Jonathan Katz - Publications

Affiliations: 
Computer Science University of Maryland, College Park, College Park, MD 
Area:
Theoretical Computer Science,Security

25 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Gordon SD, Katz J, Kumaresan R, Yerukhimovich A. Authenticated broadcast with a partially compromised public-key infrastructure Information and Computation. 234: 17-25. DOI: 10.1016/J.Ic.2013.11.003  0.316
2014 Dachman-Soled D, Fleischhacker N, Katz J, Lysyanskaya A, Schröder D. Feasibility and infeasibility of secure computation with malicious PUFs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 405-420. DOI: 10.1007/S00145-019-09329-9  0.399
2014 Choi SG, Katz J, Schröder D, Yerukhimovich A, Zhou HS. (Efficient) universally composable oblivious transfer using a minimal number of stateless tokens Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8349: 638-662. DOI: 10.1007/S00145-018-9288-X  0.382
2013 Katz J. Review of Applied Information Security by David Basin, Patrick Schaller, and Michael Schläpfer Sigact News. 44: 38-40. DOI: 10.1145/2447712.2447725  0.308
2013 Katz J, Vaikuntanathan V. Round-Optimal Password-Based Authenticated Key Exchange Journal of Cryptology. 26: 714-743. DOI: 10.1007/S00145-012-9133-6  0.338
2013 Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products Journal of Cryptology. 26: 191-224. DOI: 10.1007/S00145-012-9119-4  0.333
2012 Katz J. Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell Sigact News. 43: 21-23. DOI: 10.1145/2160649.2160656  0.357
2012 Katz J, MacKenzie P, Taban G, Gligor V. Two-server password-only authenticated key exchange Journal of Computer and System Sciences. 78: 651-669. DOI: 10.1016/J.Jcss.2011.09.005  0.369
2012 Gordon SD, Katz J. Partial fairness in secure two-party computation Journal of Cryptology. 25: 14-40. DOI: 10.1007/S00145-010-9079-5  0.384
2011 Gordon SD, Hazay C, Katz J, Lindell Y. Complete fairness in secure two-party computation Journal of the Acm. 58. DOI: 10.1145/2049697.2049698  0.388
2011 Ishai Y, Katz J, Kushilevitz E, Lindell Y, Petrank E. On Achieving the “Best of Both Worlds” in Secure Multiparty Computation Siam Journal On Computing. 40: 122-141. DOI: 10.1137/100783224  0.407
2010 Horvitz O, Katz J. Bounds on the efficiency of black-box commitment schemes Theoretical Computer Science. 411: 1251-1260. DOI: 10.1016/J.Tcs.2009.10.021  0.329
2010 Katz J, Shin JS, Smith A. Parallel and Concurrent Security of the HB and HB+ Protocols Journal of Cryptology. 23: 402-421. DOI: 10.1007/S00145-010-9061-2  0.374
2009 Katz J, Ostrovsky R, Yung M. Efficient and secure authenticated key exchange using weak passwords Journal of the Acm. 57: 1-39. DOI: 10.1145/1613676.1613679  0.42
2009 Katz J, Koo C. On expected constant-round protocols for Byzantine agreement Journal of Computer and System Sciences. 75: 91-112. DOI: 10.1016/J.Jcss.2008.08.001  0.308
2009 Haitner I, Horvitz O, Katz J, Koo CY, Morselli R, Shaltiel R. Reducing complexity assumptions for statistically-hiding commitment Journal of Cryptology. 22: 283-310. DOI: 10.1007/S00145-007-9012-8  0.34
2009 Bender A, Katz J, Morselli R. Ring signatures: Stronger definitions, and constructions without random oracles Journal of Cryptology. 22: 114-138. DOI: 10.1007/S00145-007-9011-9  0.351
2007 Goh EJ, Jarecki S, Katz J, Wang N. Efficient signature schemes with tight reductions to the Diffie-Hellman problems Journal of Cryptology. 20: 493-514. DOI: 10.1007/S00145-007-0549-3  0.372
2007 Canetti R, Halevi S, Katz J. A Forward-Secure Public-Key Encryption Scheme Journal of Cryptology. 20: 265-294. DOI: 10.1007/S00145-006-0442-5  0.388
2006 Boneh D, Canetti R, Halevi S, Katz J. Chosen-Ciphertext Security from Identity-Based Encryption Siam Journal On Computing. 36: 1301-1328. DOI: 10.1137/S009753970544713X  0.39
2006 Gennaro R, Gertner Y, Katz J, Trevisan L. Bounds on the efficiency of generic cryptographic constructions Siam Journal On Computing. 35: 217-246. DOI: 10.1137/S0097539704443276  0.342
2006 Katz J, Yung M. Characterization of security notions for probabilistic private-key encryption Journal of Cryptology. 19: 67-95. DOI: 10.1007/S00145-005-0310-8  0.561
2005 Katz J. Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001) Sigact News. 36: 14-19. DOI: 10.1145/1067309.1067316  0.339
2005 Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A. A pairwise key predistribution scheme for wireless sensor networks Acm Transactions On Information and System Security (Tissec). 8: 228-258. DOI: 10.1145/1065545.1065548  0.313
2003 Katz J, Yung M. Scalable protocols for authenticated group key exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2729: 110-125. DOI: 10.1007/S00145-006-0361-5  0.555
Show low-probability matches.