His primary areas of study are Theoretical computer science, Computer security, Cryptography, Encryption and Random oracle. His research integrates issues of Homomorphic encryption, Mathematical proof, Set, Protocol and Computation in his study of Theoretical computer science. As part of the same scientific family, Jonathan Katz usually focuses on Computation, concentrating on Commitment scheme and intersecting with Secure two-party computation, Secure multi-party computation and Divide and choose.
His study looks at the relationship between Computer security and topics such as Distributed computing, which overlap with Wireless sensor network, Overhead and Resilience. His Cryptography research is multidisciplinary, incorporating elements of Verifiable secret sharing and Key exchange, Blind signature, Public-key cryptography. His Random oracle study incorporates themes from ElGamal signature scheme, Standard model, Schnorr signature and Identification.
Jonathan Katz focuses on Theoretical computer science, Computer security, Cryptography, Encryption and Secure multi-party computation. His work investigates the relationship between Theoretical computer science and topics such as Random oracle that intersect with problems in Standard model. Public-key cryptography, Adversary, Authenticated Key Exchange, Cryptographic protocol and Password are the primary areas of interest in his Computer security study.
His Cryptography research is multidisciplinary, relying on both Scheme, Homomorphic encryption, Digital signature and Authentication. His studies in Probabilistic encryption, 40-bit encryption, Attribute-based encryption, Ciphertext and Cryptosystem are all subfields of Encryption research. His work in the fields of Secure two-party computation overlaps with other areas such as Protocol.
Jonathan Katz mainly investigates Theoretical computer science, Protocol, Computer network, Computer security and Secure multi-party computation. The study incorporates disciplines such as Fuzzy extractor, Set, Construct, Hash function and Biometric data in addition to Theoretical computer science. Jonathan Katz has included themes like Telecommunications network, Average consensus, Consensus and Cryptocurrency in his Protocol study.
His work carried out in the field of Computer network brings together such families of science as Fraction and Constant. Computer security is closely attributed to Compromise in his study. His Secure multi-party computation research is multidisciplinary, incorporating perspectives in Stateless protocol and Distributed computing.
His main research concerns Theoretical computer science, Computation, Secure multi-party computation, Protocol and Computer security. Theoretical computer science and Technical documentation are two areas of study in which Jonathan Katz engages in interdisciplinary research. His Computation research includes themes of Preprocessor and Parallel computing.
His Secure multi-party computation research is multidisciplinary, relying on both Cryptographic protocol and Block cipher. Jonathan Katz has included themes like Average consensus, Consensus, Divergence and Probabilistic logic in his Protocol study. He combines topics linked to Random variable with his work on Computer security.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A pairwise key predistribution scheme for wireless sensor networks
Wenliang Du;Jing Deng;Yunghsiang S. Han;Pramod K. Varshney.
ACM Transactions on Information and System Security (2005)
Introduction to Modern Cryptography
Jonathan Katz;Yehuda Lindell.
(2007)
Chosen-Ciphertext Security from Identity-Based Encryption
Ran Canetti;Shai Halevi;Jonathan Katz.
theory and application of cryptographic techniques (2004)
Predicate encryption supporting disjunctions, polynomial equations, and inner products
Jonathan Katz;Amit Sahai;Brent Waters.
international cryptology conference (2008)
Predicate encryption supporting disjunctions, polynomial equations, and inner products
Jonathan Katz;Amit Sahai;Brent Waters.
international cryptology conference (2008)
A forward-secure public-key encryption scheme
Ran Canetti;Shai Halevi;Jonathan Katz.
Lecture Notes in Computer Science (2003)
Faster secure two-party computation using garbled circuits
Yan Huang;David Evans;Jonathan Katz;Lior Malka.
usenix security symposium (2011)
Introduction to Modern Cryptography (Chapman & Hall/CRC Cryptography and Network Security Series)
Jonathan Katz;Yehuda Lindell.
(2020)
A forward-secure public-key encryption scheme
Ran Canetti;Shai Halevi;Jonathan Katz.
Lecture Notes in Computer Science (2003)
Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords
Jonathan Katz;Rafail Ostrovsky;Moti Yung.
theory and application of cryptographic techniques (2001)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Bar-Ilan University
Carnegie Mellon University
New York University
Algorand Foundation
University of California, Los Angeles
Boston University
Boston University
National Institutes of Health
University of Missouri
Imperial College London
Google (United States)
Portland State University
University of Electronic Science and Technology of China
University of Camerino
Tsinghua University
Rutherford Appleton Laboratory
Université Laval
Wellcome Sanger Institute
Oregon Health & Science University
National University of Rosario
Centre national de la recherche scientifique, CNRS
Technical University of Madrid
University College London
City Of Hope National Medical Center
Centre for Addiction and Mental Health