Shafi Goldwasser
Person information
- affiliation: Massachusetts Institute of Technology, Cambridge, MA, USA
- award: Turing Award, 2012
- award: ACM Athena Lecturer 2008
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [c110]Lijie Chen, Shafi Goldwasser, Kaifeng Lyu, Guy N. Rothblum, Aviad Rubinstein:
Fine-grained Complexity Meets IP = PSPACE. SODA 2019: 1-20 - 2018
- [c109]
- [c108]Shafi Goldwasser, Rafail Ostrovsky, Alessandra Scafuro, Adam Sealfon:
Population Stability: Regulating Size in the Presence of an Adversary. PODC 2018: 397-406 - [c107]Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner:
Practical Accountability of Secret Processes. USENIX Security Symposium 2018: 657-674 - [i62]Shafi Goldwasser, Rafail Ostrovsky, Alessandra Scafuro, Adam Sealfon:
Population stability: regulating size in the presence of an adversary. CoRR abs/1803.02540 (2018) - [i61]Lijie Chen, Shafi Goldwasser, Kaifeng Lyu, Guy N. Rothblum, Aviad Rubinstein:
Fine-grained Complexity Meets IP = PSPACE. CoRR abs/1805.02351 (2018) - [i60]Shafi Goldwasser, Sunoo Park:
Public Accountability vs. Secret Laws: Can They Coexist? IACR Cryptology ePrint Archive 2018: 664 (2018) - [i59]Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner:
Practical Accountability of Secret Processes. IACR Cryptology ePrint Archive 2018: 697 (2018) - 2017
- [j24]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer:
The Hunting of the SNARK. J. Cryptology 30(4): 989-1066 (2017) - [c106]Shafi Goldwasser, Ofer Grossman:
Bipartite Perfect Matching in Pseudo-Deterministic NC. ICALP 2017: 87:1-87:13 - [c105]Shafi Goldwasser, Dhiraj Holden:
The Complexity of Problems in P Given Correlated Instances. ITCS 2017: 13:1-13:19 - [c104]Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, Matei Zaharia:
Splinter: Practical Private Queries on Public Data. NSDI 2017: 299-313 - [c103]
- [c102]Shafi Goldwasser, Sunoo Park:
Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal. WPES@CCS 2017: 99-110 - [i58]Shafi Goldwasser, Ofer Grossman, Dhiraj Holden:
Pseudo-deterministic Proofs. CoRR abs/1706.04641 (2017) - [i57]Shafi Goldwasser, Ofer Grossman, Dhiraj Holden:
Pseudo-Deterministic Proofs. Electronic Colloquium on Computational Complexity (ECCC) 24: 105 (2017) - [i56]Shafi Goldwasser, Guy N. Rothblum, Yael Tauman Kalai:
Delegating Computation: Interactive Proofs for Muggles. Electronic Colloquium on Computational Complexity (ECCC) 24: 108 (2017) - [i55]Shafi Goldwasser, Saleet Klein, Daniel Wichs:
The Edited Truth. IACR Cryptology ePrint Archive 2017: 714 (2017) - 2016
- [c101]Pablo Daniel Azar, Shafi Goldwasser, Sunoo Park:
How to Incentivize Data-Driven Collaboration Among Competing Parties. ITCS 2016: 213-225 - [c100]Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters:
Time-Lock Puzzles from Randomized Encodings. ITCS 2016: 345-356 - [c99]Shafi Goldwasser, Yael Tauman Kalai:
Cryptographic Assumptions: A Position Paper. TCC (A1) 2016: 505-522 - [i54]Pablo Azar, Shafi Goldwasser, Sunoo Park:
How to Incentivize Data-Driven Collaboration Among Competing Parties. CoRR abs/1601.02298 (2016) - [i53]Shafi Goldwasser, Dhiraj Holden:
On the Fine Grained Complexity of Polynomial Time Problems Given Correlated Instances. Electronic Colloquium on Computational Complexity (ECCC) 23: 56 (2016) - [i52]Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, Matei Zaharia:
Splinter: Practical Private Queries on Public Data. IACR Cryptology ePrint Archive 2016: 1148 (2016) - 2015
- [j23]Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum:
Delegating Computation: Interactive Proofs for Muggles. J. ACM 62(4): 27:1-27:64 (2015) - [j22]Shafi Goldwasser, Guy N. Rothblum:
How to Compute in the Presence of Leakage. SIAM J. Comput. 44(5): 1480-1549 (2015) - [c98]Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park:
Adaptively Secure Coin-Flipping, Revisited. ICALP (2) 2015: 663-674 - [c97]Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas:
The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults. ITCS 2015: 153-162 - [c96]Irit Dinur, Shafi Goldwasser, Huijia Lin:
The Computational Benefit of Correlated Instances. ITCS 2015: 219-228 - [c95]Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser:
Machine Learning Classification over Encrypted Data. NDSS 2015 - [c94]Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregate Pseudorandom Functions and Connections to Learning. TCC (2) 2015: 61-89 - [c93]Ran Canetti, Shafi Goldwasser, Oxana Poburinnaya:
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation. TCC (2) 2015: 557-585 - [i51]Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park:
Adaptively Secure Coin-Flipping, Revisited. CoRR abs/1503.01588 (2015) - [i50]Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregate Pseudorandom Functions and Connections to Learning. Electronic Colloquium on Computational Complexity (ECCC) 22: 9 (2015) - [i49]Shafi Goldwasser, Ofer Grossman:
Perfect Bipartite Matching in Pseudo-Deterministic RNC. Electronic Colloquium on Computational Complexity (ECCC) 22: 208 (2015) - [i48]Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregatable Pseudorandom Functions and Connections to Learning. IACR Cryptology ePrint Archive 2015: 38 (2015) - [i47]Pablo Azar, Shafi Goldwasser, Sunoo Park:
How to Incentivize Data-Driven Collaboration Among Competing Parties. IACR Cryptology ePrint Archive 2015: 178 (2015) - [i46]Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park:
Adaptively Secure Coin-Flipping, Revisited. IACR Cryptology ePrint Archive 2015: 202 (2015) - [i45]Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters:
Time-Lock Puzzles from Randomized Encodings. IACR Cryptology ePrint Archive 2015: 514 (2015) - [i44]Shafi Goldwasser, Yael Tauman Kalai:
Cryptographic Assumptions: A Position Paper. IACR Cryptology ePrint Archive 2015: 907 (2015) - 2014
- [j21]Elette Boyle, Shafi Goldwasser, Yael Tauman Kalai:
Leakage-resilient coin tossing. Distributed Computing 27(3): 147-164 (2014) - [j20]Shafi Goldwasser, Guy N. Rothblum:
On Best-Possible Obfuscation. J. Cryptology 27(3): 480-505 (2014) - [j19]Eric Allender, Shafi Goldwasser:
Introduction to the Special Issue on Innovations in Theoretical Computer Science 2012 - Part II. TOCT 6(3): 10:1 (2014) - [c92]Nir Bitansky, Ran Canetti, Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai, Omer Paneth, Alon Rosen:
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator. CRYPTO (2) 2014: 71-89 - [c91]Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou:
Multi-input Functional Encryption. EUROCRYPT 2014: 578-602 - [c90]Elette Boyle, Shafi Goldwasser, Ioana Ivan:
Functional Signatures and Pseudorandom Functions. Public Key Cryptography 2014: 501-519 - [i43]Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai:
The impossibility of obfuscation with a universal simulator. CoRR abs/1401.0348 (2014) - [i42]Irit Dinur, Shafi Goldwasser, Huijia Lin:
The Computational Benefit of Correlated Instances. Electronic Colloquium on Computational Complexity (ECCC) 21: 83 (2014) - [i41]Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser:
Machine Learning Classification over Encrypted Data. IACR Cryptology ePrint Archive 2014: 331 (2014) - [i40]Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, Eran Tromer:
The Hunting of the SNARK. IACR Cryptology ePrint Archive 2014: 580 (2014) - [i39]Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas:
Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality. IACR Cryptology ePrint Archive 2014: 615 (2014) - [i38]Ran Canetti, Shafi Goldwasser, Oxana Poburinnaya:
Adaptively Secure Two-party Computation From Indistinguishability Obfuscation. IACR Cryptology ePrint Archive 2014: 845 (2014) - 2013
- [j18]Eric Allender, Shafi Goldwasser:
Introduction to the special issue on innovations in theoretical computer science 2012. TOCT 5(3): 8:1 (2013) - [c89]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
How to Run Turing Machines on Encrypted Data. CRYPTO (2) 2013: 536-553 - [c88]Oded Goldreich, Shafi Goldwasser, Dana Ron:
On the possibilities and limitations of pseudodeterministic algorithms. ITCS 2013: 127-138 - [c87]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Reusable garbled circuits and succinct functional encryption. STOC 2013: 555-564 - [c86]Elette Boyle, Shafi Goldwasser, Stefano Tessaro:
Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting. TCC 2013: 356-376 - [i37]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Overcoming the Worst-Case Curse for Cryptographic Constructions. IACR Cryptology ePrint Archive 2013: 229 (2013) - [i36]Elette Boyle, Shafi Goldwasser, Ioana Ivan:
Functional Signatures and Pseudorandom Functions. IACR Cryptology ePrint Archive 2013: 401 (2013) - [i35]Shafi Goldwasser, Yael Tauman Kalai:
A Note on the Impossibility of Obfuscation with Auxiliary Input. IACR Cryptology ePrint Archive 2013: 665 (2013) - [i34]Shafi Goldwasser, Vipul Goyal, Abhishek Jain, Amit Sahai:
Multi-Input Functional Encryption. IACR Cryptology ePrint Archive 2013: 727 (2013) - 2012
- [c85]
- [c84]Adi Akavia, Shafi Goldwasser, Carmit Hazay:
Distributed public key schemes secure against continual leakage. PODC 2012: 155-164 - [c83]
- [c82]Elette Boyle, Shafi Goldwasser, Abhishek Jain, Yael Tauman Kalai:
Multiparty computation secure against continual memory leakage. STOC 2012: 1235-1254 - [c81]Shafi Goldwasser, Allison B. Lewko, David A. Wilson:
Bounded-Collusion IBE from Key Homomorphism. TCC 2012: 564-581 - [e3]Shafi Goldwasser:
Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA, January 8-10, 2012. ACM 2012, ISBN 978-1-4503-1115-1 [contents] - [i33]Shafi Goldwasser, Guy N. Rothblum:
How to Compute in the Presence of Leakage. Electronic Colloquium on Computational Complexity (ECCC) 19: 10 (2012) - [i32]Oded Goldreich, Shafi Goldwasser, Dana Ron:
On the possibilities and limitations of pseudodeterministic algorithms. Electronic Colloquium on Computational Complexity (ECCC) 19: 101 (2012) - [i31]Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich:
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond. IACR Cryptology ePrint Archive 2012: 733 (2012) - 2011
- [c80]Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum:
Program Obfuscation with Leaky Hardware. ASIACRYPT 2011: 722-739 - [c79]Zvika Brakerski, Shafi Goldwasser, Yael Tauman Kalai:
Black-Box Circular-Secure Encryption beyond Affine Functions. TCC 2011: 201-218 - [c78]Elette Boyle, Shafi Goldwasser, Yael Tauman Kalai:
Leakage-Resilient Coin Tossing. DISC 2011: 181-196 - [p1]Oded Goldreich, Shafi Goldwasser, Shai Halevi:
Collision-Free Hashing from Lattice Problems. Studies in Complexity and Cryptography 2011: 30-39 - [i30]Eran Gat, Shafi Goldwasser:
Probabilistic Search Algorithms with Unique Answers and Their Cryptographic Applications. Electronic Colloquium on Computational Complexity (ECCC) 18: 136 (2011) - [i29]Elette Boyle, Shafi Goldwasser, Yael Tauman Kalai:
Leakage-Resilient Coin Tossing. IACR Cryptology ePrint Archive 2011: 291 (2011) - [i28]Shafi Goldwasser, Huijia Lin, Aviad Rubinstein:
Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs. IACR Cryptology ePrint Archive 2011: 456 (2011) - [i27]Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum:
Program Obfuscation with Leaky Hardware. IACR Cryptology ePrint Archive 2011: 660 (2011) - 2010
- [j17]Oded Goldreich, Shafi Goldwasser, Asaf Nussboim:
On the Implementation of Huge Random Objects. SIAM J. Comput. 39(7): 2761-2822 (2010) - [c77]Zvika Brakerski, Shafi Goldwasser:
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back). CRYPTO 2010: 1-20 - [c76]Shafi Goldwasser, Guy N. Rothblum:
Securing Computation against Continuous Leakage. CRYPTO 2010: 59-79 - [c75]Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, Vinod Vaikuntanathan:
Robustness of the Learning with Errors Assumption. ICS 2010: 230-240 - [c74]Adi Akavia, Oded Goldreich, Shafi Goldwasser, Dana Moshkovitz:
Erratum for: on basing one-way functions on NP-hardness. STOC 2010: 795-796 - [c73]Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert, Vinod Vaikuntanathan:
Public-Key Encryption Schemes with Auxiliary Inputs. TCC 2010: 361-381 - [i26]Zvika Brakerski, Shafi Goldwasser:
Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back). IACR Cryptology ePrint Archive 2010: 226 (2010)
2000 – 2009
- 2009
- [c72]
- [c71]
- [c70]Adi Akavia, Shafi Goldwasser, Vinod Vaikuntanathan:
Simultaneous Hardcore Bits and Cryptography against Memory Attacks. TCC 2009: 474-495 - [c69]Zvika Brakerski, Shafi Goldwasser, Guy N. Rothblum, Vinod Vaikuntanathan:
Weak Verifiable Random Functions. TCC 2009: 558-576 - [i25]Zvika Brakerski, Shafi Goldwasser, Yael Tauman Kalai:
Black-Box Circular-Secure Encryption Beyond Affine Functions. IACR Cryptology ePrint Archive 2009: 485 (2009) - 2008
- [c68]
- [c67]
- [c66]Ran Canetti, Dror Eiger, Shafi Goldwasser, Dah-Yoh Lim:
How to Protect Yourself without Perfect Shredding. ICALP (2) 2008: 511-523 - [c65]Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum:
Delegating computation: interactive proofs for muggles. STOC 2008: 113-122 - [c64]Shafi Goldwasser, Dan Gutfreund, Alexander Healy, Tali Kaufman, Guy N. Rothblum:
A (de)constructive approach to program checking. STOC 2008: 143-152 - [e2]Ran Canetti, Shafi Goldwasser, Günter Müller, Rainer Steinwandt:
Theoretical Foundations of Practical Information Security, 30.11. - 05.12.2008. Dagstuhl Seminar Proceedings 08491, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany 2008 [contents] - [i24]Ran Canetti, Shafi Goldwasser, Günter Müller, Rainer Steinwandt:
08491 Abstracts Collection - Theoretical Foundations of Practical Information Security. Theoretical Foundations of Practical Information Security 2008 - [i23]Ran Canetti, Shafi Goldwasser, Günter Müller, Rainer Steinwandt:
08491 Executive Summary - Theoretical Foundations of Practical Information Security. Theoretical Foundations of Practical Information Security 2008 - [i22]Ran Canetti, Dror Eiger, Shafi Goldwasser, Dah-Yoh Lim:
How to Protect Yourself without Perfect Shredding. IACR Cryptology ePrint Archive 2008: 291 (2008) - 2007
- [c63]Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert de Haan, Vinod Vaikuntanathan:
Secure Computation from Random Error Correcting Codes. EUROCRYPT 2007: 291-310 - [c62]Shafi Goldwasser, Dan Gutfreund, Alexander Healy, Tali Kaufman, Guy N. Rothblum:
Verifying and decoding in constant depth. STOC 2007: 440-449 - [c61]
- [i21]Shafi Goldwasser, Dan Gutfreund, Alexander Healy, Tali Kaufman, Guy N. Rothblum:
A (De)constructive Approach to Program Checking. Electronic Colloquium on Computational Complexity (ECCC) 14(047) (2007) - 2006
- [c60]Shafi Goldwasser, Elan Pavlov, Vinod Vaikuntanathan:
Fault-Tolerant Distributed Computing in Full-Information Networks. FOCS 2006: 15-26 - [c59]Adi Akavia, Oded Goldreich, Shafi Goldwasser, Dana Moshkovitz:
On basing one-way functions on NP-hardness. STOC 2006: 701-710 - 2005
- [j16]Shafi Goldwasser, Yehuda Lindell:
Secure Multi-Party Computation without Agreement. J. Cryptology 18(3): 247-287 (2005) - [c58]Shafi Goldwasser, Yael Tauman Kalai:
On the Impossibility of Obfuscation with Auxiliary Input. FOCS 2005: 553-562 - [c57]Shafi Goldwasser, Dmitriy Kharchenko:
Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem. TCC 2005: 529-555 - [c56]Shafi Goldwasser, Madhu Sudan, Vinod Vaikuntanathan:
Distributed Computing with Imperfect Randomness. DISC 2005: 288-302 - 2004
- [c55]Shafi Goldwasser, Erez Waisbard:
Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes. TCC 2004: 77-100 - 2003
- [c54]Oded Goldreich, Shafi Goldwasser, Asaf Nussboim:
On the Implementation of Huge Random Objects. FOCS 2003: 68-79 - [c53]Shafi Goldwasser, Yael Tauman Kalai:
On the (In)security of the Fiat-Shamir Paradigm. FOCS 2003: 102-113 - [c52]Adi Akavia, Shafi Goldwasser, Shmuel Safra:
Proving Hard-Core Predicates Using List Decoding. FOCS 2003: 146-157 - [i20]Shafi Goldwasser, Yael Tauman:
On the (In)security of the Fiat-Shamir Paradigm. Electronic Colloquium on Computational Complexity (ECCC) 10(015) (2003) - [i19]Oded Goldreich, Shafi Goldwasser, Asaf Nussboim:
On the Implementation of Huge Random Objects. Electronic Colloquium on Computational Complexity (ECCC)(045) (2003) - [i18]Shafi Goldwasser, Yael Tauman:
On the (In)security of the Fiat-Shamir Paradigm. IACR Cryptology ePrint Archive 2003: 34 (2003) - 2002
- [c51]
- [i17]Shafi Goldwasser, Yehuda Lindell:
Secure Computation Without Agreement. IACR Cryptology ePrint Archive 2002: 40 (2002) - 2001
- [c50]Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali:
Identification Protocols Secure against Reset Attacks. EUROCRYPT 2001: 495-511 - [c49]Boaz Barak, Oded Goldreich, Shafi Goldwasser, Yehuda Lindell:
Resettably-Sound Zero-Knowledge and its Applications. FOCS 2001: 116-125 - [i16]Boaz Barak, Oded Goldreich, Shafi Goldwasser, Yehuda Lindell:
Resettably-Sound Zero-Knowledge and its Applications. IACR Cryptology ePrint Archive 2001: 63 (2001) - 2000
- [j15]Oded Goldreich, Shafi Goldwasser, Eric Lehman, Dana Ron, Alex Samorodnitsky:
Testing Monotonicity. Combinatorica 20(3): 301-337 (2000) - [j14]Oded Goldreich, Shafi Goldwasser:
On the Limits of Nonapproximability of Lattice Problems. J. Comput. Syst. Sci. 60(3): 540-563 (2000) - [c48]Ran Canetti, Oded Goldreich, Shafi Goldwasser, Silvio Micali:
Resettable zero-knowledge (extended abstract). STOC 2000: 235-244 - [i15]Mihir Bellare, Marc Fischlin, Shafi Goldwasser, Silvio Micali:
Identification Protocols Secure Against Reset Attacks. IACR Cryptology ePrint Archive 2000: 15 (2000)
1990 – 1999
- 1999
- [j13]
- [c47]Ran Canetti, Shafi Goldwasser:
An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack. EUROCRYPT 1999: 90-106 - [i14]Oded Goldreich, Shafi Goldwasser, Silvio Micali:
Interleaved Zero-Knowledge in the Public-Key Model. Electronic Colloquium on Computational Complexity (ECCC) 6(24) (1999)