Publications

All     Bounded Storage Model     Deterministic Encryption     Differential Privacy     Indifferentiability     Multilinear Maps     Obfuscation     Order-Revealing Encryption     Quantum     Traitor Tracing  
[KMUZ16] Strong Hardness of Privacy from Weak Traitor Tracing
By Lucas Kowalczyk, Tal Malkin, Jonathan Ullman, and Mark Zhandry
TCC 2016-B
[PDF] 
[ePrint] 
[NWZ16] Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
By Ryo Nishimaki, Daniel Wichs, and Mark Zhandry
EUROCRYPT 2016
[PDF] 
[ePrint] 
[BZ14] Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
By Dan Boneh and Mark Zhandry
CRYPTO 2014
[PDF] 
[ePrint]  [slides]