Year |
Citation |
Score |
2020 |
Lin H, Pass R, Soni P. Two-Round and Non-Interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles Siam Journal On Computing. 49. DOI: 10.1137/17M1163177 |
0.324 |
|
2019 |
Halpern JY, Pass R. A Conceptually Well-Founded Characterization of Iterated Admissibility Using an "All I Know" Operator Arxiv: Computer Science and Game Theory. 297: 221-232. DOI: 10.4204/Eptcs.297.15 |
0.3 |
|
2017 |
Halpern JY, Pass R. A Knowledge-Based Analysis of the Blockchain Protocol Electronic Proceedings in Theoretical Computer Science. 251: 324-335. DOI: 10.4204/EPTCS.251.22 |
0.314 |
|
2017 |
Austrin P, Chung K, Mahmoody M, Pass R, Seth K. On the Impossibility of Cryptography with Tamperable Randomness Algorithmica. 79: 1052-1101. DOI: 10.1007/S00453-016-0219-7 |
0.41 |
|
2016 |
Chung KM, Pass R, Seth K. Non-black-box simulation from one-way functions and applications to resettable security Siam Journal On Computing. 45: 415-458. DOI: 10.1137/130946083 |
0.463 |
|
2016 |
Canetti R, Lin H, Pass R. Adaptive Hardness and Composable Security in the Plain Model from Standard Assumptions Siam Journal On Computing. 45: 1793-1834. DOI: 10.1137/110847196 |
0.421 |
|
2016 |
Marcedone A, Pass R, Shelat A. Bounded KDM security from iO and OWF Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9841: 571-586. DOI: 10.1007/978-3-319-44618-9_30 |
0.332 |
|
2015 |
Chen J, Micali S, Pass R. Tight Revenue Bounds With Possibilistic Beliefs and Level-k Rationality Econometrica. 83: 1619-1639. DOI: 10.3982/Ecta12563 |
0.317 |
|
2015 |
Lin H, Pass R. Constant-round nonmalleable commitments from any one-way function Journal of the Acm. 62: 5. DOI: 10.1145/2699446 |
0.468 |
|
2015 |
Halpern JY, Pass R. Algorithmic rationality: Game theory with costly computation Journal of Economic Theory. 156: 246-268. DOI: 10.1016/J.Jet.2014.04.007 |
0.314 |
|
2015 |
Chung KM, Lin H, Pass R. Constant-round concurrent zero-knowledge from indistinguishability obfuscation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9215: 287-307. DOI: 10.1007/978-3-662-47989-6_14 |
0.398 |
|
2015 |
Chung KM, Lui E, Pass R. From weak to Strong Zero-knowledge and applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9014: 66-92. |
0.384 |
|
2015 |
Goyal V, Lin H, Pandey O, Pass R, Sahai A. Round-efficient concurrently composable secure computation via a robust extraction lemma Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9014: 260-289. |
0.346 |
|
2014 |
Halpern JY, Pass R, Seeman L. The truth behind the myth of the folk theorem Itcs 2014 - Proceedings of the 2014 Conference On Innovations in Theoretical Computer Science. 543-552. DOI: 10.1016/J.Geb.2019.04.008 |
0.327 |
|
2014 |
Pass R, Dustin Tseng WL, Venkitasubramaniam M. Concurrent zero knowledge, revisited Journal of Cryptology. 27: 45-66. DOI: 10.1007/S00145-012-9137-2 |
0.716 |
|
2014 |
Chung KM, Ostrovsky R, Pass R, Venkitasubramaniam M, Visconti I. 4-round resettably-sound zero knowledge Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8349: 192-216. DOI: 10.1007/978-3-642-54242-8_9 |
0.764 |
|
2013 |
Chung KM, Ostrovsky R, Pass R, Visconti I. Simultaneous resettability from one-way functions Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 60-69. DOI: 10.1109/FOCS.2013.15 |
0.521 |
|
2013 |
Halpern JY, Pass R. Conservative belief and rationality Games and Economic Behavior. 80: 186-192. DOI: 10.1016/J.Geb.2013.03.004 |
0.304 |
|
2013 |
Pass R, Rosen A, Tseng WLD. Public-coin parallel zero-knowledge for NP Journal of Cryptology. 26: 1-10. DOI: 10.1007/S00145-011-9110-5 |
0.483 |
|
2013 |
Pass R. Unprovable security of perfect NIZK and non-interactive non-malleable commitments Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7785: 334-354. DOI: 10.1007/S00037-016-0122-2 |
0.426 |
|
2012 |
Pass R, Venkitasubramaniam M. A parallel repetition theorem for constant-round Arthur-Merlin Proofs Acm Transactions On Computation Theory. 4. DOI: 10.1145/2382559.2382561 |
0.732 |
|
2012 |
Roeder T, Pass R, Schneider FB. Multi-verifier signatures Journal of Cryptology. 25: 310-348. DOI: 10.1007/S00145-010-9096-4 |
0.409 |
|
2012 |
Pass R, Lin H, Venkitasubramaniam M. A unified framework for UC from only OT Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7658: 699-717. DOI: 10.1007/978-3-642-34961-4_42 |
0.728 |
|
2012 |
Chung KM, Pass R, Tseng WLD. The knowledge tightness of parallel zero-knowledge Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7194: 512-529. DOI: 10.1007/978-3-642-28914-9_29 |
0.425 |
|
2011 |
Lin H, Pass R. Constant-round non-malleable commitments from any one-way function Proceedings of the Annual Acm Symposium On Theory of Computing. 705-714. DOI: 10.1145/1993636.1993730 |
0.391 |
|
2011 |
Pass R. Limits of provable security from standard assumptions Proceedings of the Annual Acm Symposium On Theory of Computing. 109-118. DOI: 10.1145/1993636.1993652 |
0.332 |
|
2011 |
Barak B, Canetti R, Lindell Y, Pass R, Rabin T. Secure Computation Without Authentication Journal of Cryptology. 24: 720-760. DOI: 10.1007/S00145-010-9075-9 |
0.411 |
|
2011 |
Pass R, Tseng WLD, Venkitasubramaniam M. Towards non-black-box lower bounds in cryptography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6597: 579-596. DOI: 10.1007/978-3-642-19571-6_35 |
0.731 |
|
2011 |
Lin H, Pass R. Concurrent non-malleable zero knowledge with adaptive inputs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6597: 274-292. DOI: 10.1007/978-3-642-19571-6_17 |
0.389 |
|
2011 |
Pass R. Concurrent security and non-malleability Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6597: 540. |
0.316 |
|
2010 |
Lin H, Pass R, Tseng WLD, Venkitasubramaniam M. Concurrent non-malleable zero knowledge proofs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6223: 429-446. DOI: 10.1007/978-3-642-14623-7_23 |
0.748 |
|
2010 |
Pass R, Wee H. Constant-round non-malleable commitments from sub-exponential one-way functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6110: 638-655. DOI: 10.1007/978-3-642-13190-5_32 |
0.395 |
|
2010 |
Pass R, Venkitasubramaniam M. Private coins versus public coins in zero-knowledge proof systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5978: 588-605. DOI: 10.1007/978-3-642-11799-2_35 |
0.706 |
|
2010 |
Pass R, Tseng WLD, Venkitasubramaniam M. Eye for an eye: Efficient concurrent zero-knowledge in the timing model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5978: 518-534. DOI: 10.1007/978-3-642-11799-2_31 |
0.712 |
|
2009 |
Halpern JY, Pass R, Raman V. An epistemic characterization of zero knowledge Proceedings of the 12th Conference On Theoretical Aspects of Rationality and Knowledge, Tark '09. 156-165. DOI: 10.1145/1562814.1562837 |
0.333 |
|
2009 |
Lin H, Pass R, Venkitasubramaniam M. A unified framework for concurrent security: Universal composability from stand-alone non-malleability Proceedings of the Annual Acm Symposium On Theory of Computing. 179-188. DOI: 10.1145/1536414.1536441 |
0.714 |
|
2009 |
Pass R, Tseng WLD, Wikström D. On the composition of public-coin zero-knowledge protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5677: 160-176. DOI: 10.1137/100811465 |
0.5 |
|
2009 |
Pass R, Wee H. Black-box constructions of two-party protocols from one-way functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5444: 403-418. DOI: 10.1007/978-3-642-00457-5_24 |
0.438 |
|
2008 |
Pass R, Rosen A. New and improved constructions of nonmalleable cryptographic protocols Siam Journal On Computing. 38: 702-752. DOI: 10.1137/060671553 |
0.339 |
|
2008 |
Pandey O, Pass R, Sahai A, Tseng WLD, Venkitasubramaniam M. Precise concurrent zero knowledge Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4965: 397-414. DOI: 10.1007/978-3-540-78967-3_23 |
0.748 |
|
2008 |
Lin H, Pass R, Venkitasubramaniam M. Concurrent non-malleable commitments from any one-way function Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4948: 571-588. DOI: 10.1007/978-3-540-78524-8_31 |
0.738 |
|
2008 |
Pass R, Venkitasubramaniam M. On constant-round concurrent zero-knowledge Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4948: 553-570. DOI: 10.1007/978-3-540-78524-8_30 |
0.728 |
|
2007 |
Pass R, Venkitasubramaniam M. An efficient parallel repetition theorem for Arthur-Merlin games Proceedings of the Annual Acm Symposium On Theory of Computing. 420-429. DOI: 10.1145/1250790.1250853 |
0.717 |
|
2007 |
Canetti R, Dodis Y, Pass R, Walfish S. Universally composable security with global setup Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4392: 61-85. |
0.328 |
|
2006 |
Micali S, Pass R. Local zero knowledge Proceedings of the Annual Acm Symposium On Theory of Computing. 2006: 306-315. |
0.32 |
|
2005 |
Pass R, Rosen A. New and improved constructions of non-malleable cryptographic protocols Proceedings of the Annual Acm Symposium On Theory of Computing. 533-542. DOI: 10.1137/060671553 |
0.487 |
|
2005 |
Pass R, Rosen A. Concurrent non-malleable commitments Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 2005: 563-572. DOI: 10.1137/060661880 |
0.428 |
|
2004 |
Barak B, Pass R. On the possibility of one-message weak zero-knowledge Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2951: 121-132. |
0.356 |
|
2004 |
Pass R. Bounded-concurrent secure multi-party computation with a dishonest majority Conference Proceedings of the Annual Acm Symposium On Theory of Computing. 232-241. |
0.362 |
|
2003 |
Pass R, Rosen A. Bounded-concurrent secure two-party computation in a constant number of rounds Annual Symposium On Foundations of Computer Science - Proceedings. 404-413. DOI: 10.1109/SFCS.2003.1238214 |
0.359 |
|
2003 |
Pass R. Simulation in quasi-polynomial time, and its application to protocol composition Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2656: 160-176. |
0.341 |
|
Show low-probability matches. |