Can you hide secrets in software code? Program obfuscation aims to do exactly that. In addition to direct applications such as protecting intellectual property in software, obfuscation also has numerous applications in cryptography. In fact, it is now widely considered to be "Crypto Complete." Yet numerous quesitons still remain: can obfuscation be made practical? Can it be based on "standard" computational assumptions?

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption
By James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai and Mark Zhandry
In ITCS 2020

The Distinction Between Fixed and Random Generators in Group-Based Assumptions
By James Bartusek, Fermi Ma and Mark Zhandry
In CRYPTO 2019

Revisiting Post-Quantum Fiat-Shamir
By Qipeng Liu and Mark Zhandry
In CRYPTO 2019

New Techniques for Obfuscating Conjunctions
By James Bartusek, Tancrède Lepoint, Fermi Ma and Mark Zhandry
In EUROCRYPT 2019

Quantum Lightning Never Strikes the Same State Twice
By Mark Zhandry
In EUROCRYPT 2019 (Best Paper), Journal of Cryptology (Invited)

Preventing Zeroizing Attacks on GGH15
By James Bartusek, Fermi Ma, Jiaxin Guan and Mark Zhandry
In TCC 2018

The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks
By Fermi Ma and Mark Zhandry
In TCC 2018

Decomposable Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness
By Qipeng Liu and Mark Zhandry
In TCC 2017, Journal of Cryptology (Invited)

Breaking the Sub-Exponential Barrier in Obfustopia
By Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan and Mark Zhandry
In EUROCRYPT 2017

Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
By Fermi Ma and Mark Zhandry

How to Generate and use Universal Samplers
By Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters and Mark Zhandry
In ASIACRYPT 2016

Secure Obfuscation in a Weak Multilinear Map Model
By Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan and Mark Zhandry
In TCC 2016-B

The Magic of ELFs
By Mark Zhandry
In CRYPTO 2016 (Early Career Award), Journal of Cryptology (Invited)

Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
By Eric Miles, Amit Sahai and Mark Zhandry
In CRYPTO 2016

Post-Zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
By Saikrishna Badrinarayanan, Eric Miles, Amit Sahai and Mark Zhandry
In EUROCRYPT 2016

Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
By Ryo Nishimaki, Daniel Wichs and Mark Zhandry
In EUROCRYPT 2016

Order-Revealing Encryption and the Hardness of Private Learning
By Mark Bun and Mark Zhandry
In TCC 2016-A

Cutting-Edge Cryptography Through the Lens of Secret Sharing
By Ilan Komargodski and Mark Zhandry
In TCC 2016-A, Information and Computation

Adaptively Secure Broadcast Encryption with Small System Parameters
By Mark Zhandry

Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
By Dan Boneh and Mark Zhandry
In CRYPTO 2014, Algorithmica (Invited to Special Issue on Algorithmic Tools in Cryptography)

Differing-Inputs Obfuscation and Applications
By Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai and Mark Zhandry