Gilad Asharov

Orcid: 0000-0002-0846-9773

Affiliations:
  • Bar-Ilan University, Ramat Gan, Israel


According to our database1, Gilad Asharov authored at least 60 papers between 2009 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
MegaBlocks: Breaking the Logarithmic I/O-Overhead Barrier for Oblivious RAM.
IACR Cryptol. ePrint Arch., 2025

ABEL: Perfect Asynchronous Byzantine Extension from List-Decoding.
Proceedings of the 39th International Symposium on Distributed Computing, 2025

Simple Is COOL: Graded Dispersal and Its Applications for Byzantine Fault Tolerance.
Proceedings of the 16th Innovations in Theoretical Computer Science Conference, 2025

Peeking Into the Future: MPC Resilient to Super-Rushing Adversaries.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
Secure Statistical Analysis on Multiple Datasets: Join and Group-By.
IACR Cryptol. ePrint Arch., 2024

Asynchronous Agreement on a Core Set in Constant Expected Time and More Efficient Asynchronous VSS and MPC.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Perfect (Parallel) Broadcast in Constant Expected Rounds via Statistical VSS.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Perfect Asynchronous MPC with Linear Communication Overhead.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
Perfectly Secure Asynchronous Agreement on a Core Set in Constant Expected Time.
IACR Cryptol. ePrint Arch., 2023

Prime Match: A Privacy-Preserving Inventory Matching System.
Proceedings of the 32nd USENIX Security Symposium, 2023

Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

FutORAMa: A Concretely Efficient Hierarchical Oblivious RAM.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Secure Statistical Analysis on Multiple Datasets: Join and Group-By.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Sorting Short Keys in Circuits of Size ${o(n \log n)}$.
SIAM J. Comput., 2022

Asymptotically Free Broadcast in Constant Expected Time via Packed VSS.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Optimal Oblivious Parallel RAM.
Proceedings of the 2022 ACM-SIAM Symposium on Discrete Algorithms, 2022

Gradecast in Synchrony and Reliable Broadcast in Asynchrony with Optimal Resilience, Efficiency, and Unconditional Security.
Proceedings of the PODC '22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25, 2022

A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Static vs. Adaptive Security in Perfect MPC: A Separation and the Adaptive Security of BGW.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Efficient Perfectly Secure Computation with Optimal Resilience.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Sorting Short Keys in Circuits of Size <i>o</i>(<i>n</i> log <i>n</i>).
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021

Privacy-preserving portfolio pricing.
Proceedings of the ICAIF'21: 2nd ACM International Conference on AI in Finance, Virtual Event, November 3, 2021

Towards Accountability in CRS Generation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Oblivious RAM with Worst-Case Logarithmic Overhead.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Bucket Oblivious Sort: An Extremely Simple Oblivious Sort.
Proceedings of the 3rd Symposium on Simplicity in Algorithms, 2020

Oblivious Parallel Tight Compaction.
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020

OptORAMa: Optimal Oblivious RAM.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Privacy-Preserving Dark Pools.
Proceedings of the 19th International Conference on Autonomous Agents and Multiagent Systems, 2020

2019
On Perfect Correctness without Derandomization.
IACR Cryptol. ePrint Arch., 2019

Blind Certificate Authorities.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Locality-Preserving Oblivious RAM.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
OptORAMa: Optimal Oblivious RAM.
IACR Cryptol. ePrint Arch., 2018

Tight Tradeoffs in Searchable Symmetric Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

On the Complexity of Compressing Obfuscation.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Privacy-Preserving Search of Similar Patients in Genomic Data.
IACR Cryptol. ePrint Arch., 2017

Privacy-Preserving Interdomain Routing at Internet Scale.
IACR Cryptol. ePrint Arch., 2017

Oblivious Computation with Data Locality.
IACR Cryptol. ePrint Arch., 2017

Secure Centrality Computation Over Multiple Networks.
Proceedings of the 26th International Conference on World Wide Web, 2017

2016
Toward a Game Theoretic View of Secure Computation.
J. Cryptol., 2016

More Efficient Oblivious Transfer Extensions.
IACR Cryptol. ePrint Arch., 2016

Indistinguishability Obfuscation Does Not Reduce to Structured Languages.
Electron. Colloquium Comput. Complex., 2016

On Constructing One-Way Permutations from Indistinguishability Obfuscation.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

2015
Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption.
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Towards Characterizing Complete Fairness in Secure Two-Party Computation.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

2013
The BGW Protocol for Perfectly-Secure Multiparty Computation.
Proceedings of the Secure Multi-Party Computation, 2013

A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

More efficient oblivious transfer and extensions for faster secure computation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Fair and Efficient Secure Multiparty Computation with Reputation Systems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Calling Out Cheaters: Covert Security with Public Verifiability.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE.
IACR Cryptol. ePrint Arch., 2011

A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation.
Electron. Colloquium Comput. Complex., 2011

Towards a Game Theoretic View of Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Perfectly-Secure Multiplication for Any <i>t < n</i>/3.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2009
Utility Dependence in Correct and Fair Rational Secret Sharing.
Proceedings of the Advances in Cryptology, 2009


  Loading...