Research
My research spans various areas of theoretical computer science.
In cryptography, I currently focus on both foundations and the design of efficient Zero-Knowledge Proofs.
In computational complexity, I am particularly interested in understanding the complexity class TFNP of total NP search problems.
A significant part of my work explores the bridge between game theory and cryptography, designing and analysing protocols with security against utility-maximizing agents.
Preprints
- J. Belohorec, P. Hubáček, A. Kalsta, and K. Mašková
“CHOPIN: Optimal Pairing-Based Multilinear Polynomial Commitments from Bivariate KZG” - P. Hubáček
“Black-Box PWPP Is Not Turing-Closed” - P. Chmel, P. Hubáček, and D. Stejskal
“Knowledge Soundness of Polynomial Commitments in the Algebraic Group Model Does Not Guarantee Extractability” - J. Belohorec, P. Hubáček, and D. Stejskal
“On Lifting AGM Security to AGM with Oblivious Sampling”
Publications
[1] P. Hubáček and M. Yeo
[2] C. Hoffmann, P. Hubáček, and S. Ivanova
“Practical batch proofs of exponentiation,” IACR Communications in Cryptology, 2025
[3] P. Hubáček, J. Václavek, and M. Yeo
[4] J. Belohorec, P. Dvořák, C. Hoffmann, P. Hubáček, K. Mašková, and M. Pastyřík
[5] L. Folwarczný, M. Göös, P. Hubáček, G. Maystre, and W. Yuan
“One-way functions vs. TFNP: Simpler and improved,” ITCS 2024
[6] P. Hubáček, E. Khaniki, and N. Thapen
[7] E. Boyle, R. Cohen, D. Data, and P. Hubáček
“Must the communication graph of MPC protocols be an expander?” Journal of Cryptology, 2023
[8] R. Bourneuf, L. Folwarczný, P. Hubáček, A. Rosen, and N. I. Schwartzbach
“PPP-completeness and extremal combinatorics,” ITCS 2023
[9] C. Hoffmann, P. Hubáček, C. Kamath, and K. Pietrzak
“Certifying giant nonprimes,” PKC 2023
[10] C. Hoffmann, P. Hubáček, C. Kamath, and T. Krňák
[11] P. Hubáček, L. Jančová, and V. Králová
[12] C. Hoffmann, P. Hubáček, C. Kamath, K. Klein, and K. Pietrzak
[13] I. Bentov, P. Hubáček, T. Moran, and A. Nadler
[14] P. Hubáček and J. Václavek
“On search complexity of discrete logarithm,” MFCS 2021
[15] P. Hubáček and E. Yogev
“Hardness of continuous local search: Query complexity and cryptographic lower bounds,” SIAM Journal of Computing, 2020
[16] P. Hubáček, C. Kamath, K. Král, and V. Slívová
[17] A. R. Choudhuri, P. Hubáček, C. Kamath, K. Pietrzak, A. Rosen, and G. N. Rothblum
[18] P. Hubáček, M. Koucký, K. Král, and V. Slívová
“Stronger lower bounds for online ORAM,” TCC 2019
[19] E. Boyle, R. Cohen, D. Data, and P. Hubáček
[20] P. Hubáček, A. Rosen, and M. Vald
[21] B. Gärtner, T. D. Hansen, P. Hubáček, K. Král, H. Mosaad, and V. Slívová
“ARRIVAL: Next stop in CLS,” ICALP 2018
[22] P. Hubáček, M. Naor, and E. Yogev
“The journey from NP to TFNP hardness,” ITCS 2017
[23] P. Hubáček and E. Yogev
[24] P. Hubáček, M. Naor, and J. R. Ullman
“When can limited randomness be used in repeated games?” Theory of Computing Systems, 2016
[25] S. Guo, P. Hubáček, A. Rosen, and M. Vald
“Rational sumchecks,” TCC 2016-a
[26] P. Hubáček and D. Wichs
[27] P. Hubáček, M. Naor, and J. R. Ullman
[28] S. Guo, P. Hubáček, A. Rosen, and M. Vald
[29] P. Hubáček and S. Park
[30] P. Hubáček, J. B. Nielsen, and A. Rosen
“Limits on the power of cryptographic cheap talk,” CRYPTO 2013