I am looking for motivated PhD students with interest in cryptography, security, and/or fault-tolerant distributed computing. If you are already a student at RPI drop by my office to discuss. Otherwise, if you are interested in working with me please apply through the official RPI process and make sure you include the above areas and my name in your appication.
Sandro Coretti, Juan Garay, Martin Hirt, and Vassilis Zikas Constant-Round Asynchronous Multi-Party Computation, 2016.
Conference Publications
Martin Hirt, Ueli Maurer, Daniel Tschudi, and Vassilis Zikas Network-Hiding Communication and Applications to Multi-Party Protocols Advances in Cryptology — CRYPTO 2016 (to appear).
A preliminary full version is available here: [ PDF ]
Ran Cohen, Sandro Coretti, Juan Garay, and Vassilis Zikas Probabilistic Termination and Composability of Cryptographic Protocols Advances in Cryptology — CRYPTO 2016 (to appear).
A preliminary full version is available here: [ PDF ]
Richard J. Lipton, Rafail Ostrovsky, and Vassilis Zikas Provably Secure Virus Detection: Using The Observer Effect Against Malware
International Colloquium on Automata, Languages and Programming
— ICALP 2016 (to appear).
Aggelos Kiayias, Hong-Sheng Zhou, and Vassilis Zikas Fair and Robust Multi-Party Computation using a Global Transaction Ledger Advances in Cryptology — EUROCRYPT 2016 (to appear).
A preliminary full version is available here: [ PDF ]
Juan Garay, Bjoern Tackmann, and Vassilis Zikas Fair Distributed Computation of Reactive Functions International Symposium on Distributed Computing
— DISC 2015, pp 497–512, 2015.
A preliminary full version is available here: [ PDF ]
Joël Alwen, Rafail Ostrovsky, Hong-Sheng Zhou, and Vassilis Zikas Incoercible Multi-Party Computation and Universally Composable Receipt-Free Voting
Advances in Cryptology — CRYPTO 2015, pp 763–780, 2015.
Juan Garay, Jonathan Katz, Bjoern Tackmann, and Vassilis Zikas How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality ACM Symposium on Principles of Distributed Computing
— PODC 2015, pp 281–290, 2015.
A preliminary full version is available here: [ PDF ]
Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, and Vassilis Zikas The Hidden Communication Graph Model: Achieving Communication Locality and Optimal Resilience in the Presence of Adaptive Faults Innovations in Theoretical Computer Science
— ITCS 2015, pp 153–162, 2015.
A preliminary full version is available here: [ PDF ]
Yuval Ishai, Rafail Ostrovsky, and Vassilis Zikas Secure Multi-Party Computation with Identifiable Abort Advances in Cryptology
— CRYPTO 2014, pp 369–386, 2014.
A preliminary full version is available here: [ PDF ]
Seung Geol Choi, Jonathan Katz, Alex J. Malozemoff, and Vassilis Zikas Efficient Three-Party Computation from Cut-and-Choose Advances in Cryptology
— CRYPTO 2014, pp 513–530, 2014.
A preliminary full version is available here: [ PDF ]
Jonathan Katz, Aggelos Kiayias, Hong-Sheng Zhou, and Vassilis Zikas Distributing the Setup in Universally Composable Secure Multi-Party Computation ACM Symposium on Principles of Distributed Computing – PODC 2014, pp 20–29, 2014.
Juan Garay, Jonathan Katz, Ueli Maurer, Bjoern Tackmann, and Vassilis Zikas Rational Protocol Design: Cryptography Against Incentive-Driven
Adversaries IEEE Symposium on Foundations of Computer
Science — FOCS 2013, pp 648–657, 2013. A preliminary full version is available here: [ PDF ]
Jonathan Katz, Ueli Maurer, Bjoern Tackmann, and Vassilis Zikas Universally Composable Synchronous Computation
Theory of Cryptography Conference — TCC 2013,
Lecture Notes in Computer Science, Springer-Verlag, vol 7785, pp
477–498, 2013. A preliminary full version is available here: [ PDF ]
Jonathan Katz, Serge Fehr, Fang Song, Hong-Sheng Zhou, and Vassilis
Zikas Feasibility and Completeness of Cryptographic Tasks in the Quantum
World
Theory of Cryptography Conference — TCC 2013, Lecture Notes in
Computer Science, Springer-Verlag, vol 7785, pp 281-296, 2013. An
extended abstract of this work was also presented at ICITS 2012, workshop track.
Joël Alwen, Jonathan Katz, Ueli Maurer, and Vassilis Zikas Collusion-Preserving Computation Advances in Cryptology
— CRYPTO 2012, Lecture Notes in Computer Science, Springer-Verlag, vol 7417, pp
124-143, 2012.
A preliminary full version is available here: [ PDF ]
Adam Groce, Jonathan Katz, Aishwarya Thiruvengadam, and Vassilis Zikas Byzantine Agreement with a Rational Adversary
International Colloquium on Automata, Languages and Programming
— ICALP 2012, Lecture Notes in Computer Science, Springer-Verlag, vol. 7392, pp. 561–572, 2012.
Available files:
[ PDF ]
Martin Hirt and Vassilis Zikas Player-Centric Byzantine Agreement International Colloquium on Automata, Languages and Programming — ICALP 2011, Lecture Notes in Computer Science, Springer-Verlag, vol. 6755, pp. 281–292, 2011.
Available files:
[ PDF ]
Martin Hirt and Vassilis Zikas Adaptively Secure Broadcast Advances in Cryptology — EUROCRYPT 2010, Lecture Notes in Computer Science, Springer-Verlag, vol. 6110, pp. 466–485, 2010.
Available files:
[ PDF ]
Vassilis Zikas, Sarah Hauser, and Ueli Maurer Realistic Failures in Secure Multi-party Computation Theory of Cryptography Conference — TCC 2009, Lecture Notes in Computer Science, Springer-Verlag, vol. 5444, pp. 274-293, 2009.
Available files:
[ PDF ]
Martin Hirt, Ueli Maurer, and Vassilis Zikas MPC vs. SFE: Unconditional and Computational Security Advances in Cryptology — ASIACRYPT 2008, Lecture Notes in Computer Science, Springer-Verlag, vol. 5350, pp. 1–18, 2008.
Available files:
[ PDF ]
Zuzana Beerliova-Trubiniova, Matthias Fitzi, Martin Hirt, Ueli Maurer, and Vassilis Zikas MPC vs. SFE: Perfect Security in a Unified Corruption Model Theory of Cryptography Conference — TCC 2008, Lecture Notes in Computer Science, Springer-Verlag, vol. 4948, pp. 231–250, 2008.
Available files:
[ PDF ]
Books
Secure Multi-Party Computation (invited chapter)
Editors: Manoj Prabhakaran and Amit Sahai
Cryptology and Information
Security Series, vol.10, IOS Press, Amsterdam, ISBN 978-1-61499-168-7, 2012. Generalized Corruption Models in Secure Multi-Party Computation (PhD
thesis)
ETH Series in Information Security and
Cryptography, Hartung-Gorre Verlag, ISBN 3-86628-338-5, 2010.