Amos Beimel

Orcid: 0000-0002-6572-4195

Affiliations:
  • Ben-Gurion University, Beersheba, Israel


According to our database1, Amos Beimel authored at least 106 papers between 1992 and 2025.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Polynomial Secret Sharing Schemes and Algebraic Matroids.
IACR Cryptol. ePrint Arch., 2025

Secret-Sharing Schemes for General Access Structures: An Introduction.
IACR Cryptol. ePrint Arch., 2025

On the Definition of Malicious Private Information Retrieval.
Proceedings of the 6th Conference on Information-Theoretic Cryptography, 2025

2024
Secret-Sharing Schemes for High Slices.
IACR Cryptol. ePrint Arch., 2024

Simplified PIR and CDS Protocols and Improved Linear Secret-Sharing Schemes.
IACR Cryptol. ePrint Arch., 2024

Secret-Sharing Schemes for High Slices.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Structural Lower Bounds on Black-Box Constructions of Pseudorandom Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Improved Polynomial Secret-Sharing Schemes.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Three Party Secure Computation with Friends and Foes.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Cryptography from Planted Graphs: Security with Logarithmic-Size Messages.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Succinct Computational Secret Sharing.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

Lower Bounds for Secret-Sharing Schemes for k-Hypergraphs.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

2022
Tighter Bounds on MultiParty Coin Flipping via Augmented Weak Martingales and Differentially Private Sampling.
SIAM J. Comput., 2022

Dynamic algorithms against an adaptive adversary: generic constructions and lower bounds.
Proceedings of the STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20, 2022

Secret Sharing, Slice Formulas, and Monotone Real Circuits.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

2021
Degree-2 Secret Sharing and Conditional Disclosure of Secrets.
IACR Cryptol. ePrint Arch., 2021

Quadratic Secret Sharing and Conditional Disclosure of Secrets.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
1/p-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds.
J. Cryptol., 2020

On the Round Complexity of the Shuffle Model.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Better secret sharing via robust conditional disclosure of secrets.
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020

The Power of Synergy in Differential Privacy: Combining a Small Curator with Local Randomizers.
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020

Evolving Ramp Secret Sharing with a Small Gap.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Closure Properties for Private Classification and Online Prediction.
Proceedings of the Conference on Learning Theory, 2020

2019
Characterizing the Sample Complexity of Pure Private Learners.
J. Mach. Learn. Res., 2019

Secret-Sharing from Robust Conditional Disclosure of Secrets.
IACR Cryptol. ePrint Arch., 2019

Secret-Sharing Schemes for General and Uniform Access Structures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Private Center Points and Learning of Halfspaces.
Proceedings of the Conference on Learning Theory, 2019

Exploring Differential Obliviousness.
Proceedings of the Approximation, 2019

2018
Privacy Preserving Multi-Agent Planning with Provable Guarantees.
CoRR, 2018

Evolving Ramp Secret-Sharing Schemes.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Tighter Bounds on Multi-Party Coin Flipping via Augmented Weak Martingales and Differentially Private Sampling.
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018

The Complexity of Multiparty PSM Protocols and Related Models.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Tighter Bounds on Multi-Party Coin Flipping, via Augmented Weak Martingales and Di erentially Private Sampling.
Electron. Colloquium Comput. Complex., 2017

Linear Secret-Sharing Schemes for Forbidden Graph Access Structures.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Ad Hoc PSM Protocols: Secure Computation Without Coordination.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
Secret Sharing Schemes for Dense Forbidden Graphs.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Distribution Design.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

2015
Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Learning Privately with Labeled and Unlabeled Examples.
Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, 2015

2014
Bounds on the sample complexity for private learning and private data release.
Mach. Learn., 2014

On the Cryptographic Complexity of the Worst Functions.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Multi-linear Secret-Sharing Schemes.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Non-Interactive Secure Multiparty Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Characterizing the sample complexity of private learners.
Proceedings of the Innovations in Theoretical Computer Science, 2013

Private Learning and Sanitization: Pure vs. Approximate Differential Privacy.
Proceedings of the Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 2013

2012
Communication-efficient distributed oblivious transfer.
J. Comput. Syst. Sci., 2012

Secret Sharing Schemes for Very Dense Graphs.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Share Conversion and Private Information Retrieval.
Proceedings of the 27th Conference on Computational Complexity, 2012

2011
1/<i>p</i>-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Secret-Sharing Schemes: A Survey.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

2010
Secure Multiparty Computation with Partial Fairness.
IACR Cryptol. ePrint Arch., 2010

Bounds on the Sample Complexity for Private Learning and Private Data Release.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Choosing, Agreeing, and Eliminating in Communication Complexity.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010

Protocols for Multiparty Coin Toss with Dishonest Majority.
Proceedings of the Advances in Cryptology, 2010

2009
Matrix columns allocation problems.
Theor. Comput. Sci., 2009

Approximate belief updating in max-2-connected Bayes networks is NP-hard.
Artif. Intell., 2009

Secret Sharing and Non-Shannon Information Inequalities.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

2008
Learning Automata.
Proceedings of the Encyclopedia of Algorithms - 2008 Edition, 2008

On Matroids and Nonideal Secret Sharing.
IEEE Trans. Inf. Theory, 2008

Matroids Can Be Far from Ideal Secret Sharing.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

On Linear Secret Sharing for Connectivity in Directed Graphs.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Distributed Private Data Analysis: Simultaneously Solving How and What.
Proceedings of the Advances in Cryptology, 2008

2007
Private Approximation of Clustering and Vertex Cover.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Weakly-Private Secret Sharing Schemes.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

How Should We Solve Search Problems Privately?
Proceedings of the Advances in Cryptology, 2007

2006
Monotone circuits for monotone weighted threshold functions.
Inf. Process. Lett., 2006

On Matroids and Non-ideal Secret Sharing.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

Private approximation of search problems.
Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006

Edge Eavesdropping Games.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

2005
General constructions for information-theoretic private information retrieval.
J. Comput. Syst. Sci., 2005

Characterizing Ideal Weighted Threshold Secret Sharing.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

On Private Computation in Incomplete Networks.
Proceedings of the Structural Information and Communication Complexity, 2005

Monotone Circuits for Weighted Threshold Functions.
Proceedings of the 20th Annual IEEE Conference on Computational Complexity (CCC 2005), 2005

2004
A Quantitative Approach to Reductions in Secure Computation.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Brief announcement: RT oblivious erasure correcting.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

RT oblivious erasure correcting.
Proceedings of the 2004 IEEE Information Theory Workshop, 2004

2003
Buses for Anonymous Message Delivery.
J. Cryptol., 2003

Efficient reliable communication over partially authenticated networks.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

Separating the Power of Monotone Span Programs over Different Fields.
Proceedings of the 44th Symposium on Foundations of Computer Science, 2003

2002
Robust Information-Theoretic Private Information Retrieval.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

Breaking the O(n1/(2k-1)) Barrier for Information-Theoretic Private Information Retrieval.
Proceedings of the 43rd Symposium on Foundations of Computer Science, 2002

2001
On the Power of Nonlinear Secret-Sharing.
IACR Cryptol. ePrint Arch., 2001

Information-Theoretic Private Information Retrieval: A Unified Construction.
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001

On the Power of Nonlinear Secrect-Sharing.
Proceedings of the 16th Annual IEEE Conference on Computational Complexity, 2001

2000
Computing Functions of a Shared Secret.
SIAM J. Discret. Math., 2000

Learning functions represented as multiplicity automata.
J. ACM, 2000

Learning unions of high-dimensional boxes over the reals.
Inf. Process. Lett., 2000

Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing.
Proceedings of the Advances in Cryptology, 2000

1999
One-Way Functions Are Essential for Single-Server Private Information Retrieval.
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999

The All-or-Nothing Nature of Two-Party Secure Computation.
Proceedings of the Advances in Cryptology, 1999

1998
Secret Sharing with Public Reconstruction.
IEEE Trans. Inf. Theory, 1998

The Query Complexity of Finding Local Minima in the Lattice.
Proceedings of the Eleventh Annual Conference on Computational Learning Theory, 1998

On Arithmetic Branching Programs.
Proceedings of the 13th Annual IEEE Conference on Computational Complexity, 1998

1997
Reliable Communication over Partially Authenticated Networks.
Proceedings of the Distributed Algorithms, 11th International Workshop, 1997

Learning Boxes in High Dimension.
Proceedings of the Computational Learning Theory, Third European Conference, 1997

1996
Secure schemes for secret sharing and key distribution.
PhD thesis, 1996

Communication in key distribution schemes.
IEEE Trans. Inf. Theory, 1996

On the Applications of Multiplicity Automata in Learning.
Proceedings of the 37th Annual Symposium on Foundations of Computer Science, 1996

1995
Lower Bounds for Monotone Span Programs.
Proceedings of the 36th Annual Symposium on Foundations of Computer Science, 1995

Secret Sharing with Public Reconstruction (Extended Abstract).
Proceedings of the Advances in Cryptology, 1995

1994
Universally ideal secret-sharing schemes.
IEEE Trans. Inf. Theory, 1994

1993
Interaction in Key Distribution Schemes (Extended Abstract).
Proceedings of the Advances in Cryptology, 1993

1992
Universally Ideal Secret Sharing Schemes (Preliminary Version).
Proceedings of the Advances in Cryptology, 1992


  Loading...