Author of the publication

Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations.

, , , and . STOC, page 1101-1114. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strengthening the Security of Encrypted Databases: Non-transitive JOINs., , and . TCC (2), volume 10678 of Lecture Notes in Computer Science, page 631-661. Springer, (2017)Tight Tradeoffs in Searchable Symmetric Encryption., , and . CRYPTO (1), volume 10991 of Lecture Notes in Computer Science, page 407-436. Springer, (2018)Can PPAD Hardness be Based on Standard Cryptographic Assumptions?, , and . TCC (2), volume 10678 of Lecture Notes in Computer Science, page 747-776. Springer, (2017)Can PPAD Hardness be Based on Standard Cryptographic Assumptions?, , and . Electron. Colloquium Comput. Complex., (2016)Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective., and . ITC, volume 163 of LIPIcs, page 10:1-10:23. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound., and . TCC (2), volume 11240 of Lecture Notes in Computer Science, page 177-191. Springer, (2018)An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption., , and . ISIT, page 858-863. IEEE, (2020)Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations., , , and . STOC, page 1101-1114. ACM, (2016)Generic-Group Delay Functions Require Hidden-Order Groups., , and . EUROCRYPT (3), volume 12107 of Lecture Notes in Computer Science, page 155-180. Springer, (2020)