Jonathan Katz

Professor
3225 A.V. Williams Building
(301) 405-1226
Education: 
Ph.D. (with distinction) Columbia University
Special Awards/Honors: 
National Science Foundation (NSF) Career Award
Biography: 

Jonathan Katz is a professor in the Department of Computer Science and director of the Maryland Cybersecurity Center (MC2).

His research interests lie broadly in the areas of cryptography, computer and network security, and complexity theory, with his most recent work focusing on secure multi-party computation, database privacy, and the science of cybersecurity. He has co-authored the textbook, "Introduction to Modern Cryptography" (CRC Press, 2007), and a monograph on digital signature schemes (Springer, 2010).

Katz received undergraduate degrees in chemistry and mathematics from MIT in 1996, and a doctorate in computer science from Columbia University in 2002. He has held visiting appointments at UCLA, the École normale supérieure in Paris, France, and IBM in Hawthorne, NY. He has been awarded the National Science Foundation (NSF) CAREER Award, given to outstanding junior faculty who exemplify the role of teacher-scholars so they can further their research in their areas of expertise.

Publications

2012


Katz J, MacKenzie P, Taban G, Gligor V.  2012.  Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 78(2):651-669.

Choi S, Hwang KW, Katz J, Malkin T, Rubenstein D.  2012.  Secure multi-party computation of boolean circuits with applications to privacy in on-line marketplaces. Topics in Cryptology–CT-RSA 2012.
:416-432.

Huang Y, Katz J, Evans D.  2012.  Quid Pro Quo-tocols: Strengthening Semi-Honest Protocols with Dual Execution. IEEE Symposium on Security and Privacy.

2011


Huang Y, Malka L, Evans D, Katz J.  2011.  Efficient privacy-preserving biometric identification. Network and Distributed System Security Symposium.

Katz J, Vaikuntanathan V.  2011.  Round-optimal password-based authenticated key exchange. Theory of Cryptography.
:293-310.

Huang Y, Evans D, Katz J.  2011.  Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? 19th Network and Distributed Security Symposium.

Katz J, Malka L.  2011.  Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011.
:556-571.

Brakerski Z, Katz J, Segev G, Yerukhimovich A.  2011.  Limits on the power of zero-knowledge proofs in cryptographic constructions. Theory of Cryptography.
:559-578.

Huang Y, Evans D, Katz J, Malka L.  2011.  Faster secure two-party computation using garbled circuits. USENIX Security Symposium.

Gordon D, Katz J, Kolesnikov V, Malkin T, Raykova M, Vahlis Y.  2011.  Secure computation with sublinear amortized work.

Gordon DS, Hazay C, Katz J, Lindell Y.  2011.  Complete Fairness in Secure Two-Party Computation. Journal of the ACM. 58(6):24:1–24:37-24:1–24:37.

Garay JA, Katz J, Kumaresan R, Zhou HS.  2011.  Adaptively secure broadcast, revisited. Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing.

Ishai Y, Katz J, Kushilevitz E, Lindell Y, Petrank E.  2011.  On Achieving the" Best of Both Worlds" in Secure Multiparty Computation. SIAM Journal on Computing. 40(1):122-122.

Groce A, Katz J, Yerukhimovich A.  2011.  Limits of computational differential privacy in the client/server setting. Theory of Cryptography.
:417-431.

Huang Y, Shen C, Evans D, Katz J, Shelat A.  2011.  Efficient Secure Computation with Garbled Circuits. Information Systems Security.
:28-48.

Katz J, Schröder D, Yerukhimovich A.  2011.  Impossibility of blind signatures from one-way permutations. Theory of Cryptography.
:615-629.

2010


Gordon S, Katz J, Kumaresan R, Yerukhimovich A.  2010.  Authenticated broadcast with a partially compromised public-key infrastructure. Stabilization, Safety, and Security of Distributed Systems.
:144-158.

Horvitz O, Katz J.  2010.  Bounds on the efficiency of black-box commitment schemes. Theoretical Computer Science. 411(10):1251-1260.

Katz J, Shin JS, Smith A.  2010.  Parallel and concurrent security of the HB and HB+ protocols. Journal of cryptology. 23(3):402-421.

Brakerski Z, Kalai YT, Katz J, Vaikuntanathan V.  2010.  Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on.
:501-510.

Gennaro R, Katz J, Krawczyk H, Rabin T.  2010.  Secure network coding over the integers. Public Key Cryptography–PKC 2010.
:142-160.

Gordon S, Katz J, Vaikuntanathan V.  2010.  A group signature scheme from lattice assumptions. Advances in Cryptology-ASIACRYPT 2010.
:395-412.

Groce A, Katz J.  2010.  A new framework for efficient password-based authenticated key exchange. Proceedings of the 17th ACM conference on Computer and communications security.
:516-525.

Gordon S, Katz J.  2010.  Partial fairness in secure two-party computation. Advances in Cryptology–EUROCRYPT 2010.
:157-176.

Katz J.  2010.  Public-Key Cryptography. Handbook of Information and Communication Security.
:21-34.

Katz J, Malka L.  2010.  Secure text processing with applications to private DNA matching. Proceedings of the 17th ACM conference on Computer and communications security.
:485-492.

Fuchsbauer G, Katz J, Naccache D.  2010.  Efficient rational secret sharing in standard communication networks. Theory of Cryptography.
:419-436.

2009


Katz J, Vaikuntanathan V.  2009.  Signature schemes with bounded leakage resilience. Advances in Cryptology–ASIACRYPT 2009.
:703-720.

Katz J, Koo C-Y.  2009.  On expected constant-round protocols for Byzantine agreement. Journal of Computer and System Sciences. 75(2):91-112.

Katz J, Vaikuntanathan V.  2009.  Smooth projective hashing and password-based authenticated key exchange from lattices. Advances in Cryptology–ASIACRYPT 2009.
:636-652.

Katz J, Yerukhimovich A.  2009.  On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009.
:197-213.

Haitner I, Horvitz O, Katz J, Koo CY, Morselli R, Shaltiel R.  2009.  Reducing complexity assumptions for statistically-hiding commitment. Journal of cryptology. 22(3):283-310.

Bender A, Katz J, Morselli R.  2009.  Ring signatures: Stronger definitions, and constructions without random oracles. Journal of Cryptology. 22(1):114-138.

Boneh D, Freeman D, Katz J, Waters B.  2009.  Signing a linear subspace: Signature schemes for network coding. Public Key Cryptography–PKC 2009.
:68-87.

Albrecht M, Gentry C, Halevi S, Katz J.  2009.  Attacking cryptographic schemes based on "perturbation polynomials". Proceedings of the 16th ACM conference on Computer and communications security.
:1-10.

Dodis Y, Katz J, Smith A, Walfish S.  2009.  Composability and on-line deniability of authentication. Theory of Cryptography.
:146-162.

Alwen J, Katz J, Lindell Y, Persiano G, Shelat A, Visconti I.  2009.  Collusion-free multiparty computation in the mediated model. Advances in Cryptology-CRYPTO 2009.
:524-540.

Katz J, Koo C-Y, Kumaresan R.  2009.  Improving the round complexity of VSS in point-to-point networks. Information and Computation. 207(8):889-899.

Katz J, Ostrovsky R, Yung M.  2009.  Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM). 57(1):3:1–3:39-3:1–3:39.

Ateniese G, Kamara S, Katz J.  2009.  Proofs of storage from homomorphic identification protocols. Advances in Cryptology–ASIACRYPT 2009.
:319-333.

2008


Katz J, Koo CY, Kumaresan R.  2008.  Improving the round complexity of vss in point-to-point networks. Automata, Languages and Programming.
:499-510.

Katz J, Lindell A.  2008.  Aggregate message authentication codes. Topics in Cryptology–CT-RSA 2008.
:155-169.

Kamara S, Katz J.  2008.  How to encrypt with a malicious random number generator. Fast Software Encryption.
:303-315.

Katz J.  2008.  Bridging game theory and cryptography: recent results and future directions. Proceedings of the 5th conference on Theory of cryptography.
:251-272.

Katz J, Sahai A, Waters B.  2008.  Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology.
:146-162.

2007


Katz J.  2007.  On achieving the "best of both worlds" in secure multiparty computation. Proceedings of the thirty-ninth annual ACM symposium on Theory of computing.
:11-20.

Katz J.  2007.  Efficient cryptographic protocols based on the hardness of learning parity with noise. Proceedings of the 11th IMA international conference on Cryptography and coding.
:1-15.

Canetti R, Halevi S, Katz J.  2007.  A forward-secure public-key encryption scheme. Journal of Cryptology. 20(3):265-294.

Garay JA, Katz J, Koo C-Y, Ostrovsky R.  2007.  Round Complexity of Authenticated Broadcast with a Dishonest Majority. Foundations of Computer Science, 2007. FOCS '07. 48th Annual IEEE Symposium on.
:658-668.

Goh EJ, Jarecki S, Katz J, Wang N.  2007.  Efficient signature schemes with tight reductions to the Diffie-Hellman problems. Journal of Cryptology. 20(4):493-514.

Boneh D, Canetti R, Halevi S, Katz J.  2007.  Chosen-ciphertext security from identity-based encryption. SIAM Journal on Computing. 36(5):1301-1328.

Katz J, Yung M.  2007.  Scalable protocols for authenticated group key exchange. Journal of Cryptology. 20(1):85-113.

Horvitz O, Katz J.  2007.  Universally-composable two-party computation in two rounds. Proceedings of the 27th annual international cryptology conference on Advances in cryptology.
:111-129.

Hazay C, Katz J, Koo CY, Lindell Y.  2007.  Concurrently-secure blind signatures without random oracles or setup assumptions. Theory of Cryptography.
:323-341.

Katz J, Koo CY.  2007.  Round-efficient secure computation in point-to-point networks. Advances in Cryptology-EUROCRYPT 2007.
:311-328.

Pages