Benny Applebaum

Orcid: 0000-0003-4792-369X

According to our database1, Benny Applebaum authored at least 86 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
The Meta-complexity of Secret Sharing.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

How to Share an NP Statement or Combiners for Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

NIZK Amplification via Leakage-Resilient Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Structured-Seed Local Pseudorandom Generators and Their Applications.
Proceedings of the Approximation, 2025

2024
Distributing Keys and Random Secrets with Constant Complexity.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Conflict Checkable and Decodable Codes and Their Applications.
Proceedings of the 2024 ACM-SIAM Symposium on Discrete Algorithms, 2024

Stochastic Secret Sharing with 1-Bit Shares and Applications to MPC.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Communication Complexity vs Randomness Complexity in Interactive Proofs.
Proceedings of the 5th Conference on Information-Theoretic Cryptography, 2024

2023
Correction: Locally Computable UOWHF with Linear Shrinkage.
J. Cryptol., April, 2023

The Round Complexity of Statistical MPC with Optimal Resiliency.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

Succinct Computational Secret Sharing.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

Advisor-Verifier-Prover Games and the Hardness of Information Theoretic Cryptography.
Proceedings of the 64th IEEE Annual Symposium on Foundations of Computer Science, 2023

Actively Secure Arithmetic Computation and VOLE with Constant Computational Overhead.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

How to Recover a Secret with O(n) Additions.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
UTT: Decentralized Ecash with Accountable Privacy.
IACR Cryptol. ePrint Arch., 2022

Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority.
IACR Cryptol. ePrint Arch., 2022

Round-Optimal Honest-Majority MPC in Minicrypt and with Everlasting Security - (Extended Abstract).
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Secret Sharing, Slice Formulas, and Monotone Real Circuits.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Verifiable Relation Sharing and Multi-verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security.
IACR Cryptol. ePrint Arch., 2021

Upslices, Downslices, and Secret-Sharing with Complexity of $1.5^n$.
Electron. Colloquium Comput. Complex., 2021

On Actively-Secure Elementary MPC Reductions.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Upslices, Downslices, and Secret-Sharing with Complexity of 1.5<sup>n</sup>.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020
On the Power of Amortization in Secret Sharing: <i>d</i>-Uniform Secret Sharing and CDS with Constant Information Rate.
ACM Trans. Comput. Theory, 2020

The Resiliency of MPC with Low Interaction: The Benefit of Making Errors.
IACR Cryptol. ePrint Arch., 2020

The Resiliency of MPC with Low Interaction: The Benefit of Making Errors (Extended Abstract).
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Better secret sharing via robust conditional disclosure of secrets.
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020

Separating Two-Round Secure Computation From Oblivious Transfer.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency.
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

2019
Sampling Graphs without Forbidden Subgraphs and Almost-Explicit Unbalanced Expanders.
Electron. Colloquium Comput. Complex., 2019

Placing Conditional Disclosure of Secrets in the Communication Complexity Universe.
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019

Sampling Graphs without Forbidden Subgraphs and Unbalanced Expanders with Negligible Error.
Proceedings of the 60th IEEE Annual Symposium on Foundations of Computer Science, 2019

Degree 2 is Complete for the Round-Complexity of Malicious MPC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Secret-Sharing Schemes for General and Uniform Access Structures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Explicit Rateless Codes for Memoryless Binary-Input Output-Symmetric Channels.
Theory Comput., 2018

Perfect Secure Computation in Two Rounds.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

On the Power of Amortization in Secret Sharing: d-Uniform Secret Sharing and CDS with Constant Information Rate.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

The Communication Complexity of Private Simultaneous Messages, Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Conditional Disclosure of Secrets and d-Uniform Secret Sharing with Constant Information Rate.
Electron. Colloquium Comput. Complex., 2017

Garbled Circuits as Randomized Encodings of Functions: a Primer.
Electron. Colloquium Comput. Complex., 2017

Low-Complexity Cryptographic Hash Functions .
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

Exponentially-Hard Gap-CSP and Local PRG via Local Hardcore Functions.
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017

Secure Arithmetic Computation with Constant Computational Overhead.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and Separations.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Garbled Circuits as Randomized Encodings of Functions: a Primer.
Proceedings of the Tutorials on the Foundations of Cryptography., 2017

2016
Clique Here: On the Distributed Complexity in Fully-Connected Networks.
Parallel Process. Lett., 2016

Incompressible Functions, Relative-Error Extractors, and the Power of Nondeterministic Reductions.
Comput. Complex., 2016

Fast Pseudorandom Functions Based on Expander Graphs.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Algebraic attacks against random local functions and their countermeasures.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys.
SIAM J. Comput., 2015

Minimizing Locality of One-Way Functions via Semi-Private Randomized Encodings.
Electron. Colloquium Comput. Complex., 2015

Incompressible Functions, Relative-Error Extractors, and the Power of Nondeterminsitic Reductions.
Electron. Colloquium Comput. Complex., 2015

Arithmetic Cryptography.
Electron. Colloquium Comput. Complex., 2015

Obfuscating Circuits via Composite-Order Graded Encoding.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Deterministic Rateless Codes for BSC.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

Arithmetic Cryptography: Extended Abstract.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

Incompressible Functions, Relative-Error Extractors, and the Power of Nondeterministic Reductions (Extended Abstract).
Proceedings of the 30th Conference on Computational Complexity, 2015

2014
Cryptography in Constant Parallel Time.
Information Security and Cryptography, Springer, ISBN: 978-3-642-17367-7, 2014

Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks.
IACR Cryptol. ePrint Arch., 2014

Bootstrapping Obfuscators via Fast Pseudorandom Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Cryptographic Hardness of Random Local Functions-Survey.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Garbling XOR Gates "For Free" in the Standard Model.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Locally Computable UOWHF with Linear Shrinkage.
Proceedings of the Advances in Cryptology, 2013

Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits.
IACR Cryptol. ePrint Arch., 2012

A Dichotomy for Local Small-Bias Generators.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Pseudorandom generators with long stretch and low locality from random local one-way functions.
Proceedings of the 44th Symposium on Theory of Computing Conference, 2012

2011
Semantic Security under Related-Key Attacks and Applications.
Proceedings of the Innovations in Computer Science, 2011

Randomly Encoding Functions: A New Cryptographic Paradigm - (Invited Talk).
Proceedings of the Information Theoretic Security - 5th International Conference, 2011

How to Garble Arithmetic Circuits.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

Key-Dependent Message Security: Generic Amplification and Completeness.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

2010
Public-key cryptography from different assumptions.
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010

Collaborative, Privacy-Preserving Data Aggregation at Scale.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Proceedings of the Innovations in Computer Science, 2010

From Secrecy to Soundness: Efficient Verification via Secure Computation.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010

2009
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems.
Proceedings of the Advances in Cryptology, 2009

2008
On Basing Lower-Bounds for Learning on Worst-Case Assumptions.
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008

2007
Cryptography in constant parallel time.
PhD thesis, 2007

Cryptography with Constant Input Locality.
Proceedings of the Advances in Cryptology, 2007

2006
On Pseudorandom Generators with Linear Stretch in NC<sup>0</sup>.
Proceedings of the Approximation, 2006

2005
Computationally Private Randomizing Polynomials and Their Applications.
Proceedings of the 20th Annual IEEE Conference on Computational Complexity (CCC 2005), 2005

2004
Cryptography in NC<sup>0</sup>.
Proceedings of the 45th Symposium on Foundations of Computer Science, 2004


  Loading...