Publications
You can also find my articles on my Google Scholar profile.
Complete list of publications on DBLP.
Publications
- DTL: Data Tumbling Layer. A Composable Unlinkability for Smart ContractsAsiaCCS, 2025
- Programmable Payment ChannelsACNS, 2024
- A Plug-and-Play Long-Range Defense System for Proof-of-Stake BlockchainsESORICS, 2024
- A plug-n-play framework for scaling private set intersection to billion-sized setsCANS, 2023
- LucidiTEE: Scalable policy-based multiparty computation with fairnessCANS, 2023
- Synchronizable Fair ExchangeTheory of Cryptography Conference, 2023
- Unlinkability and Interoperability in Account-Based Universal Payment ChannelsFinancial Cryptography Workshop, 2023
- Sprites and State Channels: Payment Networks that Go Faster Than LightningFinancial Cryptography, 2019
- Instantaneous Decentralized PokerAdvances in Cryptology—Asiacrypt, 2017
- Network Oblivious TransferAdvances in Cryptology—Crypto, 2016
- Efficient Batched Oblivious PRF with Applications to Private Set IntersectionACM Conference on Computer and Communications Security (CCS), 2016
- Improvements to Secure Computation with PenaltiesACM Conference on Computer and Communications Security (CCS), 2016
- Amortizing Secure Computation with PenaltiesACM Conference on Computer and Communications Security (CCS), 2016
- Secure Computation with Minimal Interaction, RevisitedAdvances in Cryptology—Crypto, 2015
- How to Use Bitcoin to Play Decentralized PokerACM Conference on Computer and Communications Security (CCS), 2015
- On Cut-and-Choose Oblivious Transfer and Its VariantsAdvances in Cryptology—Asiacrypt, 2015
- Authenticated Broadcast with a Partially Compromised Public-Key InfrastructureInformation & Computation, 2014
- On the Cryptographic Complexity of the Worst FunctionsTheory of Cryptography Conference (TCC), 2014
- On the Complexity of UC CommitmentsAdvances in Cryptology—Eurocrypt, 2014
- Amortizing Garbled CircuitsAdvances in Cryptology—Crypto, 2014
- How to Use Bitcoin to Design Fair ProtocolsAdvances in Cryptology—Crypto, 2014
- How to Use Bitcoin to Incentivize Correct ComputationsACM Conference on Computer and Communications Security (CCS), 2014
- Multi-Client Non-interactive Verifiable ComputationTheory of Cryptography Conference (TCC), 2013
- Improved OT Extension for Transferring Short SecretsAdvances in Cryptology—Crypto, 2013
- On the Security of the 'Free-XOR' TechniqueTheory of Cryptography Conference (TCC), 2012
- Improved Secure Two-Party Computation via Information-Theoretic Garbled CircuitsSecurity and Cryptography for Networks (SCN), 2012
- Efficient Verification of Input Consistency in Server-Assisted Secure Function EvaluationCryptology and Network Security (CANS), 2012
- Adaptively Secure Broadcast, RevisitedACM Symposium on Principles of Distributed Computing (PODC), 2011
- Authenticated Broadcast with a Partially Compromised Public Key InfrastructureIntl. Symp. on Stabilization, Safety, and Security of Distributed Systems (SSS), 2010
- The Round Complexity of Verifiable Secret Sharing: The Statistical CaseAdvances in Cryptology—Asiacrypt, 2010
- Improving the Round Complexity of VSS in Point-to-Point NetworksInformation & Computation, 2009
- Improving the Round Complexity of VSS in Point-to-Point NetworksIntl. Colloquium on Automata, Languages and Programming (ICALP), 2008
- On Exponential Lower Bound for Protocols for Reliable Communication in NetworksIntl. Conf. on Information Theoretic Security (ICITS), 2007