Vassilis Zikas

DR., Dr

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    Dynamic Ad Hoc Clock Synchronization

    Badertscher, C., Gaži, P., Kiayias, A., Russell, A. & Zikas, V., 16 Jun 2021, Advances in Cryptology – EUROCRYPT 2021. Springer, p. 399-428 29 p. (Lecture Notes in Computer Science; vol. 12698).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2020

    Timed Signatures and Zero-Knowledge Proofs: Timestamping in the Blockchain Era

    Abadi, A., Ciampi, M., Kiayias, A. & Zikas, V., 27 Aug 2020, Applied Cryptography and Network Security (ACNS 2020): 18th International Conference, ACNS 2020, Rome, Italy, October 19–22, 2020, Proceedings, Part I. Springer, p. 335 - 354 20 p. (Lecture Notes in Computer Science; vol. 12146).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • How Private Are Commonly-Used Voting Rules?

    Liu, A., Lu, Y., Xia, L. & Zikas, V., 6 Aug 2020, Proceedings of the 36th Conference on Uncertainty in Artificial Intelligence (UAI). PMLR, p. 629-638 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Broadcast-Optimal Two-Round MPC

    Cohen, R., Garay, J. & Zikas, V., 1 May 2020, Advances in Cryptology — EUROCRYPT 2020. Canteaut, A. & Ishai, Y. (eds.). Cham: Springer, p. 828-858 31 p. (Lecture Notes in Computer Science; vol. 12106).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Resource-Restricted Cryptography: Revisiting MPC Bounds in the Proof-of-Work Era

    Garay, J., Kiayias, A., Ostrovsky, R. M., Panagiotakos, G. & Zikas, V., 1 May 2020, Advances in Cryptology — EUROCRYPT 2020. Cham: Springer, (Lecture Notes in Computer Science; vol. 12106).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    Efficient MPC via program analysis: A framework for efficient optimal mixing

    Ishaq, M., Milanova, A. L. & Zikas, V., 6 Nov 2019, CCS 2019: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM Association for Computing Machinery, p. 1539-1556 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake

    Kerber, T., Kiayias, A., Kohlweiss, M. & Zikas, V., 16 Sep 2019, 2019 IEEE Symposium on Security and Privacy (SP). Institute of Electrical and Electronics Engineers (IEEE), p. 157-174 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • PD-ML-Lite: Private Distributed Machine Learning from Lightweight Cryptography

    Tsikhanovich, M., Magdon-Ismail, M., Ishaq, M. & Zikas, V., 2 Sep 2019, Information Security: 22nd International Conference, ISC 2019, Proceedings. Lin, Z., Papamanthou, C. & Polychronakis, M. (eds.). Cham: Springer, p. 149-167 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11723).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Ouroboros Genesis: Composable Proof-of-Stake Blockchains with Dynamic Availability

    Badertscher, C., Gazi, P., Kiayias, A., Russell, A. & Zikas, V., 15 Oct 2018, Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, p. 913-930 18 p. (CCS '18).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • But Why Does It Work? A Rational Protocol Design Treatment of Bitcoin

    Badertscher, C., Garay, J., Maurer, U., Tschudi, D. & Zikas, V., 31 Mar 2018, Advances in Cryptology – EUROCRYPT 2018. Springer, p. 34-65 32 p. (Lecture Notes in Computer Science (LNCS); vol. 10821).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure Two-Party Computation over Unreliable Channels

    Gelles, R., Paskin-Cherniavsky, A. & Zikas, V., 2018, Security and Cryptography for Networks. Catalano, D. & De Prisco, R. (eds.). Cham: Springer International Publishing AG, p. 445-463 19 p. (Lecture Notes in Computer Science; vol. 11035).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2017

    Bitcoin as a Transaction Ledger: A Composable Treatment

    Badertscher, C., Maurer, U., Tschudi, D. & Zikas, V., 29 Jul 2017, Advances in Cryptology – CRYPTO 2017. Katz, J. & Shacham, H. (eds.). Springer, p. 324-356 33 p. (Lecture Notes in Computer Science; vol. 10401).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The Price of Low Communication in Secure Multi-Party Computation

    Garay, J., Ishai, Y., Ostrovsky, R. & Zikas, V., 29 Jul 2017, Advances in Cryptology – CRYPTO 2017. Springer, p. 420-446 30 p. (Lecture Notes in Computer Science (LNCS); vol. 10401).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Round-Preserving Parallel Composition of Probabilistic-Termination Protocols

    Cohen, R., Coretti, S., Garay, J. & Zikas, V., 14 Jul 2017, 44th International Colloquium on Automata, Languages, and Programming (ICALP 2017). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Vol. 80. p. 37:1-37:15 15 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 80).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2016

    Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions

    Coretti, S., Garay, J., Hirt, M. & Zikas, V., 9 Nov 2016, (E-pub ahead of print) Advances in Cryptology -- ASIACRYPT 2016. Cheon, J. H. & Takagi, T. (eds.). Berlin, Heidelberg: Springer Berlin Heidelberg, p. 998-1021 24 p. (Lecture Notes in Computer Science; vol. 10032)(Security and Cryptology; vol. 10032).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Network-Hiding Communication and Applications to Multi-Party Protocols

    Hirt, M., Maurer, U., Tschudi, D. & Zikas, V., 21 Jul 2016, Advances in Cryptology – CRYPTO 2016. Springer, p. 335-365 31 p. (Lecture Notes in Computer Science ; vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Probabilistic Termination and Composability of Cryptographic Protocols

    Cohen, R., Coretti, S., Garay, J. & Zikas, V., 21 Jul 2016, Advances in Cryptology – CRYPTO 2016 . Springer, p. 240-269 30 p. (Lecture Notes in Computer Science; vol. 9816).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Provably Secure Virus Detection: Using The Observer Effect Against Malware

    Zikas, V., Ostrovsky, R. & Lipton, R., 15 Jul 2016, 43rd International Colloquium on Automata, Languages, and Programming (ICALP 2016). Chatzigiannakis, I., Mitzenmacher, M., Rabani, Y. & Sangiorgi, D. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, p. 32:1-32:14 14 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 55).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • Fair and Robust Multi-party Computation Using a Global Transaction Ledger

    Kiayias, A., Zhou, H-S. & Zikas, V., Apr 2016, Advances in Cryptology -- EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. Fischlin, M. & Coron, J-S. (eds.). Berlin, Heidelberg: Springer Berlin Heidelberg, p. 705-734 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    File
  • 2015

    Fair distributed computation of reactive functions

    Garay, J., Tackmann, B. & Zikas, V., 5 Nov 2015, Distributed Computing: 29th International Symposium, DISC 2015, Proceedings. Moses, Y. (ed.). Berlin, Heidelberg: Springer, p. 497-512 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9363).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Incoercible multi-party computation and universally composable receipt-free voting

    Alwen, J., Ostrovsky, R., Zhou, H. S. & Zikas, V., 20 Aug 2015, Advances in Cryptology - CRYPTO 2015: 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Berlin, Heidelberg: Springer, p. 763-780 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How fair is your protocol? A utility-based approach to protocol optimality

    Garay, J., Katz, J., Tackmann, B. & Zikas, V., 21 Jul 2015, Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing. ACM Association for Computing Machinery, p. 281-290 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • The hidden graph model: Communication locality and optimal resiliency with adaptive faults

    Chandran, N., Chongchitmate, W., Garay, J. A., Goldwasser, S., Ostrovsky, R. & Zikas, V., 11 Jan 2015, Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science. ACM Association for Computing Machinery, p. 153-162 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2014

    Efficient three-party computation from cut-and-choose

    Choi, S. G., Katz, J., Malozemoff, A. J. & Zikas, V., 21 Aug 2014, Advances in Cryptology - CRYPTO 2014 : 34th Annual Cryptology Conference, Proceedings. Garay, J. A. & Gennaro, R. (eds.). PART 2 ed. Berlin, Heidelberg: Springer, p. 513-530 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617, no. Part II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure multi-party computation with identifiable abort

    Ishai, Y., Ostrovsky, R. & Zikas, V., 21 Aug 2014, Advances in Cryptology - CRYPTO 2014: 34th Annual Cryptology Conference, Proceedings. Garay, J. A. & Gennaro, R. (eds.). PART 2 ed. Berlin, Heidelberg: Springer, p. 369-386 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617, no. Part II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2013

    Rational protocol design: Cryptography against incentive-driven adversaries

    Garay, J., Katz, J., Maurer, U., Tackmann, B. & Zikas, V., 19 Dec 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science. Institute of Electrical and Electronics Engineers (IEEE), p. 648-657 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Feasibility and completeness of cryptographic tasks in the quantum world

    Fehr, S., Katz, J., Song, F., Zhou, H. S. & Zikas, V., 21 Feb 2013, Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Proceedings. Sahai, A. (ed.). Berlin, Heidelberg: Springer, p. 281-296 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Universally composable synchronous computation

    Katz, J., Maurer, U., Tackmann, B. & Zikas, V., 21 Feb 2013, Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Proceedings. Berlin, Heidelberg: Springer, p. 477-498 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2012

    Collusion-preserving computation

    Alwen, J., Katz, J., Maurer, U. & Zikas, V., 3 Sep 2012, Advances in Cryptology - CRYPTO 2012: 32nd Annual Cryptology Conference, Proceedings. Safavi-Naini, R. & Canetti, R. (eds.). Berlin, Heidelberg: Springer, p. 124-143 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Byzantine agreement with a rational adversary

    Groce, A., Katz, J., Thiruvengadam, A. & Zikas, V., 13 Jul 2012, Automata, Languages, and Programming: 39th International Colloquium, ICALP 2012, Proceedings. PART 2 ed. Springer-Verlag, p. 561-572 12 p. (Lecture Notes in Computer Science; vol. 7392, no. PART II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    Player-centric byzantine agreement

    Hirt, M. & Zikas, V., 11 Jul 2011, Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Proceedings. Aceto, L., Henzinger, M. & Sgall, J. (eds.). Part 1 ed. Berlin, Heidelberg: Springer, p. 281-292 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6755, no. Part I).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    Adaptively secure broadcast

    Hirt, M. & Zikas, V., 21 Jul 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Berlin, Heidelberg: Springer, p. 466-485 20 p. (Lecture Notes in Computer Science; vol. 6110).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    Realistic failures in secure multi-party computation

    Zikas, V., Hauser, S. & Maurer, U., 17 Mar 2009, Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, Proceedings. Reingold, O. (ed.). Berlin, Heidelberg: Springer, p. 274-293 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5444).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2008

    MPC vs. SFE: Unconditional and computational security

    Hirt, M., Maurer, U. & Zikas, V., 1 Dec 2008, Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Berlin, Heidelberg: Springer, p. 1-18 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5350).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • MPC vs. SFE: Perfect security in a unified corruption model

    Beerliova-Trubiniova, Z., Fitzi, M., Hirt, M., Maurer, U. & Zikas, V., 10 Mar 2008, Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008, Proceedings. Canetti, R. (ed.). Berlin, Heidelberg: Springer, p. 231-250 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4948).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution