Shafi Goldwasser
Orcid: 0000-0003-4728-1535Affiliations:
- Massachusetts Institute of Technology, Cambridge, MA, USA
According to our database1,
Shafi Goldwasser
authored at least 172 papers
between 1982 and 2024.
Collaborative distances:
Collaborative distances:
Awards
Turing Prize recipient
Turing Prize 2012, "For transformative work that laid the complexity-theoretic foundations for the science of cryptography and in the process pioneered new methods for efficient verification of mathematical proofs in complexity theory." awarded to Silvio Micali and Shafi Goldwasser.
ACM Fellow
ACM Fellow 2017, "For transformative work that laid the complexity-theoretic foundations for the science of cryptography".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on scopus.com
-
on fi.edu
-
on viaf.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on isni.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
2023
Collaborative Privacy-Preserving Analysis of Oncological Data using Multiparty Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023
A Theory of Unsupervised Translation Motivated by Understanding Animal Communication.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
2022
Proceedings of the STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20, 2022
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022
Using Zero-Knowledge to Reconcile Law Enforcement Secrecy and Fair Trial Rights in Criminal Cases.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022
2021
Cetacean Translation Initiative: a roadmap to deciphering the communication of sperm whales.
CoRR, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the 36th Computational Complexity Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Electron. Colloquium Comput. Complex., 2020
Proceedings of the Advances in Neural Information Processing Systems 33: Annual Conference on Neural Information Processing Systems 2020, 2020
Proceedings of the Information Theory and Applications Workshop, 2020
2019
Electron. Colloquium Comput. Complex., 2019
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019
Proceedings of the Symposium on Computer Science and Law, 2019
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019
Probabilistic encryption & how to play mental poker keeping secret all partial information.
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018
2017
Electron. Colloquium Comput. Complex., 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017
Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, 2017
2016
On the Fine Grained Complexity of Polynomial Time Problems Given Correlated Instances.
Electron. Colloquium Comput. Complex., 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Electron. Colloquium Comput. Complex., 2015
Electron. Colloquium Comput. Complex., 2015
The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015
2014
Introduction to the Special Issue on Innovations in Theoretical Computer Science 2012 - Part II.
ACM Trans. Comput. Theory, 2014
Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Electron. Colloquium Comput. Complex., 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Introduction to the special issue on innovations in theoretical computer science 2012.
ACM Trans. Comput. Theory, 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Symposium on Theory of Computing Conference, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond.
IACR Cryptol. ePrint Arch., 2012
Electron. Colloquium Comput. Complex., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the 44th Symposium on Theory of Computing Conference, 2012
Proceedings of the 29th International Symposium on Theoretical Aspects of Computer Science, 2012
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012
2011
Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs.
IACR Cryptol. ePrint Arch., 2011
Probabilistic Search Algorithms with Unique Answers and Their Cryptographic Applications.
Electron. Colloquium Comput. Complex., 2011
Proceedings of the Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation, 2011
2010
Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back).
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010
Proceedings of the Innovations in Computer Science, 2010
Proceedings of the Advances in Cryptology, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
08491 Abstracts Collection - Theoretical Foundations of Practical Information Security.
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
Proceedings of the Topics in Cryptology, 2008
2007
Electron. Colloquium Comput. Complex., 2007
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), 2006
2005
Proceedings of the Distributed Computing, 19th International Conference, 2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2005), 2005
2004
Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
2003
Electron. Colloquium Comput. Complex., 2003
Proceedings of the 44th Symposium on Foundations of Computer Science (FOCS 2003), 2003
2002
Complexity of lattice problems - a cryptographic perspective.
The Kluwer international series in engineering and computer science 671, Springer, ISBN: 978-0-7923-7688-0, 2002
2001
IACR Cryptol. ePrint Arch., 2001
2000
IACR Cryptol. ePrint Arch., 2000
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000
1999
Electron. Colloquium Comput. Complex., 1999
An Efficient <i>Threshold</i> Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack.
Proceedings of the Advances in Cryptology, 1999
1998
SIAM J. Comput., 1998
IACR Cryptol. ePrint Arch., 1998
A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic PIR Avoiding Data Replication).
IACR Cryptol. ePrint Arch., 1998
A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication.
Proceedings of the Randomization and Approximation Techniques in Computer Science, 1998
Proceedings of the 39th Annual Symposium on Foundations of Computer Science, 1998
1997
Electron. Colloquium Comput. Complex., 1997
Electron. Colloquium Comput. Complex., 1997
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997
Proceedings of the 38th Annual Symposium on Foundations of Computer Science, 1997
Proceedings of the Advances in Cryptology, 1997
1996
Electron. Colloquium Comput. Complex., 1996
Electron. Colloquium Comput. Complex., 1996
Electron. Colloquium Comput. Complex., 1996
1995
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995
Proceedings of the GISI 95, 1995
1994
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Twenty-Fifth Annual ACM Symposium on Theory of Computing, 1993
Efficient Interactive Proofs and Applications to Approximation.
Proceedings of the Second Israel Symposium on Theory of Computing Systems, 1993
1992
Invariant Signatures and Non-Interactive Zero-Knowledge Proofs are Equivalent (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991
Proceedings of the 32nd Annual Symposium on Foundations of Computer Science, 1991
1990
Proceedings of the Advances in Cryptology, 1990
1989
Private Coins versus Public Coins in Interactive Proof Systems.
Adv. Comput. Res., 1989
Proceedings of the 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October, 1989
Proceedings of the Advances in Cryptology, 1989
New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs.
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
1988
SIAM J. Comput., 1988
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract)
Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 1988
Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 1988
Proceedings of the Advances in Cryptology, 1988
1986
Proceedings of the 18th Annual ACM Symposium on Theory of Computing, 1986
1985
Proceedings of the 17th Annual ACM Symposium on Theory of Computing, 1985
Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults (Extended Abstract)
Proceedings of the 26th Annual Symposium on Foundations of Computer Science, 1985
Proceedings of the Advances in Cryptology, 1985
1984
Proceedings of the 25th Annual Symposium on Foundations of Computer Science, 1984
Proceedings of the 25th Annual Symposium on Foundations of Computer Science, 1984
Proceedings of the Advances in Cryptology, 1984
Proceedings of the Advances in Cryptology, 1984
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information.
Proceedings of the Advances in Cryptology, 1984
1983
Proceedings of the 15th Annual ACM Symposium on Theory of Computing, 1983
1982
Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information
Proceedings of the 14th Annual ACM Symposium on Theory of Computing, 1982
Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, 1982
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982