafael
10
2016
Fully succinct garbled RAM. Zbl 1334.68064
Canetti, Ran; Holmgren, Justin
7
2016
On the correlation intractability of obfuscated pseudorandom functions. Zbl 1388.94038
Canetti, Ran; Chen, Yilei; Reyzin, Leonid
6
2016
Adaptive succinct garbled RAM or: how to delegate your database. Zbl 1397.94052
Canetti, Ran; Chen, Yilei; Holmgren, Justin; Raykova, Mariana
5
2016
Reusable fuzzy extractors for low-entropy distributions. Zbl 1347.94022
Canetti, Ran; Fuller, Benjamin; Paneth, Omer; Reyzin, Leonid; Smith, Adam
4
2016
Universally composable authentication and key-exchange with global PKI. Zbl 1395.94271
Canetti, Ran; Shahaf, Daniel; Vald, Margarita
2
2016
Toward a game theoretic view of secure computation. Zbl 1365.94475
Asharov, Gilad; Canetti, Ran; Hazay, Carmit
1
2016
Obfuscation of probabilistic circuits and applications. Zbl 1382.94078
Canetti, Ran; Lin, Huijia; Tessaro, Stefano; Vaikuntanathan, Vinod
22
2015
Succinct garbling and indistinguishability obfuscation for RAM programs. Zbl 1321.94050
Canetti, Ran; Holmgren, Justin; Jain, Abhishek; Vaikuntanathan, Vinod
15
2015
A simpler variant of universally composable security for standard multiparty computation. Zbl 1351.94031
Canetti, Ran; Cohen, Asaf; Lindell, Yehuda
9
2015
Adaptively secure two-party computation from indistinguishability obfuscation. Zbl 1382.94077
Canetti, Ran; Goldwasser, Shafi; Poburinnaya, Oxana
9
2015
On obfuscation with random oracles. Zbl 1355.94049
Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer
7
2015
Concurrent secure computation with optimal query complexity. Zbl 1351.94032
Canetti, Ran; Goyal, Vipul; Jain, Abhishek
1
2015
On the existence of extractable one-way functions. Zbl 1315.94059
Bitansky, Nir; Canetti, Ran; Paneth, Omer; Rosen, Alon
15
2014
On virtual grey box obfuscation for general circuits. Zbl 1296.94089
Bitansky, Nir; Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer
13
2014
The impossibility of obfuscation with auxiliary input or a universal simulator. Zbl 1296.94087
Bitansky, Nir; Canetti, Ran; Cohn, Henry; Goldwasser, Shafi; Kalai, Yael Tauman; Paneth, Omer; Rosen, Alon
12
2014
Obfuscation for evasive functions. Zbl 1296.94077
Barak, Boaz; Bitansky, Nir; Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer; Sahai, Amit
6
2014
On strong simulation and composable point obfuscation. Zbl 1296.94086
Bitansky, Nir; Canetti, Ran
3
2014
Verifiable set operations over outsourced databases. Zbl 1296.94097
Canetti, Ran; Paneth, Omer; Papadopoulos, Dimitrios; Triandopoulos, Nikos
2
2014
Recursive composition and bootstrapping for SNARKs and proof-carrying data. Zbl 1293.68264
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Tromer, Eran
14
2013
Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Zbl 1270.94007
Canetti, Ran; Garay, Juan A.
7
2013
Public-coin concurrent zero-knowledge in the global hash model. Zbl 1296.94096
Canetti, Ran; Lin, Huijia; Paneth, Omer
6
2013
Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Zbl 1270.94006
Canetti, Ran; Garay, Juan A.
4
2013
Refereed delegation of computation. Zbl 1290.68013
Canetti, Ran; Riva, Ben; Rothblum, Guy N.
2
2013
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. Zbl 1347.68129
Bitansky, Nir; Canetti, Ran; Chiesa, Alessandro; Tromer, Eran
20
2012
Leakage-tolerant interactive protocols. Zbl 1296.94088
Bitansky, Nir; Canetti, Ran; Halevi, Shai
11
2012
Efficient password authenticated key exchange via oblivious transfer. Zbl 1296.94148
Canetti, Ran; Dachman-Soled, Dana; Vaikuntanathan, Vinod; Wee, Hoeteck
3
2012
Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Zbl 1246.94010
Safavi-Naini, Reihaneh; Canetti, Ran
2
2012
Universally composable security with local adversaries. Zbl 1296.94098
Canetti, Ran; Vald, Margarita
2
2012
Two protocols for delegation of computation. Zbl 1295.94030
Canetti, Ran; Riva, Ben; Rothblum, Guy N.
1
2012
Towards a game theoretic view of secure computation. Zbl 1290.94143
Asharov, Gilad; Canetti, Ran; Hazay, Carmit
6
2011
Program obfuscation with leaky hardware. Zbl 1227.68023
Bitansky, Nir; Canetti, Ran; Goldwasser, Shafi; Halevi, Shai; Kalai, Yael Tauman; Rothblum, Guy N.
3
2011
Secure computation without authentication. Zbl 1243.94024
Barak, Boaz; Canetti, Ran; Lindell, Yehuda; Pass, Rafael; Rabin, Tal
2
2011
Universally composable symbolic security analysis. Zbl 1208.94039
Canetti, Ran; Herzog, Jonathan
1
2011
On strong simulation and composable point obfuscation. Zbl 1283.94052
Bitansky, Nir; Canetti, Ran
12
2010
On symmetric encryption and point obfuscation. Zbl 1274.94048
Canetti, Ran; Tauman Kalai, Yael; Varia, Mayank; Wichs, Daniel
11
2010
Obfuscation of hyperplane membership. Zbl 1274.94047
Canetti, Ran; Rothblum, Guy N.; Varia, Mayank
8
2010
Towards a theory of extractable functions. Zbl 1213.94089
Canetti, Ran; Dakdouk, Ronny Ramzi
6
2009
Non-malleable obfuscation. Zbl 1213.68203
Canetti, Ran; Varia, Mayank
5
2009
Obfuscating point functions with multibit output. Zbl 1149.94306
Canetti, Ran; Dakdouk, Ronny Ramzi
14
2008
Analyzing security protocols using time-bounded task-PIOAs. Zbl 1161.93320
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; Pereira, Olivier; Segala, Roberto
13
2008
Extractable perfectly one-way functions. Zbl 1155.94364
Canetti, Ran; Dakdouk, Ronny Ramzi
9
2008
How to protect yourself without perfect shredding. Zbl 1155.68383
Canetti, Ran; Eiger, Dror; Goldwasser, Shafi; Lim, Dah-Yoh
4
2008
Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Zbl 1130.94001
Canetti, Ran
1
2008
Universally composable security with global setup. Zbl 1129.94014
Canetti, Ran; Dodis, Yevgeniy; Pass, Rafael; Walfish, Shabsi
30
2007
Time-Bounded Task-PIOAs: A framework for analyzing security protocols. Zbl 1155.68326
Canetti, Ran; Cheung, Ling; Kaynar, Dilsun; Liskov, Moses; Lynch, Nancy; Pereira, Olivier; Segala, Roberto
13
2007
A forward-secure public-key encryption scheme. Zbl 1121.68044
Canetti, Ran; Halevi, Shai; Katz, Jonathan
11
2007
Obtaining universally compoable security: Towards the bare bones of trust. Zbl 1153.94358
Canetti, Ran
6
2007
Amplifying collision resistance: a complexity-theoretic treatment. Zbl 1215.94036
Canetti, Ran; Rivest, Ron; Sudan, Madhu; Trevisan, Luca; Vadhan, Salil; Wee, Hoeteck
5
2007
Chosen-ciphertext security from identity-based encryption. Zbl 1138.94010
Boneh, Dan; Canetti, Ran; Halevi, Shai; Katz, Jonathan
41
2006
Universally composable symbolic analysis of mutual authentication and key-exchange protocols. Zbl 1112.94025
Canetti, Ran; Herzog, Jonathan
13
2006
On the limitations of universally composable two-party computation without set-up assumptions. Zbl 1101.68549
Canetti, Ran; Kushilevitz, Eyal; Lindell, Yehuda
12
2006
Mitigating dictionary attacks on password-protected local storage. Zbl 1161.94436
Canetti, Ran; Halevi, Shai; Steiner, Michael
6
2006
Universally composable password-based key exchange. Zbl 1137.94367
Canetti, Ran; Halevi, Shai; Katz, Jonathan; Lindell, Yehuda; MacKenzie, Phil
18
2005
Hardness amplification of weakly verifiable puzzles. Zbl 1079.94538
Canetti, Ran; Halevi, Shai; Steiner, Michael
13
2005
Adaptively-secure, non-interactive public-key encryption. Zbl 1079.94537
Canetti, Ran; Halevi, Shai; Katz, Jonathan
12
2005
Secure computation without authentication. Zbl 1145.94457
Barak, Boaz; Canetti, Ran; Lindell, Yehuda; Pass, Rafael; Rabin, Tal
11
2005
Chosen-ciphertext security from identity-based encryption. Zbl 1122.94358
Canetti, Ran; Halevi, Shai; Katz, Jonathan
92
2004
The random oracle methodology, revisited. Zbl 1204.94063
Canetti, Ran; Goldreich, Oded; Halevi, Shai
80
2004
Adaptive versus non-adaptive security of multi-party protocols. Zbl 1091.94020
Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal
6
2004
Just Fast Keying: key agreement in a hostile internet. Zbl 1291.94041
Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer
6
2004
On the random-oracle methodology as applied to length-restricted signature schemes. Zbl 1197.94215
Canetti, Ran; Goldreich, Oded; Halevi, Shai
5
2004
A forward-secure public-key encryption scheme. Zbl 1037.68532
Canetti, Ran; Halevi, Shai; Katz, Jonathan
61
2003
Relaxing chosen-ciphertext security. Zbl 1122.94359
Canetti, Ran; Krawczyk, Hugo; Nielsen, Jesper B.
27
2003
Universal composition with joint state. Zbl 1122.94360
Canetti, Ran; Rabin, Tal
25
2003
On the limitations of universally composable two-party computation without set-up assumptions. Zbl 1038.94523
Canetti, Ran; Kushilevitz, Eyal; Lindell, Yehuda
11
2003
Environmental requirements for authentication protocols. Zbl 1033.94553
Canetti, Ran; Meadows, Catherine; Syverson, Paul
3
2003
Universally composable two-party and multi-party secure computation. Zbl 1192.94112
Canetti, Ran; Lindell, Yehuda; Ostrovsky, Rafail; Sahai, Amit
69
2002
Universally composable notions of key exchange and secure channels. Extended Abstract. Zbl 1056.94511
Canetti, Ran; Krawczyk, Hugo
25
2002
Security analysis of IKE’s signature-based key-exchange protocol. Zbl 1026.94524
Canetti, Ran; Krawczyk, Hugo
10
2002
Black-box concurrent zero-knowledge requires (almost) logarithmically many rounds. Zbl 1037.94004
Canetti, Ran; Kilian, Joe; Petrank, Erez; Rosen, Alon
8
2002
Efficient, DoS-resistant, secure key exchange for internet protocols. Zbl 1017.68556
Aiello, William; Bellovin, Steven M.; Blaze, Matt; Canetti, Ran; Ioannidis, John; Keromytis, Angelos D.; Reingold, Omer
1
2002
Analysis of key-exchange protocols and their use for building secure channels. Zbl 0981.94032
Canetti, Ran; Krawczyk, Hugo
72
2001
Universally composable commitments (extended abstract). Zbl 1002.94528
Canetti, Ran; Fischlin, Marc
53
2001
Black-box concurrent zero-knowledge requires \(\tilde{\omega}(\log n)\) rounds. Zbl 1317.68064
Canetti, Ran; Kilian, Joe; Petrank, Erez; Rosen, Alon
17
2001
On adaptive vs. non-adaptive security of multiparty protocols. Zbl 0981.94040
Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal
2
2001
Selective private function evaluation with applications to private statistics. Zbl 1333.94052
Canetti, Ran; Ishai, Yuval; Kumar, Ravi; Reiter, Michael K.; Rubinfeld, Ronitt; Wright, Rebecca N.
2
2001
Security and composition of multiparty cryptographic protocols. Zbl 0957.68040
Canetti, Ran
84
2000
Resettable zero-knowledge (extended abstract). Zbl 1296.94093
Canetti, Ran; Goldreich, Oded; Goldwasser, Shafi; Micali, Silvio
31
2000
On the statistical properties of Diffie-Hellman distributions. Zbl 0997.11066
Canetti, Ran; Friedlander, John; Konyagin, Sergei; Larsen, Michael; Lieman, Daniel; Shparlinski, Igor
23
2000
Exposure-resilient functions and all-or-nothing transforms. Zbl 1082.94508
Canetti, Ran; Dodis, Yevgeniy; Halevi, Shai
11
2000
Maintaining authenticated communication in the presence of break-ins. Zbl 0957.68043
Canetti, Ran; Halevi, Shai; Herzberg, Amir
1
2000
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. Zbl 0948.94008
Canetti, Ran; Goldwasser, Shafi
22
1999
Adaptive security for threshold cryptosystems. Zbl 0972.94031
Canetti, Ran; Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal
15
1999
Efficient communication-storage tradeoffs for multicast encryption. Zbl 0937.68043
Canetti, Ran; Malkin, Tal; Nissim, Kobbi
10
1999
On certain exponential sums and the distribution of Diffie-Hellman triples. Zbl 0935.11028
Canetti, Ran; Friedlander, John; Shparlinski, Igor
6
1999
Bandwidth allocation with preemption. Zbl 0928.68008
Bar-Noy, Amotz; Canetti, Ran; Kutten, Shay; Mansour, Yishay; Schieber, Baruch
4
1999
Secure computation with honest-looking parties: what if nobody is truly honest? (extended abstract). Zbl 1345.68017
Canetti, Ran; Ostrovsky, Rafail
2
1999
...and 18 more Documents
all top 5

Cited by 1,375 Authors

23 Canetti, Ran
22 Lindell, Yehuda
19 Hazay, Carmit
19 Hofheinz, Dennis
17 Pass, Rafael
16 Libert, Benoît
15 Bellare, Mihir
15 Goldreich, Oded
15 Ostrovsky, Rafail
15 Sahai, Amit
14 Bitansky, Nir
14 Ishai, Yuval
14 Susilo, Willy
13 Kiltz, Eike
13 Mu, Yi
13 Yung, Moti
12 Katz, Jonathan N.
12 Shparlinski, Igor E.
11 Hanaoka, Goichiro
11 Vaikuntanathan, Vinod
11 Weng, Jian
11 Wichs, Daniel
10 Lin, Huijia
10 Venkitasubramaniam, Muthuramakrishnan
10 Wang, Huaxiong
10 Waters, Brent
10 Wong, Duncan S.
9 Abdalla, Michel
9 Boneh, Dan
9 Camenisch, Jan L.
9 Gennaro, Rosario
9 Liu, Shengli
9 Nielsen, Jesper Buus
9 Yang, Guomin
8 Cao, Zhenfu
8 Catalano, Dario
8 Chen, Kefei
8 Fischlin, Marc
8 Garay, Juan A.
8 Goldwasser, Shafi
8 Gu, Dawu
8 Paneth, Omer
8 Pietrzak, Krzysztof
8 Rothblum, Guy N.
8 Venturi, Daniele
8 Visconti, Ivan
7 Herranz, Javier
7 Jager, Tibor
7 Lee, Kwangsu
7 Ling, San
7 Park, Jonghwan
7 Smart, Nigel P.
7 Tauman Kalai, Yael
7 Warinschi, Bogdan
7 Wu, Qianhong
7 Zhao, Yunlei
6 Ananth, Prabhanjan Vijendra
6 Boyd, Colin A.
6 Brakerski, Zvika
6 Chevalier, Céline
6 Chung, Kai-Min
6 Coretti, Sandro
6 Deng, Robert Huijie
6 Dodis, Yevgeniy
6 Emura, Keita
6 Farshim, Pooya
6 Guo, Fuchun
6 Joye, Marc
6 Müller-Quade, Jörn
6 Paterson, Kenneth G.
6 Patra, Arpita
6 Qin, Bo
6 Schröder, Dominique
6 Segev, Gil
6 Stebila, Douglas
6 Unruh, Dominique
6 Wee, Hoeteck
6 Zhang, Zhenfeng
6 Zikas, Vassilis
5 Albrecht, Martin R.
5 Asharov, Gilad
5 Boyle, Elette
5 Chen, Jie
5 Chen, Yu
5 Cohen, Ran
5 Cremers, Cas J. F.
5 Deng, Yi
5 Domingo-Ferrer, Josep
5 Fiore, Dario
5 González Nieto, Juan Manuel
5 Huang, Qiong
5 Kiyoshima, Susumu
5 Küsters, Ralf
5 Long, Yu
5 Matsuda, Takahiro
5 Maurer, Ueli M.
5 Meshram, Chandrashekhar
5 Neven, Gregory
5 Ohta, Kazuo
5 Omri, Eran
...and 1,275 more Authors
all top 5

Cited in 80 Serials

136 Journal of Cryptology
66 Theoretical Computer Science
51 Designs, Codes and Cryptography
45 Information Sciences
21 Journal of Computer and System Sciences
19 Information and Computation
18 Information Processing Letters
17 SIAM Journal on Computing
12 Algorithmica
11 Distributed Computing
8 Quantum Information Processing
8 Science in China. Series F
7 Computational Complexity
6 International Journal of Foundations of Computer Science
6 Soft Computing
6 Journal of Shanghai Jiaotong University (Science)
6 Journal of Mathematical Cryptology
6 Science China. Information Sciences
5 Discrete Applied Mathematics
5 Mathematical and Computer Modelling
5 Finite Fields and their Applications
5 Frontiers of Computer Science
4 International Journal of Computer Mathematics
4 Applicable Algebra in Engineering, Communication and Computing
4 Theory of Computing Systems
4 Advances in Mathematics of Communications
3 European Journal of Operational Research
3 Journal of Scheduling
3 Journal of Discrete Mathematical Sciences & Cryptography
2 Computers & Mathematics with Applications
2 International Journal of Theoretical Physics
2 Mathematics of Computation
2 Journal of Number Theory
2 The Journal of Symbolic Logic
2 Proceedings of the American Mathematical Society
2 Operations Research Letters
2 Journal of Symbolic Computation
2 Computers & Operations Research
2 Formal Aspects of Computing
2 MSCS. Mathematical Structures in Computer Science
2 Formal Methods in System Design
2 Nonlinear Dynamics
2 Journal of Combinatorial Optimization
2 Journal of the ACM
2 International Journal of Applied Mathematics and Computer Science
2 The Journal of Logic and Algebraic Programming
2 International Journal of Quantum Information
2 Journal of Zhejiang University. Science A
1 Acta Informatica
1 Discrete Mathematics
1 Israel Journal of Mathematics
1 Rocky Mountain Journal of Mathematics
1 Canadian Mathematical Bulletin
1 Computing
1 Mathematika
1 Synthese
1 Cryptologia
1 Annals of Pure and Applied Logic
1 Journal of Complexity
1 Journal of Automated Reasoning
1 SIAM Journal on Discrete Mathematics
1 Journal of Parallel and Distributed Computing
1 Discrete Event Dynamic Systems
1 Bulletin of the American Mathematical Society. New Series
1 Mathematical Programming. Series A. Series B
1 Annals of Mathematics and Artificial Intelligence
1 Mathematical Problems in Engineering
1 Wuhan University Journal of Natural Sciences (WUJNS)
1 LMS Journal of Computation and Mathematics
1 Journal of Systems Science and Complexity
1 Electronic Commerce Research
1 Sādhanā
1 Comptes Rendus. Mathématique. Académie des Sciences, Paris
1 Journal of Discrete Algorithms
1 Annales Universitatis Mariae Curie-Skłodowska. Sectio A1. Informatica
1 Journal of Physics A: Mathematical and Theoretical
1 Cryptography and Communications
1 Symmetry
1 Arabian Journal for Science and Engineering
1 Computer Science Review

Citations by Year