Niv Gilboa

Orcid: 0000-0001-7209-3494

According to our database1, Niv Gilboa authored at least 72 papers between 1997 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Token-Level Privacy in Large Language Models.
CoRR, March, 2025

Improved Constructions for Distributed Multi-Point Functions.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
Prune+PlumTree - Finding Eviction Sets at Scale.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Secure Sorting and Selection via Function Secret Sharing.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Characterization and Detection of Cross-Router Covert Channels.
Comput. Secur., April, 2023

Oblivious Transfer with Constant Computational Overhead.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Arithmetic Sketching.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Locality-Preserving Hashing for Shifts with Connections to Cryptography.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Secure Multiparty Computation with Sublinear Preprocessing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Programmable Distributed Point Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Correlated Pseudorandomness from Expand-Accumulate Codes.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Information-Theoretic Distributed Point Functions.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Lightweight Techniques for Private Heavy Hitters.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Sublinear GMW-Style Compiler for MPC with Preprocessing.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Low-Complexity Weak Pseudorandom Functions in $\mathtt {AC}0[\mathtt {MOD}2]$.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Correlated Pseudorandom Functions from Variable-Density LPN.
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

Efficient Pseudorandom Correlation Generators from Ring-LPN.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Accumulating automata and cascaded equations automata for communicationless information theoretically secure multi-party computation.
Theor. Comput. Sci., 2019

Perennial secure multi-party computation of universal Turing machine.
Theor. Comput. Sci., 2019

How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs.
IACR Cryptol. ePrint Arch., 2019

Cross-Router Covert Channels.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Secure Computation with Preprocessing via Function Secret Sharing.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Spectre without shared memory.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

Efficient Pseudorandom Correlation Generators: Silent OT Extension and More.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Foundations of Homomorphic Secret Sharing.
Proceedings of the 9th Innovations in Theoretical Computer Science Conference, 2018

Compressing Vector OLE.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Functional encryption for cascade automata.
Inf. Comput., 2017

Broadcast Encryption with Both Temporary and Permanent Revocation.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

MIKELANGELO: MIcro KErneL virtualizAtioN for hiGh pErfOrmance cLOud and HPC Systems.
Proceedings of the Advances in Service-Oriented and Cloud Computing, 2017

Homomorphic Secret Sharing: Optimizations and Applications.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Breaking the Circuit Size Barrier for Secure Computation Under DDH.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Function Secret Sharing: Improvements and Extensions.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Rendezvous tunnel for anonymous publishing.
Peer-to-Peer Netw. Appl., 2015

Functional Encryption for Cascade Automata (Extended Abstract).
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2015

Function Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation: Extended Abstract.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

SSSDB: Database with Private Information Search.
Proceedings of the Algorithmic Aspects of Cloud Computing - First International Workshop, 2015

2014
Distributed Point Functions and Their Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013
Towards Efficient Private Distributed Computation on Unbounded Input Streams.
IACR Cryptol. ePrint Arch., 2013

Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract).
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Efficient Private Distributed Computation on Unbounded Input Streams
CoRR, 2012

Brief Announcement: Efficient Private Distributed Computation on Unbounded Input Streams.
Proceedings of the Distributed Computing - 26th International Symposium, 2012

Brief Announcement: Arbitrators in the Security Infrastructure.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Permanent Revocation in Attribute Based Broadcast Encryption.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

2011
Innovative approaches for security of small artefacts.
Comput. Sci. Rev., 2011

Rendezvous Tunnel for Anonymous Publishing: Clean Slate and Tor Based Designs.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

Secret Sharing Krohn-Rhodes: Private and Perennial Distributed Computation.
Proceedings of the Innovations in Computer Science, 2011

Poster: attribute based broadcast encryption with permanent revocation.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Poster: arbitrators in the security infrastructure, supporting positive anonymity.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Computing multi-party trust privately: in <i>O</i>(<i>n</i>) time units sending one (possibly large) message at a time.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Brief announcement: swarming secrets.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Schemes for Privately Computing Trust and Reputation.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Information security for sensors by overwhelming random sequences and permutations.
Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, 2010

Rendezvous tunnel for anonymous publishing.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Swarming secrets.
Proceedings of the 47th Annual Allerton Conference on Communication, 2009

2008
Distributed flow detection over multi path sessions.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Deniability - an alibi for users in P2P networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

Anonymity Scheme for Interactive P2P Services.
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008

2001
Topics in private information retrieval.
PhD thesis, 2001

1999
Compressing Cryptographic Resources.
Proceedings of the Advances in Cryptology, 1999

Two Party RSA Key Generation.
Proceedings of the Advances in Cryptology, 1999

1998
Private Information Retrieval by Keywords.
IACR Cryptol. ePrint Arch., 1998

1997
Computationally Private Information Retrieval (Extended Abstract).
Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, 1997


  Loading...