Gil Segev

Orcid: 0000-0002-8073-579X

Affiliations:
  • Hebrew University, Israel


According to our database1, Gil Segev authored at least 75 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Non-malleable Vector Commitments via Local Equivocability.
J. Cryptol., October, 2023

Technical Perspective: Finding Connections between One-Way Functions and Kolmogorov Complexity.
Commun. ACM, May, 2023

Rogue-Instance Security for Batch Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2023

2022
A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff.
IACR Cryptol. ePrint Arch., 2022

2021
Injective Trapdoor Functions via Derandomization: How Strong is Rudich's Black-Box Barrier?
J. Cryptol., 2021

Can PPAD Hardness be Based on Standard Cryptographic Assumptions?
J. Cryptol., 2021

Tight Tradeoffs in Searchable Symmetric Encryption.
J. Cryptol., 2021

Generic-Group Identity-Based Encryption: A Tight Impossibility Result.
IACR Cryptol. ePrint Arch., 2021

Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Σ-Protocols.
IACR Cryptol. ePrint Arch., 2021

Crypto-Oriented Neural Architecture Design.
Proceedings of the IEEE International Conference on Acoustics, 2021

Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for ${\varSigma }$-Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
The Security of Lazy Users in Out-of-Band Authentication.
ACM Trans. Priv. Secur., 2020

From Minicrypt to Obfustopia via Private-Key Functional Encryption.
J. Cryptol., 2020

An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2020

Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective.
IACR Cryptol. ePrint Arch., 2020

Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction.
IACR Cryptol. ePrint Arch., 2020

Generic-Group Delay Functions Require Hidden-Order Groups.
IACR Cryptol. ePrint Arch., 2020

Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions.
IACR Cryptol. ePrint Arch., 2020

Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions.
IACR Cryptol. ePrint Arch., 2020

2019
Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery.
IACR Cryptol. ePrint Arch., 2019

2018
Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions.
J. Cryptol., 2018

Incremental Deterministic Public-Key Encryption.
J. Cryptol., 2018

Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions.
J. Cryptol., 2018

Function-Private Functional Encryption in the Private-Key Setting.
J. Cryptol., 2018

Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions.
J. Cryptol., 2018

On Constructing One-Way Permutations from Indistinguishability Obfuscation.
J. Cryptol., 2018

Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound.
IACR Cryptol. ePrint Arch., 2018

Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal.
IACR Cryptol. ePrint Arch., 2018

2017
Privacy-Preserving Interdomain Routing at Internet Scale.
Proc. Priv. Enhancing Technol., 2017

Strengthening the Security of Encrypted Databases: Non-Transitive JOINs.
IACR Cryptol. ePrint Arch., 2017

Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions.
IACR Cryptol. ePrint Arch., 2017

Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability.
IACR Cryptol. ePrint Arch., 2017

Hierarchical Functional Encryption.
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

2016
An Optimally Fair Coin Toss.
J. Cryptol., 2016

Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations.
IACR Cryptol. ePrint Arch., 2016

Indistinguishability Obfuscation Does Not Reduce to Structured Languages.
Electron. Colloquium Comput. Complex., 2016

2015
Finding Collisions in Interactive Protocols - Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding Commitments.
SIAM J. Comput., 2015

Phasing: Private Set Intersection using Permutation-based Hashing.
IACR Cryptol. ePrint Arch., 2015

Hierarchical Functional Encryption.
IACR Cryptol. ePrint Arch., 2015

From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting.
IACR Cryptol. ePrint Arch., 2015

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption.
IACR Cryptol. ePrint Arch., 2015

Message-Locked Encryption for Lock-Dependent Messages.
IACR Cryptol. ePrint Arch., 2015

From Selective to Adaptive Security in Functional Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Nonmalleable Extractors with Short Seeds and Applications to Privacy Amplification.
SIAM J. Comput., 2014

Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.
J. Cryptol., 2014

Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits.
IACR Cryptol. ePrint Arch., 2014

The Trojan Method in Functional Encryption: From Selective to Adaptive Security, Generically.
IACR Cryptol. ePrint Arch., 2014

2013
More Constructions of Lossy and Correlation-Secure Trapdoor Functions.
J. Cryptol., 2013

Fully Leakage-Resilient Signatures.
J. Cryptol., 2013

Function-Private Subspace-Membership Encryption and Its Applications.
IACR Cryptol. ePrint Arch., 2013

Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption.
IACR Cryptol. ePrint Arch., 2013

Attribute-Based Encryption for Arithmetic Circuits.
IACR Cryptol. ePrint Arch., 2013

How to Approximate a Set without Knowing Its Size in Advance.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

2012
Hedged Public-key Encryption: How to Protect against Bad Randomness.
IACR Cryptol. ePrint Arch., 2012

Lossy Functions Do Not Amplify Well.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

A new approach to interdomain routing based on secure multi-party computation.
Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012

2011
Sketching in Adversarial Environments.
SIAM J. Comput., 2011

Targeted Malleability: Homomorphic Encryption for Restricted Computations.
IACR Cryptol. ePrint Arch., 2011

Non-Malleable Extractors with Short Seeds and Applications to Privacy Amplification.
Electron. Colloquium Comput. Complex., 2011

Balls and Bins: Smaller Hash Families and Faster Evaluation.
Electron. Colloquium Comput. Complex., 2011

Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

2010
Approximate <i>k</i>-Steiner Forests via the Lagrangian Relaxation Technique with Internal Preprocessing.
Algorithmica, 2010

Backyard Cuckoo Hashing: Constant Worst-Case Operations with a Succinct Representation.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

2009
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories.
Theory Comput., 2009

Public-Key Cryptosystems Resilient to Key Leakage.
IACR Cryptol. ePrint Arch., 2009

Public-Key Cryptographic Primitives Provably as Secure as Subset Sum.
IACR Cryptol. ePrint Arch., 2009

Public-Key Encryption in the Bounded-Retrieval Model.
IACR Cryptol. ePrint Arch., 2009

De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results.
Proceedings of the Automata, Languages and Programming, 36th International Colloquium, 2009

2008
Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.
IEEE Trans. Inf. Theory, 2008

Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption.
IACR Cryptol. ePrint Arch., 2008

Chosen-Ciphertext Security via Correlated Products.
IACR Cryptol. ePrint Arch., 2008

History-Independent Cuckoo Hashing.
IACR Cryptol. ePrint Arch., 2008

David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware.
IACR Cryptol. ePrint Arch., 2008

2007
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2007

Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments.
Electron. Colloquium Comput. Complex., 2007


  Loading...