Shai Halevi

Orcid: 0000-0003-3432-7899

Affiliations:
  • IBM Research, Yorktown Heights, NY, USA


According to our database1, Shai Halevi authored at least 159 papers between 1993 and 2025.

Collaborative distances:
  • Dijkstra number2 of two.
  • Erdős number3 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Blockcipher-Based Key Commitment for Nonce-Derived Schemes.
IACR Cryptol. ePrint Arch., 2025

Blockcipher-Based Key Derivation without PRP/PRF Switching.
IACR Cryptol. ePrint Arch., 2025

Encrypted Matrix-Vector Products from Secret Dual Codes.
IACR Cryptol. ePrint Arch., 2025

Gold OPRF: Post-Quantum Oblivious Power-Residue PRF.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
SPRINT: High-Throughput Robust Distributed Schnorr Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
Security with Functional Re-encryption from CPA.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Additive Randomized Encodings and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Weighted Secret Sharing from Wiretap Channels.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

2022
Random-Index Oblivious RAM.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Achievable CCA2 Relaxation for Homomorphic Encryption.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Threshold Cryptography as a Service (in the Multiserver and YOSO Models).
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022


2021
Random-Index PIR and Applications.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Design and implementation of HElib: a homomorphic encryption library.
IACR Cryptol. ePrint Arch., 2020

Random-index PIR with Applications to Large-Scale Secure MPC.
IACR Cryptol. ePrint Arch., 2020

Can a Blockchain Keep a Secret?
IACR Cryptol. ePrint Arch., 2020

Can a Public Blockchain Keep a Secret?
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

2019
Homomorphic Encryption Standard.
IACR Cryptol. ePrint Arch., 2019

On Fully Secure MPC with Solitary Output.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Compressible FHE with Applications to PIR.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Towards Deep Neural Network Training on Encrypted Data.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2019

An Improved RNS Variant of the BFV Homomorphic Encryption Scheme.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

Initial Public Offering (IPO) on Permissioned Blockchain Using Secure Multiparty Computation.
Proceedings of the IEEE International Conference on Blockchain, 2019

Homomorphic Encryption for Finite Automata.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

Homomorphic Training of 30, 000 Logistic Regression Models.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free.
IACR Cryptol. ePrint Arch., 2018

Best Possible Information-Theoretic MPC.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Faster Homomorphic Linear Transformations in HElib.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Round-Optimal Secure Multi-Party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Advanced Cryptography: Promise and Challenges.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Doing Real Work with FHE: The Case of Logistic Regression.
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018

2017
Privacy-Preserving Search of Similar Patients in Genomic Data.
IACR Cryptol. ePrint Arch., 2017

Four Round Secure Computation Without Setup.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Cryptanalyses of Candidate Branching Program Obfuscators.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Implementing BP-Obfuscation Using Graph-Induced Encoding.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Non-Interactive Multiparty Computation Without Correlated Randomness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Homomorphic Encryption.
Proceedings of the Tutorials on the Foundations of Cryptography., 2017

2016
Hiding secrets in software: a cryptographic approach to program obfuscation.
Commun. ACM, 2016

Functional Encryption Without Obfuscation.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Secure Multiparty Computation with General Interaction Patterns.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

Spooky Encryption and Its Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue.
IACR Cryptol. ePrint Arch., 2015

Graded Encoding, Variations on a Scheme.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of the Quadratic Zero-Testing of GGH.
IACR Cryptol. ePrint Arch., 2015

Graph-Induced Multilinear Maps from Lattices.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Bootstrapping for HElib.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Private Database Access with HE-over-ORAM Architecture.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
The Hash Function "Fugue".
IACR Cryptol. ePrint Arch., 2014

Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero.
IACR Cryptol. ePrint Arch., 2014

Garbled RAM Revisited, Part I.
IACR Cryptol. ePrint Arch., 2014

Fully Secure Functional Encryption without Obfuscation.
IACR Cryptol. ePrint Arch., 2014

Fully Secure Attribute Based Encryption from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2014

Two-Round Secure MPC from Indistinguishability Obfuscation.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Outsourcing Private RAM Computation.
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014

Garbled RAM Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Algorithms in HElib.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Field switching in BGV-style homomorphic encryption.
J. Comput. Secur., 2013

How to Compress (Reusable) Garbled Circuits.
IACR Cryptol. ePrint Arch., 2013

Packed Ciphertexts in LWE-Based Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Optimizing ORAM and Using It Efficiently for Secure Computation.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

Candidate Multilinear Maps from Ideal Lattices.
Proceedings of the Advances in Cryptology, 2013

Attribute-Based Encryption for Circuits from Multilinear Maps.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Discrete Gaussian Leftover Hash Lemma over Infinite Domains.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

Private Database Queries Using Somewhat Homomorphic Encryption.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Ring Switching in BGV-Style Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2012

Candidate Multilinear Maps from Ideal Lattices and Applications.
IACR Cryptol. ePrint Arch., 2012

Sampling Discrete Gaussians Efficiently and Obliviously.
IACR Cryptol. ePrint Arch., 2012

Leakage-Tolerant Interactive Protocols.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Ring Switching in BGV-Style Homomorphic Encryption.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Better Bootstrapping in Fully Homomorphic Encryption.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Fully Homomorphic Encryption with Polylog Overhead.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Homomorphic Evaluation of the AES Circuit.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Tree-based HB protocols for privacy-preserving authentication of RFID tags.
J. Comput. Secur., 2011

After-the-Fact Leakage in Public-Key Encryption.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

One-Pass HMQV and Asymmetric Key-Wrapping.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

Implementing Gentry's Fully-Homomorphic Encryption Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Secure Computation on the Web: Computing without Simultaneous Interaction.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Proofs of ownership in remote storage systems.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Program Obfuscation with Leaky Hardware.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Composable Security Analysis of OS Services.
Proceedings of the Applied Cryptography and Network Security, 2011

Collision-Free Hashing from Lattice Problems.
Proceedings of the Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation, 2011

2010
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.
IACR Cryptol. ePrint Arch., 2010

Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation.
Proceedings of the Network and Distributed System Security Symposium, 2010

A Simple BGN-Type Cryptosystem from LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

<i>i</i>-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.
Proceedings of the Advances in Cryptology, 2010

2009
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
CoRR, 2009

Hierarchical Identity Based Encryption with Polynomially Many Levels.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

More on Key Wrapping.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Attacking cryptographic schemes based on "perturbation polynomials".
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Cryptanalysis of ISO/IEC 9796-1.
J. Cryptol., 2008

Degradation and Amplification of Computational Hardness.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

On Seed-Incompressible Functions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Rationality and traffic attraction: incentives for honest path announcements in bgp.
Proceedings of the ACM SIGCOMM 2008 Conference on Applications, 2008

Storage Encryption: A Cryptographer's View.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Threshold RSA for Dynamic and Ad-Hoc Groups.
Proceedings of the Advances in Cryptology, 2008

Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs.
Proceedings of the Computer Security, 2008

Circular-Secure Encryption from Decision Diffie-Hellman.
Proceedings of the Advances in Cryptology, 2008

2007
Chosen-Ciphertext Security from Identity-Based Encryption.
SIAM J. Comput., 2007

Smooth Projective Hashing and Two-Message Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2007

Invertible Universal Hashing and the TET Encryption Mode.
Proceedings of the Advances in Cryptology, 2007

Security under key-dependent inputs.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.
Proceedings of the Topics in Cryptology, 2006

Strengthening Digital Signatures Via Randomized Hashing.
Proceedings of the Advances in Cryptology, 2006

Mitigating Dictionary Attacks on Password-Protected Local Storage.
Proceedings of the Advances in Cryptology, 2006

2005
Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control.
IACR Cryptol. ePrint Arch., 2005

A plausible approach to computer-aided cryptographic proofs.
IACR Cryptol. ePrint Arch., 2005

A sufficient condition for key-privacy.
IACR Cryptol. ePrint Arch., 2005

Hardness Amplification of Weakly Verifiable Puzzles.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Adaptively-Secure, Non-interactive Public-Key Encryption.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Universally Composable Password-Based Key Exchange.
Proceedings of the Advances in Cryptology, 2005

A model and architecture for pseudo-random generation with applications to /dev/random.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
EME*: extending EME to handle arbitrary-length messages with associated data.
IACR Cryptol. ePrint Arch., 2004

On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

EME<sup>*</sup>: Extending EME to Handle Arbitrary-Length Messages with Associated Data.
Proceedings of the Progress in Cryptology, 2004

Chosen-Ciphertext Security from Identity-Based Encryption.
Proceedings of the Advances in Cryptology, 2004

A Parallelizable Enciphering Mode.
Proceedings of the Topics in Cryptology, 2004

2003
A Forward-Secure Public-Key Encryption Scheme.
Proceedings of the Advances in Cryptology, 2003

A Tweakable Enciphering Mode.
Proceedings of the Advances in Cryptology, 2003

2002
A Two Layered Approach for Securing an Object Store Network.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

Scream: A Software-Efficient Stream Cipher.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Cryptanalysis of Stream Ciphers with Linear Masking.
Proceedings of the Advances in Cryptology, 2002

2001
An observation regarding Jutla's modes of operation.
IACR Cryptol. ePrint Arch., 2001

Private approximation of NP-hard functions.
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001

Incremental Codes.
Proceedings of the Approximation, 2001

The Modular Inversion Hidden Number Problem.
Proceedings of the Advances in Cryptology, 2001

2000
Clock synchronization with faults and recoveries (extended abstract).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000

Computing Inverses over a Shared Secret Modulus.
Proceedings of the Advances in Cryptology, 2000

Exposure-Resilient Functions and All-or-Nothing Transforms.
Proceedings of the Advances in Cryptology, 2000

A Cryptographic Solution to a Game Theoretic Problem.
Proceedings of the Advances in Cryptology, 2000

IBM Comments.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Secure Hash-and-Sign Signatures Without the Random Oracle.
Proceedings of the Advances in Cryptology, 1999

UMAC: Fast and Secure Message Authentication.
Proceedings of the Advances in Cryptology, 1999

Computing from Partial Solutions.
Proceedings of the 14th Annual IEEE Conference on Computational Complexity, 1999

1998
More on Proofs of Knowledge.
IACR Cryptol. ePrint Arch., 1998

The Random Oracle Methodology, Revisited.
IACR Cryptol. ePrint Arch., 1998

Many-to-one Trapdoor Functions and their Relation to Public-key Cryptosystems.
IACR Cryptol. ePrint Arch., 1998

The Random Oracle Methodology, Revisited (Preliminary Version).
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998

Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems.
Proceedings of the Advances in Cryptology, 1998

Public-Key Cryptography and Password Protocols.
Proceedings of the CCS '98, 1998

1997
Theory and practice of secret commitment.
PhD thesis, 1997

Maintaining Authenticated Communication in the Presence of Break-ins.
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997

MMH: Software Message Authentication in the Gbit/Second Rates.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Public-Key Cryptosystems from Lattice Reduction Problems.
Proceedings of the Advances in Cryptology, 1997

Eliminating Decryption Errors in the Ajtai-Dwork Cryptosystem.
Proceedings of the Advances in Cryptology, 1997

1996
Collision-Free Hashing from Lattice Problems
Electron. Colloquium Comput. Complex., 1996

Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing.
Proceedings of the Advances in Cryptology, 1996

1995
Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver.
Proceedings of the Advances in Cryptology, 1995

1994
Potential Function Analysis of Greedy Hot-Potato Routing.
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

1993
Zero-One Permanent is <i>#P</i>-Complete, A Simpler Proof.
Proceedings of the Second Israel Symposium on Theory of Computing Systems, 1993


  Loading...