Jonathan Katz - Publications

Affiliations: 
Computer Science University of Maryland, College Park, College Park, MD 
Area:
Theoretical Computer Science,Security

25 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Gordon SD, Katz J, Kumaresan R, Yerukhimovich A. Authenticated broadcast with a partially compromised public-key infrastructure Information and Computation. 234: 17-25. DOI: 10.1016/J.Ic.2013.11.003  0.317
2014 Dachman-Soled D, Fleischhacker N, Katz J, Lysyanskaya A, Schröder D. Feasibility and infeasibility of secure computation with malicious PUFs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 405-420. DOI: 10.1007/S00145-019-09329-9  0.401
2014 Choi SG, Katz J, Schröder D, Yerukhimovich A, Zhou HS. (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8349: 638-662. DOI: 10.1007/S00145-018-9288-X  0.384
2013 Katz J. Review of Applied Information Security by David Basin, Patrick Schaller, and Michael Schläpfer Sigact News. 44: 38-40. DOI: 10.1145/2447712.2447725  0.31
2013 Katz J, Vaikuntanathan V. Round-Optimal Password-Based Authenticated Key Exchange Journal of Cryptology. 26: 714-743. DOI: 10.1007/S00145-012-9133-6  0.34
2013 Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products Journal of Cryptology. 26: 191-224. DOI: 10.1007/S00145-012-9119-4  0.335
2012 Katz J. Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell Sigact News. 43: 21-23. DOI: 10.1145/2160649.2160656  0.359
2012 Katz J, MacKenzie P, Taban G, Gligor V. Two-server password-only authenticated key exchange Journal of Computer and System Sciences. 78: 651-669. DOI: 10.1016/J.Jcss.2011.09.005  0.371
2012 Gordon SD, Katz J. Partial fairness in secure two-party computation Journal of Cryptology. 25: 14-40. DOI: 10.1007/S00145-010-9079-5  0.387
2011 Gordon SD, Hazay C, Katz J, Lindell Y. Complete fairness in secure two-party computation Journal of the Acm. 58. DOI: 10.1145/2049697.2049698  0.391
2011 Ishai Y, Katz J, Kushilevitz E, Lindell Y, Petrank E. On Achieving the “Best of Both Worlds” in Secure Multiparty Computation Siam Journal On Computing. 40: 122-141. DOI: 10.1137/100783224  0.41
2010 Horvitz O, Katz J. Bounds on the efficiency of black-box commitment schemes Theoretical Computer Science. 411: 1251-1260. DOI: 10.1016/J.Tcs.2009.10.021  0.33
2010 Katz J, Shin JS, Smith A. Parallel and Concurrent Security of the HB and HB+ Protocols Journal of Cryptology. 23: 402-421. DOI: 10.1007/S00145-010-9061-2  0.376
2009 Katz J, Ostrovsky R, Yung M. Efficient and secure authenticated key exchange using weak passwords Journal of the Acm. 57: 1-39. DOI: 10.1145/1613676.1613679  0.423
2009 Katz J, Koo C. On expected constant-round protocols for Byzantine agreement Journal of Computer and System Sciences. 75: 91-112. DOI: 10.1016/J.Jcss.2008.08.001  0.309
2009 Haitner I, Horvitz O, Katz J, Koo CY, Morselli R, Shaltiel R. Reducing complexity assumptions for statistically-hiding commitment Journal of Cryptology. 22: 283-310. DOI: 10.1007/S00145-007-9012-8  0.342
2009 Bender A, Katz J, Morselli R. Ring signatures: Stronger definitions, and constructions without random oracles Journal of Cryptology. 22: 114-138. DOI: 10.1007/S00145-007-9011-9  0.352
2007 Goh EJ, Jarecki S, Katz J, Wang N. Efficient signature schemes with tight reductions to the Diffie-Hellman problems Journal of Cryptology. 20: 493-514. DOI: 10.1007/S00145-007-0549-3  0.374
2007 Canetti R, Halevi S, Katz J. A Forward-Secure Public-Key Encryption Scheme Journal of Cryptology. 20: 265-294. DOI: 10.1007/S00145-006-0442-5  0.39
2006 Boneh D, Canetti R, Halevi S, Katz J. Chosen-Ciphertext Security from Identity-Based Encryption Siam Journal On Computing. 36: 1301-1328. DOI: 10.1137/S009753970544713X  0.393
2006 Gennaro R, Gertner Y, Katz J, Trevisan L. Bounds on the efficiency of generic cryptographic constructions Siam Journal On Computing. 35: 217-246. DOI: 10.1137/S0097539704443276  0.344
2006 Katz J, Yung M. Characterization of security notions for probabilistic private-key encryption Journal of Cryptology. 19: 67-95. DOI: 10.1007/S00145-005-0310-8  0.562
2005 Katz J. Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001) Sigact News. 36: 14-19. DOI: 10.1145/1067309.1067316  0.34
2005 Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A. A pairwise key predistribution scheme for wireless sensor networks Acm Transactions On Information and System Security (Tissec). 8: 228-258. DOI: 10.1145/1065545.1065548  0.314
2003 Katz J, Yung M. Scalable protocols for authenticated group key exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2729: 110-125. DOI: 10.1007/S00145-006-0361-5  0.556
Show low-probability matches.