Leonid Reyzin's Research Papers (And a Few Talks and Implementations) by Topic
(click here to get them sorted chronologically instead)
- Protocols
- Can a Public Blockchain Keep a Secret? by Fabrice Benhamouda, Craig Gentry, Sergey Gorbunov, Shai Halevi, Hugo Krawczyk, Tal Rabin, and Leonid Reyzin. Appears in TCC 2020.
- Turning HATE Into LOVE: Homomorphic Ad Hoc Threshold Encryption for Scalable MPC by Leonid Reyzin, Adam Smith, and Sophia Yakoubov. To appear in CSCML 2021.
- A Comparative Evaluation of Order-Preserving and Order-Revealing Schemes and Protocols by Dmytro Bogatov, George Kollios, and Leonid Reyzin. Appears in VLDB 2019 (winner of the Reproducibility Award). Implementation Available
- Efficient Noninteractive Certification of RSA Moduli and Beyond by Sharon Goldberg, Leonid Reyzin, Omar Sagga, and Foteini Baldimtsi. Appears in Asiacrypt 2019.
- Authenticated Data Structures, DNSSEC, Accumulators
-
Aardvark: A Concurrent Authenticated Dictionary with Short Proofs by Derek Leung, Yossi Gilad, Sergey Gorbunov, Leonid Reyzin, and Nickolai Zeldovich
-
Pointproofs: Aggregating Proofs for Multiple Vector Commitments by Sergey Gorbunov, Leonid Reyzin, Hoeteck Wee, and Zhenfei Zhang. Appears in ACM CCS 2020.
Implementation available.
Talk at zkSummit 6.
- Accumulators with Applications to Anonymity-Preserving Revocation by
Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, and Sophia Yakoubov. Appears in EuroS&P 2017.
- Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies by Leonid Reyzin, Dmitry Meshkov, Alexander Chepurnoy, and Sasha Ivanov. Appears in Financial Cryptography 2017. Slides and video of my talk at Real World Crypto 2017. Implementation Available.
-
Efficient Asynchronous Accumulators for Distributed PKI by Leonid Reyzin and Sophia Yakoubov. Appears in SCN 2016.
-
NSEC5 Project:
-
Authenticated Index Structures for Aggregation
Queries,
by Feifei Li, Marios Hadjieleftheriou, George Kollios, and Leonid Reyzin.
ACM Transactions on Information and System Security (TISSEC) 13(4), 2010. Implementation available.
-
Dynamic Authenticated Index Structures for Outsourced Databases,
by Feifei Li, Marios Hadjieleftheriou, George Kollios, and Leonid Reyzin.
Appears in SIGMOD 2006. Implementation available.
-
Mercurial Commitments with Applications to Zero-Knowledge Sets
by Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, and Leonid Reyzin.
Appears in Eurocrypt 2005 and Journal of Cryptology 2013.
Memory-Hard Functions and Proofs of Space
- Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space by Hamza Abusalah, Joël Alwen, Bram Cohen, Danylo Khilko, Krzysztof Pietrzak, and Leonid Reyzin. Appears in Asiacrypt 2017.
- Scrypt is Maximally Memory-Hard by Joël Alwen, Binyi Chen, Krzysztof Pietrzak, Leonid Reyzin, and Stefano Tessaro. Appears in Eurocrypt 2017 (Best Paper Award winner). My talk given at Charles River Crypto Day (Dec. 2016)
- On the Memory-Hardness of Data-Independent Password-Hashing Functions by Joël Alwen, Peter Gaži, Chethan Kamath, Karen Klein, Georg Osang, Krzysztof Pietrzak, Leonid Reyzin, Michal Rolínek, and Michal Rybár. Appears in AsiaCCS 2018
Fuzzy Extractors, Privacy Amplification, Information Reconciliation, and Fuzzy PAKE
- Tutorial on information reconciliation and privacy amplification at IISc-IACR School on Cryptology (has slides and videos)
- Fuzzy Password-Authenticated Key Exchange by Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, and Sophia Yakoubov. Appears in Eurocrypt 2018.
- Wyner's Wire-Tap Channel, Forty Years Later, invited talk I gave at TCC 2015 that provides the historical context for fuzzy extractors and also explains the two papers below.
- When are Fuzzy Extractors Possible by Benjamin Fuller, Leonid Reyzin, and Adam Smith. Appears in IEEE Transactions on Information Theory 66(8): 5282-5298 (2020) (preliminary version in Asiacrypt 2016). See also this talk.
- Reusable Fuzzy Extractors for Low-Entropy Distributions by Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, and Adam Smith. Appears in Journal of Cryptology 34(1) (2021) (preliminary version in Eurocrypt 2016). See also this talk.
- Amplifying Privacy in Privacy Amplification by Divesh Aggarwal, Yevgeniy Dodis, Zahra Jafargholi, Eric Miles, and Leonid Reyzin. Appears in CRYPTO 2014.
-
Computational Fuzzy Extractors by
Benjamin Fuller, Xianrui Meng, and Leonid Reyzin. Appears Information and Computation 275 (2020) (preliminary version in ASIACRYPT 2013).
-
Privacy amplification with asymptotically optimal entropy loss, by Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, and Leonid Reyzin. Journal of the ACM 61(5), 2014 (preliminary version in STOC 2010). © by the authors.
- Key Agreement from Close Secrets over Unsecured Channels by Bhavana Kanukurthi and Leonid Reyzin. Appears in Eurocrypt 2009. © by the authors.
-
Fuzzy Extractors:
A Brief Survey of Results from 2004 to 2006 by Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Appears as a chapter in Security with Noisy Data.
-
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets,
by Yevgeniy Dodis, Bhavana Kanukurthi, Jonathan Katz, Leonid Reyzin, and Adam Smith.
Appears in IEEE Transactions on Information Theory 2012, merging results from Crypto 2006 and SCN 2008 papers.
© by the authors.
-
Fuzzy Extractors:
How to Generate Strong Keys from Biometrics and Other Noisy Data by Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith. In SIAM Journal on Computing, 2008. Preliminary version appears in Eurocrypt 2004 (Test-of-Time Award winner). Implementation available. You may also want to see the related survey.
Correlation-Intractability and Fiat-Shamir Transform
RPKI
Entropy
Digital Signatures
-
Compact Certificates of Collective Knowledge
by Silvio Micali, Leonid Reyzin, Georgios Vlachos, Riad S. Wahby, and Nickolai Zeldovich. To appear in IEEE S&P 2021.
- A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures by Craig Gentry, Adam O'Neill, and Leonid Reyzin. Appears in PKC 2018. Talk slides: pptx pdf.
-
Sequential Aggregate Signatures with Lazy Verification for S-BGP by Kyle Brogle, Sharon Goldberg, and Leonid Reyzin (includes an implementation). Appears in Information and Computation (preliminary version in ASIACRYPT 2012). © by the authors.
-
Sequential Aggregate Signatures from Trapdoor Permutations by Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, and Hovav Shacham. Appears in Eurocrypt 2004.
- Forward-Secure Signatures with Fast Key Update by Anton Kozlov and Leonid Reyzin. Appears
in SCN 2002.
- On the Power of Claw-Free Permutations by Yevgeniy Dodis and Leonid Reyzin. Appears
in SCN 2002.
- SiBIR: Signer-Base Intrusion-Resilient Signatures
by Gene Itkis and Leonid Reyzin. Appears in Crypto 2002.
-
Better than Biba: Short One-Time Signatures with Fast Signing and Verifying by Leonid Reyzin and Natan Reyzin. Appears in ACISP 2002.
-
Accountable-Subgroup Multisignatures by Silvio
Micali, Kazuo Ohta, and Leonid Reyzin. Appears in ACM CCS 2001.
-
Forward-Secure Signatures with Optimal Signing and Verifying by Gene Itkis and Leonid Reyzin. Appears in Crypto 2001.
-
A New Forward-Secure Digital Signature Scheme by
Michel Abdalla and Leonid Reyzin. Appears in Asiacrypt 2000.
-
Improving the Exact Security of Digital Signature Schemes by Silvio Micali and Leonid Reyzin. Appears in Journal of Cryptology, 2002 (prior version appears in CQRE [Secure] '99).
-
Signing with Partially Adversarial Hashing by Silvio Micali and Leonid Reyzin. Appears as MIT/LCS/TM-575, 1998.
Leakage-Resilient Cryptography and Other Non-Black-Box Attack Models
Hash Functions
Pseudorandom Generators
Resettable Zero-Knowledge
Steganography
Miscellaneous