Publications

All     Differential Privacy     Multilinear Maps     Obfuscation     Quantum     Traitor Tracing  
[GPSZ17] Breaking the Sub-Exponential Barrier in Obfustopia
By Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan, and Mark Zhandry
EUROCRYPT 2017
[PDF] 
[ePrint] 
[LZ17] Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness
By Qipeng Liu and Mark Zhandry
[PDF] 
[ePrint] 
[MZ17] Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
By Fermi Ma and Mark Zhandry
[PDF] 
[ePrint] 
[HJK+16] How to Generate and use Universal Samplers
By Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, and Mark Zhandry
AsiaCrypt 2016
[PDF] 
[ePrint] 
[Zha16c] A Note on Quantum-Secure PRPs
By Mark Zhandry
[PDF] 
[ePrint] 
[GMM+16] Secure Obfuscation in a Weak Multilinear Map Model
By Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, and Mark Zhandry
TCC 2016-B
[PDF] 
[ePrint] 
Merged version of [BMS16] and [MSZ16]
[KMUZ16] Strong Hardness of Privacy from Weak Traitor Tracing
By Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, and Mark Zhandry
TCC 2016-B
[PDF] 
[ePrint] 
[GYZ16] New Security Notions and Feasibility Results for Authentication of Quantum Data
By Sumegha Garg, Henry Yuen, and Mark Zhandry
QCrypt 2016
[PDF] 
[arXiv] 
[Zha16b] The Magic of ELFs
By Mark Zhandry
CRYPTO 2016  (Best Young Researcher Award)
[PDF] 
[ePrint]  [slides] 
[MSZ16b] Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
By Eric Miles, Amit Sahai, and Mark Zhandry
CRYPTO 2016
[PDF] 
[ePrint] 
[MSZ16a] Secure Obfuscation in a Weak Multilinear Map Model: A Simple Construction Secure Against All Known Attacks
By Eric Miles, Amit Sahai, and Mark Zhandry
[PDF] 
[ePrint] 
[NWZ16] Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
By Ryo Nishimaki, Daniel Wichs, and Mark Zhandry
EUROCRYPT 2016
[PDF] 
[ePrint] 
[BMSZ16] Post-Zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
By Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, and Mark Zhandry
EUROCRYPT 2016
[PDF] 
[ePrint]  [slides] 
[GGHZ16] Functional Encryption without Obfuscation
By Sanjam Garg, Craig Gentry, Shai Halevi, and Mark Zhandry
TCC 2016-A
[PDF] 
[ePrint]  [slides] 
[KZ16] Cutting-Edge Cryptography Through the Lens of Secret Sharing
By Ilan Komargodski and Mark Zhandry
TCC 2016-A
[PDF] 
[ePrint] 
[Zha16a] How to Avoid Obfuscation Using Witness PRFs
By Mark Zhandry
TCC 2016-A
[PDF] 
[ePrint] 
[BZ16] Order-Revealing Encryption and the Hardness of Private Learning
By Mark Bun and Mark Zhandry
TCC 2016-A
[PDF] 
[arXiv] 
[Zha15c] Quantum Oracle Classification: The Case of Group Structure
By Mark Zhandry
[PDF] 
[arXiv] 
[Zha15b] Secure Identity-Based Encryption in the Quantum Random Oracle Model
By Mark Zhandry
CRYPTO 2012, International Journal of Quantum Information
[PDF] 
[ePrint]  [slides] 
[Zha15a] A Note on the Quantum Collision and Set Equality Problems
By Mark Zhandry
Quantum Information and Computation
[PDF] 
[arXiv] 
[BLR+15] Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
By Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, and Joe Zimmerman
EUROCRYPT 2015
[PDF] 
[ePrint] 
[SZ14] Obfuscating Low-Rank Matrix Branching Programs
By Amit Sahai and Mark Zhandry
[PDF] 
[ePrint] 
Subsumed by [BMSZ16]
[Zha14] Adaptively Secure Broadcast Encryption with Small System Parameters
By Mark Zhandry
[PDF] 
[ePrint] 
[BZ14] Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
By Dan Boneh and Mark Zhandry
CRYPTO 2014
[PDF] 
[ePrint]  [slides] 
[BWZ14] Low Overhead Broadcast Encryption from Multilinear Maps
By Dan Boneh, Brent Waters, and Mark Zhandry
CRYPTO 2014
[PDF] 
[ePrint]  [slides] 
[GGHZ14] Fully Secure Attribute Based Encryption from Multilinear Maps
By Sanjam Garg, Craig Gentry, Shai Halevi, and Mark Zhandry
[PDF] 
[ePrint] 
[ABG+13] Differing-Inputs Obfuscation and Applications
By Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai, and Mark Zhandry
[PDF] 
[ePrint] 
[BZ13b] Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
By Dan Boneh and Mark Zhandry
CRYPTO 2013
[PDF] 
[ePrint]  [slides] 
[BZ13a] Quantum-Secure Message Authentication Codes
By Dan Boneh and Mark Zhandry
EUROCRYPT 2013
[PDF] 
[ePrint]  [slides] 
[Zha12] How to Construct Quantum Random Functions
By Mark Zhandry
FOCS 2012
[PDF] 
[ePrint]  [slides] 
[BDF+11] Random Oracles in a Quantum World
By Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, and Mark Zhandry
AsiaCrypt 2011
[PDF] 
[ePrint]  [slides]