default search action
Ben Fisch
Person information
- affiliation: Yale University, USA
- affiliation: Stanford University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j1]Dan Boneh, Benedikt Bünz, Ben Fisch:
A Survey of Two Verifiable Delay Functions Using Proof of Exponentiation. IACR Commun. Cryptol. 1(1): 7 (2024) - [c18]Hadas Zeilberger, Binyi Chen, Ben Fisch:
BaseFold: Efficient Field-Agnostic Polynomial Commitment Schemes from Foldable Codes. CRYPTO (10) 2024: 138-169 - [c17]Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, María Naya-Plasencia, Benjamin Wesolowski:
Cryptanalysis of Algebraic Verifiable Delay Functions. CRYPTO (3) 2024: 457-490 - [i26]Wenhao Wang, Lulu Zhou, Aviv Yaish, Fan Zhang, Ben Fisch, Benjamin Livshits:
Mechanism Design for ZK-Rollup Prover Markets. CoRR abs/2404.06495 (2024) - [i25]Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Charalampos Papamanthou:
Single Server PIR via Homomorphic Thorp Shuffles. IACR Cryptol. ePrint Arch. 2024: 482 (2024) - [i24]Arthur Lazzaretti, Zeyu Liu, Ben Fisch, Charalampos Papamanthou:
Multi-Server Doubly Efficient PIR. IACR Cryptol. ePrint Arch. 2024: 829 (2024) - [i23]Alex Biryukov, Ben Fisch, Gottfried Herold, Dmitry Khovratovich, Gaëtan Leurent, María Naya-Plasencia, Benjamin Wesolowski:
Cryptanalysis of Algebraic Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2024: 873 (2024) - [i22]Jeb Bearer, Benedikt Bünz, Philippe Camacho, Binyi Chen, Ellie Davidson, Ben Fisch, Brendon Fish, Gus Gutoski, Fernando Krell, Chengyu Lin, Dahlia Malkhi, Kartik Nayak, Keyao Shen, Alex Luoyuan Xiong, Nathan Yospe:
The Espresso Sequencing Network: HotShot Consensus, Tiramisu Data-Availability, and Builder-Exchange. IACR Cryptol. ePrint Arch. 2024: 1189 (2024) - [i21]Ben Fisch, Arthur Lazzaretti, Zeyu Liu, Lei Yang:
Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups). IACR Cryptol. ePrint Arch. 2024: 1299 (2024) - [i20]Martijn Brehm, Binyi Chen, Ben Fisch, Nicolas Resch, Ron D. Rothblum, Hadas Zeilberger:
Blaze: Fast SNARKs from Interleaved RAA Codes. IACR Cryptol. ePrint Arch. 2024: 1609 (2024) - 2023
- [c16]Ben Fisch, Zeyu Liu, Psi Vesely:
Orbweaver: Succinct Linear Functional Commitments from Lattices. CRYPTO (2) 2023: 106-131 - [c15]Benedikt Bünz, Ben Fisch:
Multilinear Schwartz-Zippel Mod N and Lattice-Based Succinct Arguments. TCC (3) 2023: 394-423 - [c14]Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho:
VeriZexe: Decentralized Private Computation with Universal Setup. USENIX Security Symposium 2023: 4445-4462 - [i19]Josh Beal, Ben Fisch:
Derecho: Privacy Pools with Proof-Carrying Disclosures. IACR Cryptol. ePrint Arch. 2023: 273 (2023) - [i18]Hadas Zeilberger, Binyi Chen, Ben Fisch:
BaseFold: Efficient Field-Agnostic Polynomial Commitment Schemes from Foldable Codes. IACR Cryptol. ePrint Arch. 2023: 1705 (2023) - 2022
- [c13]Nirvan Tyagi, Ben Fisch, Andrew Zitek, Joseph Bonneau, Stefano Tessaro:
VeRSA: Verifiable Registries with Efficient Client Audits from RSA Authenticated Dictionaries. CCS 2022: 2793-2807 - [i17]Benedikt Bünz, Ben Fisch:
Schwartz-Zippel for multilinear polynomials mod N. CoRR abs/2204.05037 (2022) - [i16]Benedikt Bünz, Ben Fisch:
Schwartz-Zippel for multilinear polynomials mod N. IACR Cryptol. ePrint Arch. 2022: 458 (2022) - [i15]Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, Philippe Camacho:
VERI-ZEXE: Decentralized Private Computation with Universal Setup. IACR Cryptol. ePrint Arch. 2022: 802 (2022) - 2021
- [c12]Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Halo Infinite: Proof-Carrying Data from Additive Polynomial Commitments. CRYPTO (1) 2021: 649-680 - [i14]Nirvan Tyagi, Ben Fisch, Joseph Bonneau, Stefano Tessaro:
Client-Auditable Verifiable Registries. IACR Cryptol. ePrint Arch. 2021: 627 (2021) - 2020
- [c11]Benedikt Bünz, Ben Fisch, Alan Szepieniec:
Transparent SNARKs from DARK Compilers. EUROCRYPT (1) 2020: 677-706 - [i13]Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Efficient polynomial commitment schemes for multiple points and polynomials. IACR Cryptol. ePrint Arch. 2020: 81 (2020) - [i12]Dan Boneh, Justin Drake, Ben Fisch, Ariel Gabizon:
Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme. IACR Cryptol. ePrint Arch. 2020: 1536 (2020)
2010 – 2019
- 2019
- [c10]Ethan Cecchetti, Ben Fisch, Ian Miers, Ari Juels:
PIEs: Public Incompressible Encodings for Decentralized Storage. CCS 2019: 1351-1367 - [c9]Dan Boneh, Benedikt Bünz, Ben Fisch:
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains. CRYPTO (1) 2019: 561-586 - [c8]Dan Boneh, Saba Eskandarian, Ben Fisch:
Post-quantum EPID Signatures from Symmetric Primitives. CT-RSA 2019: 251-271 - [c7]Ben Fisch:
Tight Proofs of Space and Replication. EUROCRYPT (2) 2019: 324-348 - [i11]Benedikt Bünz, Ben Fisch, Alan Szepieniec:
Transparent SNARKs from DARK Compilers. IACR Cryptol. ePrint Arch. 2019: 1229 (2019) - 2018
- [c6]Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:
Verifiable Delay Functions. CRYPTO (1) 2018: 757-788 - [i10]Dan Boneh, Saba Eskandarian, Ben Fisch:
Post-Quantum Group Signatures from Symmetric Primitives. IACR Cryptol. ePrint Arch. 2018: 261 (2018) - [i9]Ben Fisch, Shashwat Silas:
Weak Compression and (In)security of Rational Proofs of Storage. IACR Cryptol. ePrint Arch. 2018: 514 (2018) - [i8]Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch:
Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2018: 601 (2018) - [i7]Ben Fisch:
PoReps: Proofs of Space on Useful Data. IACR Cryptol. ePrint Arch. 2018: 678 (2018) - [i6]Ben Fisch:
Tight Proofs of Space and Replication. IACR Cryptol. ePrint Arch. 2018: 702 (2018) - [i5]Dan Boneh, Benedikt Bünz, Ben Fisch:
A Survey of Two Verifiable Delay Functions. IACR Cryptol. ePrint Arch. 2018: 712 (2018) - [i4]Dan Boneh, Benedikt Bünz, Ben Fisch:
Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains. IACR Cryptol. ePrint Arch. 2018: 1188 (2018) - 2017
- [c5]Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov:
IRON: Functional Encryption using Intel SGX. CCS 2017: 765-782 - [c4]Ben Fisch, Rafael Pass, Abhi Shelat:
Socially Optimal Mining Pools. WINE 2017: 205-218 - [i3]Ben A. Fisch, Rafael Pass, Abhi Shelat:
Socially Optimal Mining Pools. CoRR abs/1703.03846 (2017) - 2015
- [c3]Ben A. Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin:
Malicious-Client Security in Blind Seer: A Scalable Private DBMS. IEEE Symposium on Security and Privacy 2015: 395-410 - [c2]Ben A. Fisch, Daniel Freund, Moni Naor:
Secure Physical Computation Using Disposable Circuits. TCC (1) 2015: 182-198 - [i2]Ben Fisch, Daniel Freund, Moni Naor:
Secure Physical Computation using Disposable Circuits. IACR Cryptol. ePrint Arch. 2015: 226 (2015) - 2014
- [c1]Ben Fisch, Daniel Freund, Moni Naor:
Physical Zero-Knowledge Proofs of Physical Properties. CRYPTO (2) 2014: 313-336 - [i1]Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin:
Malicious-Client Security in Blind Seer: A Scalable Private DBMS. IACR Cryptol. ePrint Arch. 2014: 963 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint