The Space-Time Cost of Purifying Quantum Computations
By Mark Zhandry
In ITCS 2024

Quantum Money from Abelian Group Actions
By Mark Zhandry
In ITCS 2024, QIP 2024

A Computational Separation Between Quantum No-cloning and No-telegraphing
By Barak Nehoran and Mark Zhandry
In ITCS 2024, QIP 2023

The Relationship Between Idealized Models Under Computationally Bounded Adversaries
By Cong Zhang and Mark Zhandry
In ASIACRYPT 2023

Somewhere Randomness Extraction and Security against Bounded-Storage Mass Surveillance
By Jiaxin Guan, Daniel Wichs and Mark Zhandry
In TCC 2023

Security-Preserving Distributed Samplers: How to Generate any CRS in One Round without Random Oracles
By Damiano Abram, Brent Waters and Mark Zhandry
In CRYPTO 2023

Computational Wiretap Coding from Indistinguishability Obfuscation
By Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai and Mark Zhandry
In CRYPTO 2023

Tracing Quantum State Distinguishers via Backtracking
By Mark Zhandry
In CRYPTO 2023

Commitments to Quantum States
By Sam Gunn, Nathan Ju, Fermi Ma and Mark Zhandry
In STOC 2023, QIP 2023

A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies
By Dan Boneh, Jiaxin Guan and Mark Zhandry
In EUROCRYPT 2023

Another Round of Breaking and Making Quantum Money: How to Not Build It from Lattices, and More
By Jiahui Liu, Hart Montgomery and Mark Zhandry
In EUROCRYPT 2023, QIP 2023

Full Quantum Equivalence of Group Action DLog and CDH, and More
By Hart Montgomery and Mark Zhandry
In ASIACRYPT 2022 (Best Paper)

Adaptive Multiparty NIKE
By Venkata Koppula, Brent Waters and Mark Zhandry
In TCC 2022

Collusion-Resistant Copy-Protection for Watermarkable Functionalities
By Jiahui Liu, Qipeng Liu, Luowen Qian and Mark Zhandry
In TCC 2022, QIP 2023

Verifiable Quantum Advantage without Structure
By Takashi Yamakawa and Mark Zhandry
In FOCS 2022, QIP 2023 (Plenary Talk)

New Constructions of Collapsing Hashes
By Mark Zhandry
In CRYPTO 2022

To Label, or Not To Label (in Generic Groups)
By Mark Zhandry
In CRYPTO 2022

On the Feasibility of Unclonable Encryption, and More
By Prabhanjan Ananth, Fatih Kaleoglu, Xingjian Li, Qipeng Liu and Mark Zhandry
In CRYPTO 2022, QIP 2023

Augmented Random Oracles
By Mark Zhandry
In CRYPTO 2022

Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering
By Yilei Chen, Qipeng Liu and Mark Zhandry
In EUROCRYPT 2022, QIP 2022

Incompressible Cryptography
By Jiaxin Guan, Daniel Wichs and Mark Zhandry
In EUROCRYPT 2022

Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier
By Alessandro Chiesa, Fermi Ma, Nicholas Spooner and Mark Zhandry
In FOCS 2021, QCRYPT 2021, QIP 2022

Franchised Quantum Money
By Bhaskar Roberts and Mark Zhandry
In ASIACRYPT 2021

Redeeming Reset Indifferentiability and Applications to Post-Quantum Security
By Mark Zhandry
In ASIACRYPT 2021

Disappearing Cryptography in the Bounded Storage Model
By Jiaxin Guan and Mark Zhandry
In TCC 2021

Classical vs Quantum Random Oracles
By Takashi Yamakawa and Mark Zhandry
In EUROCRYPT 2021

Iterated Inhomogeneous Polynomials
By Jiaxin Guan and Mark Zhandry
In CFail 2021

Hidden Cosets and Applications to Unclonable Cryptography
By Andrea Coladangelo, Qipeng Liu, Jiahui Liu and Mark Zhandry
In CRYPTO 2021, QIP 2022

New Approaches for Quantum Copy-Protection
By Scott Aaronson, Qipeng Liu, Jiahui Liu, Mark Zhandry and Ruizhe Zhang
In CRYPTO 2021

White Box Traitor Tracing
By Mark Zhandry
In CRYPTO 2021

Towards Non-Interactive Witness Hiding
By Benjamin Kuykendall and Mark Zhandry
In TCC 2020

Schrödinger's Pirate: How To Trace a Quantum Decoder
By Mark Zhandry
In TCC 2020

New Techniques for Traitor Tracing: Size N and More from Pairings
By Mark Zhandry
In CRYPTO 2020

Indifferentiability for Public Key Cryptosystems
By Mark Zhandry and Cong Zhang
In CRYPTO 2020

Unclonable Decryption Keys
By Marios Georgiou and Mark Zhandry

Quantum Immune One-Time Memories
By Qipeng Liu, Amit Sahai and Mark Zhandry

One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication
By Ryan Amos, Marios Georgiou, Aggelos Kiayias and and Mark Zhandry
In STOC 2020

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption
By James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai and Mark Zhandry
In ITCS 2020

Revisiting Post-Quantum Fiat-Shamir
By Qipeng Liu and Mark Zhandry
In CRYPTO 2019

The Distinction Between Fixed and Random Generators in Group-Based Assumptions
By James Bartusek, Fermi Ma and Mark Zhandry
In CRYPTO 2019

How to Record Quantum Queries, and Applications to Quantum Indifferentiability
By Mark Zhandry
In CRYPTO 2019, QCRYPT 2019 (Invited), ITC 2021 (Invited Spotlight Talk)

Quantum Lightning Never Strikes the Same State Twice
By Mark Zhandry
In EUROCRYPT 2019 (Best Paper), Journal of Cryptology (Invited)

New Techniques for Obfuscating Conjunctions
By James Bartusek, Tancrède Lepoint, Fermi Ma and Mark Zhandry
In EUROCRYPT 2019

On Finding Quantum Multi-collisions
By Qipeng Liu and Mark Zhandry
In EUROCRYPT 2019

Simple Schemes in the Bounded Storage Model
By Jiaxin Guan and Mark Zhandry
In EUROCRYPT 2019

On ELFs, Deterministic Encryption, and Correlated-Input Security
By Mark Zhandry
In EUROCRYPT 2019

Parameter-Hiding Order Revealing Encryption
By David Cash, Feng-Hao Liu, Adam O'Neill, Mark Zhandry and Cong Zhang
In ASIACRYPT 2018

Preventing Zeroizing Attacks on GGH15
By James Bartusek, Jiaxin Guan, Fermi Ma and Mark Zhandry
In TCC 2018

The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks
By Fermi Ma and Mark Zhandry
In TCC 2018

Impossibility of Order-Revealing Encryption in Idealized Models
By Mark Zhandry and Cong Zhang
In TCC 2018

Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves
By Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi and Mark Zhandry
In MathCrypt 2018, Journal of Mathematical Cryptology

Decomposable Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness
By Qipeng Liu and Mark Zhandry
In TCC 2017, Journal of Cryptology (Invited)

New Security Notions and Feasibility Results for Authentication of Quantum Data
By Sumegha Garg, Henry Yuen and Mark Zhandry
In QCRYPT 2016, CRYPTO 2017

Breaking the Sub-Exponential Barrier in Obfustopia
By Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan and Mark Zhandry
In EUROCRYPT 2017

Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption
By Fermi Ma and Mark Zhandry

How to Generate and use Universal Samplers
By Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters and Mark Zhandry
In ASIACRYPT 2016

A Note on Quantum-Secure PRPs
By Mark Zhandry

Strong Hardness of Privacy from Weak Traitor Tracing
By Lucas Kowalczyk, Tal Malkin, Jonathan Ullman and Mark Zhandry
In TCC 2016-B

Secure Obfuscation in a Weak Multilinear Map Model
By Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan and Mark Zhandry
In TCC 2016-B

The Magic of ELFs
By Mark Zhandry
In CRYPTO 2016 (Early Career Award), Journal of Cryptology (Invited)

Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
By Eric Miles, Amit Sahai and Mark Zhandry
In CRYPTO 2016

Post-Zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits
By Saikrishna Badrinarayanan, Eric Miles, Amit Sahai and Mark Zhandry
In EUROCRYPT 2016

Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
By Ryo Nishimaki, Daniel Wichs and Mark Zhandry
In EUROCRYPT 2016

Order-Revealing Encryption and the Hardness of Private Learning
By Mark Bun and Mark Zhandry
In TCC 2016-A

Functional Encryption without Obfuscation
By Sanjam Garg, Craig Gentry, Shai Halevi and Mark Zhandry
In TCC 2016-A

How to Avoid Obfuscation Using Witness PRFs
By Mark Zhandry
In TCC 2016-A

Cutting-Edge Cryptography Through the Lens of Secret Sharing
By Ilan Komargodski and Mark Zhandry
In TCC 2016-A, Information and Computation

Quantum Oracle Classification: The Case of Group Structure
By Mark Zhandry

Cryptography in the Age of Quantum Computers (PhD Thesis)
By Mark Zhandry

Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation
By Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry and Joe Zimmerman
In EUROCRYPT 2015

Adaptively Secure Broadcast Encryption with Small System Parameters
By Mark Zhandry

Low Overhead Broadcast Encryption from Multilinear Maps
By Dan Boneh, Brent Waters and Mark Zhandry
In CRYPTO 2014

Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
By Dan Boneh and Mark Zhandry
In CRYPTO 2014, Algorithmica (Invited to Special Issue on Algorithmic Tools in Cryptography)

Fully Secure Attribute Based Encryption from Multilinear Maps
By Sanjam Garg, Craig Gentry, Shai Halevi and Mark Zhandry

A Note on the Quantum Collision and Set Equality Problems
By Mark Zhandry
In Quantum Information and Computation

Differing-Inputs Obfuscation and Applications
By Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai and Mark Zhandry

Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
By Dan Boneh and Mark Zhandry
In CRYPTO 2013

Quantum-Secure Message Authentication Codes
By Dan Boneh and Mark Zhandry
In EUROCRYPT 2013

How to Construct Quantum Random Functions
By Mark Zhandry
In FOCS 2012, Journal of the ACM

Secure Identity-Based Encryption in the Quantum Random Oracle Model
By Mark Zhandry
In CRYPTO 2012

Random Oracles in a Quantum World
By Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner and Mark Zhandry
In ASIACRYPT 2011

ACM Security TechPack
By Dan Boneh, Neil Daswani, John Mitchell and Mark Zhandry