Publications

All     Differential Privacy     Multilinear Maps     Obfuscation     Order-Revealing Encryption     Quantum     Traitor Tracing  
[LZ17] Decomposable Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness
By Qipeng Liu and Mark Zhandry
TCC 2017
[PDF] 
[ePrint] 
[Zha17] Quantum Lightning Never Strikes the Same State Twice
By Mark Zhandry
[PDF] 
[ePrint] 
[MZ17b] New Multilinear Maps from CLT13 with Provable Security Against Zeroizing Attacks
By Fermi Ma and Mark Zhandry
[PDF] 
[ePrint] 
[GPSZ17] Breaking the Sub-Exponential Barrier in Obfustopia
By Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan, and Mark Zhandry
EUROCRYPT 2017
[PDF] 
[ePrint] 
[MZ17a] Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
By Fermi Ma and Mark Zhandry
[PDF] 
[ePrint] 
[HJK+16] How to Generate and use Universal Samplers
By Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, and Mark Zhandry
AsiaCrypt 2016
[PDF] 
[ePrint] 
[KMUZ16] Strong Hardness of Privacy from Weak Traitor Tracing
By Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, and Mark Zhandry
TCC 2016-B
[PDF] 
[ePrint] 
[GMM+16] Secure Obfuscation in a Weak Multilinear Map Model
By Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, and Mark Zhandry
TCC 2016-B
[PDF] 
[ePrint] 
Merged version of [BMS16] and [MSZ16]
[Zha16b] The Magic of ELFs
By Mark Zhandry
CRYPTO 2016  (Best Young Researcher Award)
[PDF] 
[ePrint]  [slides] 
[MSZ16b] Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
By Eric Miles, Amit Sahai, and Mark Zhandry
CRYPTO 2016
[PDF] 
[ePrint] 
[MSZ16a] Secure Obfuscation in a Weak Multilinear Map Model: A Simple Construction Secure Against All Known Attacks
By Eric Miles, Amit Sahai, and Mark Zhandry
[PDF] 
[ePrint] 
[NWZ16] Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
By Ryo Nishimaki, Daniel Wichs, and Mark Zhandry
EUROCRYPT 2016
[PDF] 
[ePrint] 
[BMSZ16] Post-Zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
By Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, and Mark Zhandry
EUROCRYPT 2016
[PDF] 
[ePrint]  [slides] 
[Zha16a] How to Avoid Obfuscation Using Witness PRFs
By Mark Zhandry
TCC 2016-A
[PDF] 
[ePrint] 
[KZ16] Cutting-Edge Cryptography Through the Lens of Secret Sharing
By Ilan Komargodski and Mark Zhandry
TCC 2016-A
[PDF] 
[ePrint] 
[BLR+15] Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
By Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, and Joe Zimmerman
EUROCRYPT 2015
[PDF] 
[ePrint] 
[SZ14] Obfuscating Low-Rank Matrix Branching Programs
By Amit Sahai and Mark Zhandry
[PDF] 
[ePrint] 
Subsumed by [BMSZ16]
[Zha14] Adaptively Secure Broadcast Encryption with Small System Parameters
By Mark Zhandry
[PDF] 
[ePrint] 
[BZ14] Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
By Dan Boneh and Mark Zhandry
CRYPTO 2014
[PDF] 
[ePrint]  [slides] 
[ABG+13] Differing-Inputs Obfuscation and Applications
By Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai, and Mark Zhandry
[PDF] 
[ePrint]