No photo of Yevgeniy Dodis

Yevgeniy Dodis

Professor of Computer Science

    19982019
    If you made any changes in Pure, your changes will be visible here soon.

    Research Output 1998 2019

    2005

    A verifiable random function with short proofs and keys

    Dodis, Y. & Yampolskiy, A., 2005, Lecture Notes in Computer Science. Vaudenay, S. (ed.). Vol. 3386. p. 416-431 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Hash functions

    Chosen-ciphertext security of multiple encryption

    Dodis, Y. & Katz, J., 2005, Lecture Notes in Computer Science. Kilian, J. (ed.). Vol. 3378. p. 188-209 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography

    Correcting errors without leaking partial information

    Dodis, Y. & Smith, A., 2005, Proceedings of the Annual ACM Symposium on Theory of Computing. p. 654-663 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Entropy
    Hash functions
    Error correction

    Entropic security and the encryption of high entropy messages

    Dodis, Y. & Smith, A., 2005, Lecture Notes in Computer Science. Kilian, J. (ed.). Vol. 3378. p. 556-577 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Hash functions
    Entropy
    Semantics

    On extractors, error-correction and hiding all partial information

    Dodis, Y., 2005, 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security. Vol. 2005. p. 74-79 6 p. 1543961

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Error correction
    Cryptography
    Entropy
    Hash functions
    Flavors

    Scalable public-key tracing and revoking

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., May 2005, In : Distributed Computing. 17, 4, p. 323-347 25 p.

    Research output: Contribution to journalArticle

    Traitor Tracing
    Public key
    Tracing
    Formal Model
    Cryptography

    Secure remote authentication using biometric data

    Boyen, X., Dodis, Y., Katz, J., Ostrovsky, R. & Smith, A., 2005, Lecture Notes in Computer Science. Cramer, R. (ed.). Vol. 3494. p. 147-163 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Biometrics
    Authentication
    Servers
    Entropy
    Network protocols

    Signcryption

    Dodis, Y., 2005, Encyclopedia of cryptography and security. van Tilborg, H. C. A. (ed.). Kluwer Academic Publishers

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

    Time capsule signature

    Dodis, Y. & Yum, D. H., 2005, Lecture Notes in Computer Science. Patrick, A. S. & Yung, M. (eds.). Vol. 3570. p. 57-71 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Servers
    2004
    Public Key Encryption
    Cryptography
    Homomorphic
    Generalise
    Ring Signature
    Population
    Group Signature
    Identification Scheme
    Identification (control systems)

    Fully-simulatable multiparty computation

    Dodis, Y., Pass, R. & Walfish, S., Oct 2004, Workshop on Secure Multiparty Protocols (SMP 2004).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Extractor
    Noisy Data
    Biometrics
    Hamming distance
    Difference Set

    ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption

    Yao, D., Dodis, Y., Fazio, N. & Lysyanskaya, A., 2004, Proceedings of the ACM Conference on Computer and Communications Security. Pfitzmann, B. & Liu, P. (eds.). p. 354-363 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Access control
    Joining
    Entropy
    Randomness
    Extractor
    Seeds
    Seed

    Multiparty quantum coin flipping

    Ambainis, A., Buhrman, H., Dodis, Y. & Röhrig, H., 2004, Proceedings of the Annual IEEE Conference on Computational Complexity. Vol. 19. p. 250-259 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Broadcast
    Broadcast Channel
    Upper and Lower Bounds
    Quantum Channel
    Pairwise

    On the (Im)possibility of cryptography with imperfect randomness

    Dodis, Y., Prabhakaran, M., Ong, S. J. & Sahai, A., 2004, Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 196-205 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Entropy
    Acoustic waves
    Randomness
    Cascade
    Noise
    Seeds
    Extractor

    Versatile padding schemes for joint signature and encryption

    Dodis, Y., Jarecki, S., Freedman, M. J. & Walfish, S., 2004, Proceedings of the ACM Conference on Computer and Communications Security. Pfitzmann, B. & Liu, P. (eds.). p. 344-353 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Chemical analysis
    2003

    Breaking and repairing optimistic fair exchange from PODC 2003

    Dodis, Y. & Reyzin, L., 2003, DRM 2003: Proceedings of the Third ACM Workshop on Digital Rights Management. Yung, M. (ed.). p. 47-54 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Authenticated Encryption
    Cryptography
    Equipment and Supplies
    Paradigm
    Binders

    Exposure-resilience for free: The hierarchical ID-based encryption case

    Dodis, Y. & Yung, M., 2003, Proceedings - 1st International IEEE Security in Storage Workshop, SISW 2002. Institute of Electrical and Electronics Engineers Inc., p. 45-52 8 p. 1183509

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Data storage equipment

    Fully scalable public-key traitor tracing

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., Jul 2003, Principles of Distributed Computing (PODC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    How much can taxes help selfish routing?

    Cole, R., Dodis, Y. & Roughgarden, T., 2003, Proceedings of the ACM Conference on Electronic Commerce. p. 98-107 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Taxation
    Costs
    Economics
    Tax
    Routing

    Intrusion-resilient public-key encryption

    Dodis, Y., Franklin, M., Katz, J., Miyaji, A. & Yung, M., 2003, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612, p. 19-32 14 p.

    Research output: Contribution to journalArticle

    Public Key Encryption
    Cryptography
    Encryption
    Forward Security
    Insulation
    Entropy
    Randomness
    Extractor
    Privacy
    Amplification
    Claw-free
    Hoof and Claw
    Permutation
    Signature Scheme
    Random Oracle

    Pricing network edges for heterogeneous selfish users

    Cole, R., Dodis, Y. & Roughgarden, T., 2003, Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 521-530 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Taxation
    Costs
    Heterogeneous networks
    Travel time
    Economics

    Pricing networks with selfish routing (survey)

    Cole, R., Dodis, Y. & Roughgarden, T., Jun 2003, Workshop on Economics of Peer-to-Peer Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Proactive two-party signatures for user authentication

    Nicolosi, A., Krohn, M., Dodis, Y. & Mazieres, D., Feb 2003, Network and Distributed System Security Symposium (NDSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Proxy cryptography revisted

    Ivan, A. & Dodis, Y., Feb 2003, Network and Distributed System Security Symposium (NDSS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Broadcast Encryption
    Public Key Encryption
    Cryptography
    Receiver
    Public key
    Public key
    Trace
    Attack
    Cryptography
    Traitor Tracing

    Scalable Public-Key Tracing and Revoking

    Dodis, Y., Fazio, N., Kiayias, A. & Yung, M., 2003, Proceedings of the Twenty-Second Annual ACM Symposium on Principles of Distributed Computing, PODC 2003. Vol. 22. p. 190-199 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Servers
    Periodic structures
    Cryptography
    Signature Scheme
    Equipment and Supplies
    Signature
    Random Oracle Model
    Cell Phones
    2002

    Efficient construction of (distributed) verifiable random functions

    Dodis, Y., 2002, Public Key Cryptography - PKC 2003 - 6th International Workshop on Practice and Theory in Public Key Cryptography, Proceedings. Springer Verlag, Vol. 2567. p. 1-17 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2567).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Random Function
    Pseudorandom Function
    Diffie-Hellman
    Digital Signature
    Random Oracle Model

    Key-insulated public key cryptosystems

    Dodis, Y., Katz, J., Xu, S. & Yung, M., 2002, Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings. Springer Verlag, Vol. 2332. p. 65-82 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Public-key Cryptosystem
    Cryptography
    Mobile devices
    Encryption
    Internet

    On the (non)universality of the one-time pad

    Dodis, Y. & Spencer, J., 2002, Annual Symposium on Foundations of Computer Science - Proceedings. Martin, D. C. (ed.). p. 376-385 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Authentication
    Cryptography

    On the power of claw-free permutations

    Dodis, Y. & Reyzin, L., Jul 2002, Conference on Security in Communication Networks.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    On the security of joint signature and encryption

    An, J. H., Dodis, Y. & Rabin, T., 2002, Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings. Springer Verlag, Vol. 2332. p. 83-107 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Composition Methods
    Signcryption
    Encryption
    Cryptography
    Signature

    Public key broadcast encryption for stateless receivers

    Dodis, Y. & Fazio, N., Nov 2002, ACM Workshop on Digital Rights Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2001

    Incremental codes

    Dodis, Y. & Halevi, S., Aug 2001, Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    New imperfect random source with applications to coin-flipping

    Dodis, Y., 2001, Automata, Languages and Programming - 28th International Colloquium, ICALP 2001, Proceedings. Vol. 2076 LNCS. p. 297-309 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2076 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Imperfect
    Measurement errors
    Random variables
    Defects
    Dependent Random Variables

    On perfect and adaptive security in exposure-resilient cryptography

    Dodis, Y., Sahai, A. & Smith, A., 2001, Advances in Cryptology - EUROCRYPT 2001 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Springer Verlag, Vol. 2045. p. 301-324 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2045).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Resilient Functions
    Cryptography
    Transform
    Output
    Strings

    Universal configurations in light-flipping games

    Dodis, Y. & Winkler, P., 2001, Proceedings of the 12th Annual ACM-SIAM Symposium on Discrete Algorithms. p. 926-927 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Game
    Configuration
    2000

    A cryptographic solution to a game theoretic problem

    Dodis, Y., Halevi, S. & Rabin, T., 2000, Advances in Cryptology - CRYPTO 2000 - 20th Annual International Cryptology Conference, Proceedings. Springer Verlag, Vol. 1880. p. 112-130 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1880).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Cryptography
    Game
    Communication
    Cryptographic Protocols
    Mediator

    Exposure-resilient functions and all-or-nothing transforms

    Canetti, R., Dodis, Y., Halevi, S., Kushilevitz, E. & Sahai, A., May 2000, Advances in Cryptology - EUROCRYPT.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Parallel reducibility for information-theoretically secure computation

    Dodis, Y. & Micali, S., Aug 2000, Advances in Cryptology - CRYPTO.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1999

    2-Catalog segmentation problem

    Dodis, Y., Guruswami, V. & Khanna, S., 1999, Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms. Anon (ed.). SIAM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Approximation algorithms
    Segmentation
    Subset
    Approximation Algorithms
    Trivial