Carmit Hazay

Orcid: 0000-0002-8951-5099

Affiliations:
  • Bar-Ilan University, Ramat-Gan, Israel


According to our database1, Carmit Hazay authored at least 104 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Constant-Rate Compiler for MPC over Noisy Networks.
IACR Cryptol. ePrint Arch., 2025

휔(1/휆)-Rate Boolean Garbling Scheme from Generic Groups.
IACR Cryptol. ePrint Arch., 2025

Laconic Cryptography with Preprocessing.
IACR Cryptol. ePrint Arch., 2025

On Achieving "Best-in-the-Multiverse" MPC.
IACR Cryptol. ePrint Arch., 2025

Towards Building Efficient SCALES Protocols.
IACR Cryptol. ePrint Arch., 2025

Breaking the 1/λ-Rate Barrier for Arithmetic Garbling.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Non-interactive Threshold BBS+ from Pseudorandom Correlations.
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025

ømega (1/λ )-Rate Boolean Garbling Scheme from Generic Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
LogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK.
IACR Cryptol. ePrint Arch., 2024

Private Laconic Oblivious Transfer with Preprocessing.
IACR Cryptol. ePrint Arch., 2024

LR-OT: Leakage-Resilient Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2024

On the Feasibility of Sliced Garbling.
IACR Cryptol. ePrint Arch., 2024

Brief Announcement: Towards Optimal Communication Byzantine Reliable Broadcast Under a Message Adversary.
Proceedings of the 38th International Symposium on Distributed Computing, 2024

Ligetron: Lightweight Scalable End-to-End Zero-Knowledge Proofs Post-Quantum ZK-SNARKs on a Browser.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

sfLR-sfOT: Leakage-Resilient Oblivious Transfer.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Near-Optimal Communication Byzantine Reliable Broadcast Under a Message Adversary.
Proceedings of the 28th International Conference on Principles of Distributed Systems, 2024

Toward Malicious Constant-Rate 2PC via Arithmetic Garbling.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Malicious Security for SCALES - Outsourced Computation with Ephemeral Servers.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

sfLogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Threshold BBS+ From Pseudorandom Correlations.
IACR Cryptol. ePrint Arch., 2023

Towards Optimal Communication Byzantine Reliable Broadcast under a Message Adversary.
CoRR, 2023

Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Private Polynomial Commitments and Applications to MPC.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Putting the Online Phase on a Diet: Covert Security from Short MACs.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023

Statement-Oblivious Threshold Witness Encryption.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

Best of Both Worlds - Revisiting the Spymasters Double Agent Problem.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Batchman and Robin: Batched and Non-batched Branching for Interactive ZK.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Flag: A Framework for Lightweight Robust Secure Aggregation.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

A New Approach to Garbled Circuits.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Garbled-Circuits from an SCA Perspective: Free XOR can be Quite Expensive. . .
IACR Cryptol. ePrint Arch., 2022

More Efficient (Reusable) Private Set Union.
IACR Cryptol. ePrint Arch., 2022

Fully Secure PSI via MPC-in-the-Head.
IACR Cryptol. ePrint Arch., 2022

Comparison-Based MPC in Star Topology (Full Version).
IACR Cryptol. ePrint Arch., 2022

On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

SCALES - MPC with Small Clients and Larger Ephemeral Servers.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Comparison-based MPC in Star Topology.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Financially Backed Covert Security.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Asymptotically Quasi-Optimal Cryptography.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and More.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
A New Framework for Garbled Circuits.
IACR Cryptol. ePrint Arch., 2021

Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

ZK-PCPs from Leakage-Resilient Secret Sharing.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020
Gradual GRAM and Secure Computation for RAM Programs.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Multi-clients Verifiable Computation via Conditional Disclosure of Secrets.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Going Beyond Dual Execution: MPC for Functions with Efficient Verification.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

The Price of Active Security in Cryptographic Protocols.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions?
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Ligero++: A New Optimized Sublinear IOP.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.
J. Cryptol., 2019

LevioSA: Lightweight Secure Arithmetic Computation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Fast Actively Secure Five-Party Computation with Security Beyond Abort.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Outsourcing Private Machine Learning via Lightweight Secure Arithmetic Computation.
CoRR, 2018

Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

TinyKeys: A New Approach to Efficient Multi-Party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Round-Optimal Secure Multi-Party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT).
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Efficient One-Sided Adaptively Secure Computation.
J. Cryptol., 2017

Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Scalable Multi-party Private Set-Intersection.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Ligero: Lightweight Sublinear Arguments Without a Trusted Setup.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Efficient Set Intersection with Simulation-Based Security.
J. Cryptol., 2016

Toward a Game Theoretic View of Secure Computation.
J. Cryptol., 2016

Constant-Round Maliciously Secure Two-Party Computation in the RAM Model.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

The Feasibility of Outsourced Database Search in the Plain Model.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

What Security Can We Achieve Within 4 Rounds?
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

On the Power of Secure Two-Party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
What Security can we Achieve in 4-Rounds?
IACR Cryptol. ePrint Arch., 2015

Round-Optimal Token-Based Secure Computation.
IACR Cryptol. ePrint Arch., 2015

Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Adaptively Secure Computation with Partial Erasures.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015

On Black-Box Complexity of Universally Composable Security in the CRS Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

Selective Opening Security for Receivers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Two-Dimensional Parameterized Matching.
ACM Trans. Algorithms, 2014

One-Sided Adaptively Secure Two-Party Computation.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

2013
Outsourced Pattern Matching.
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013

Leakage-Resilient Cryptography from Minimal Assumptions.
Proceedings of the Advances in Cryptology, 2013

2012
Secure Two-Party Computation with Low Communication.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Distributed public key schemes secure against continual leakage.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012

Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Signature Schemes Secure against Hard-to-Invert Leakage.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Towards a Game Theoretic View of Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

2010
Efficient Secure Two-Party Protocols - Techniques and Constructions
Information Security and Cryptography, Springer, ISBN: 978-3-642-14302-1, 2010

A Note on Zero-Knowledge Proofs of Knowledge and the ZKPOK Ideal Functionality.
IACR Cryptol. ePrint Arch., 2010

A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2010

Automata Evaluation and Text Search Protocols with Simulation Based Security.
IACR Cryptol. ePrint Arch., 2010

Efficient Set Operations in the Presence of Malicious Adversaries.
Proceedings of the Public Key Cryptography, 2010

Text Search Protocols with Simulation Based Security.
Proceedings of the Public Key Cryptography, 2010

Computationally Secure Pattern Matching in the Presence of Malicious Adversaries.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Efficient Oblivious Polynomial Evaluation with Simulation-Based Security.
IACR Cryptol. ePrint Arch., 2009

On Compression of Data Encrypted with Block Ciphers.
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009

2008
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Complete fairness in secure two-party computation.
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008

Constructions of truly practical secure protocols using standard smartcards.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

2005
Two Dimensional Parameterized Matching.
Proceedings of the Combinatorial Pattern Matching, 16th Annual Symposium, 2005

2004
Approximate Parameterized Matching.
Proceedings of the Algorithms, 2004


  Loading...