Lisa Kohl

Lisa Kohl

Since October 2020, I am a researcher in the Cryptology Group at CWI Amsterdam headed by Ronald Cramer. A special focus of my work lies in exploring new directions in secure computation with the goal of developing practical post-quantum secure protocols.

Before coming to CWI, I worked as a postdoctoral researcher with Yuval Ishai at Technion. In 2019, I completed my PhD at Karlsruhe Institute of Technology under the supervision of Dennis Hofheinz. During my PhD, I spent eight months in the FACT center at IDC Herzliya for a research visit with Elette Boyle. I got to know the CWI Cryptology Group already back in 2015, when I wrote my master’s thesis there as a visiting student.

Lisa.Kohl(at)cwi.nl

Open Positions: I am looking for a talented Postdoc to join the CWI Cryptology Group. If you are interested in working in the area of post-quantum secure protocol theory, please contact me!

Publications:

  • A Compressed Σ-Protocol Theory for Lattices. Thomas Attema, Ronald Cramer, and Lisa Kohl. In: International Conference on Cryptology – CRYPTO 2021. (Full version)
  • Low-Complexity Weak Pseudorandom Functions in AC0[MOD2]. Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, and Peter Scholl. In: International Conference on Cryptology – CRYPTO 2021. (Proceedings version)
  • Correlated Pseudorandom Functions from Variable-Density LPN. Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, and Peter Scholl. In: IEEE Symposium on Foundations of Computer Science – FOCS 2020. (Full version)
  • Topology Hiding Communication from Minimal Assumptions. Marshall Ball, Elette Boyle, Ran Cohen, Lisa Kohl, Tal Malkin, Pierre Meyer and Tal Moran. In: Theory of Cryptography Conference – TCC 2020. (Full version)
  • Efficient Pseudorandom Correlation Generators from Ring Learning Parity with Noise. Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, and Peter Scholl. In: International Conference on Cryptology – CRYPTO 2020. (Proceedings version)
  • Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation. Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, and Peter Scholl. In: ACM Conference on Computer and Communications Security – CCS 2019. (Full version)
  • Efficient Pseudorandom Correlation Generators: Silent OT Extension and More. Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, and Peter Scholl. In: International Conference on Cryptology – CRYPTO 2019. (Full version)
  • Homomorphic Secret Sharing from Lattices Without FHE. Elette Boyle, Lisa Kohl, and Peter Scholl. In: Advances in Cryptology – EUROCRYPT 2019. (Full version)
  • Hunting and Gathering – Verifiable Random Functions from Standard Assumptions with Short Proofs. Lisa Kohl. In: Public-Key Cryptography – PKC 2019. (Proceedings version)
  • On Tightly Secure Non-Interactive Key Exchange. Julia Hesse, Dennis Hofheinz, Lisa Kohl. In: International Conference on Cryptology – CRYPTO 2018. (Full version)
  • More Efficient (Almost) Tightly Secure Structure-Preserving Signatures. Romain Gay, Dennis Hofheinz, Lisa Kohl, Jiaxin Pan. In: Advances in Cryptology – EUROCRYPT 2018. (Full version)
  • Kurosawa-Desmedt Meets Tight Security. Romain Gay, Dennis Hofheinz, Lisa Kohl. In: CRYPTO 2017 – International Conference on Cryptology. (Full version)