Yuval Ishai

Orcid: 0009-0009-4096-6305

Affiliations:
  • Technion - Israel Institute of Technology, Department of Computer Science, Haifa, Israel


According to our database1, Yuval Ishai authored at least 265 papers between 1996 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
From OT to OLE with Subquadratic Communication.
IACR Cryptol. ePrint Arch., 2025

Secret-Key PIR from Random Linear Codes.
IACR Cryptol. ePrint Arch., 2025

Shuffling is Universal: Statistical Additive Randomized Encodings for All Functions.
IACR Cryptol. ePrint Arch., 2025

Encrypted Matrix-Vector Products from Secret Dual Codes.
IACR Cryptol. ePrint Arch., 2025

Protecting Computations against Continuous Bounded-Communication Leakage.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

Improved Constructions for Distributed Multi-Point Functions.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Zero-Knowledge RAM: Doubly Efficient and Black-Box.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Query-Reusable Proof Systems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Peeking Into the Future: MPC Resilient to Super-Rushing Adversaries.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

A Unified Framework for Succinct Garbling from Homomorphic Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Fully Anonymous Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Designated-Verifier SNARGs with One Group Element.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Succinct Partial Garbling from Groups and Applications.
IACR Cryptol. ePrint Arch., 2024

Rabbit-Mix: Robust Algebraic Anonymous Broadcast from Additive Bases.
Proceedings of the 33rd USENIX Security Symposium, 2024

Dot-Product Proofs and Their Applications.
Proceedings of the 65th IEEE Annual Symposium on Foundations of Computer Science, 2024

Leakage-Tolerant Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Information-Theoretic Single-Server PIR in the Shuffle Model.
Proceedings of the 5th Conference on Information-Theoretic Cryptography, 2024

Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Secure Sorting and Selection via Function Secret Sharing.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Hard Languages in $\mathsf{NP} \cap \mathsf{coNP}$ and NIZK Proofs from Unstructured Hardness.
IACR Cryptol. ePrint Arch., 2023

Perfect MPC over Layered Graphs.
IACR Cryptol. ePrint Arch., 2023

Hard Languages in $\text{NP}\cap\text{coNP}$ and NIZK Proofs from Unstructured Hardness.
Electron. Colloquium Comput. Complex., 2023

Combinatorially Homomorphic Encryption.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Cryptography from Planted Graphs: Security with Logarithmic-Size Messages.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Hard Languages in NP ∩ coNP and NIZK Proofs from Unstructured Hardness.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

Succinct Computational Secret Sharing.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

On Low-End Obfuscation and Learning.
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

Bounded Simultaneous Messages.
Proceedings of the 43rd IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2023

Black-Box Reusable NISC with Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Oblivious Transfer with Constant Computational Overhead.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Succinct Arguments for RAM Programs via Projection Codes.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Round-Optimal Black-Box MPC in the Plain Model.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

One-Message Secure Reductions: On the Cost of Converting Correlations.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Computational Wiretap Coding from Indistinguishability Obfuscation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Additive Randomized Encodings and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Perfect MPC over Layered Graphs.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Multi-party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Arithmetic Sketching.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Correction to: Unconditionally Secure Computation Against Low-Complexity Leakage.
J. Cryptol., 2022

Fully-Secure MPC with Minimal Trust.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Streaming and Unbalanced PSI from Function Secret Sharing.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

On the Download Rate of Homomorphic Secret Sharing.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Locality-Preserving Hashing for Shifts with Connections to Cryptography.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Bounded Indistinguishability for Simple Sources.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Round-Optimal Black-Box Protocol Compilers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Private Circuits with Quasilinear Randomness.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Asymptotically Quasi-Optimal Cryptography.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Secure Multiparty Computation with Sublinear Preprocessing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Tight Bounds on the Randomness Complexity of Secure Multiparty Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Authenticated Garbling from Simple Correlations.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Programmable Distributed Point Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Correlated Pseudorandomness from Expand-Accumulate Codes.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Information-Theoretic Distributed Point Functions.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

Improving Line-Point Zero Knowledge: Two Multiplications for the Price of One.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

PSI from Ring-OLE.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Lightweight Techniques for Private Heavy Hitters.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

A Geometric Approach to Homomorphic Secret Sharing.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

On the Round Complexity of Black-Box Secure MPC.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Sublinear GMW-Style Compiler for MPC with Preprocessing.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Low-Complexity Weak Pseudorandom Functions in $\mathtt {AC}0[\mathtt {MOD}2]$.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Line-Point Zero Knowledge and Its Applications.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
How Low Can We Go?
IACR Cryptol. ePrint Arch., 2020

Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

On Computational Shortcuts for Information-Theoretic PIR.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

On Pseudorandom Encodings.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

On the Complexity of Decomposable Randomized Encodings, Or: How Friendly Can a Garbling-Friendly PRF Be?
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

Separating Two-Round Secure Computation From Oblivious Transfer.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

Correlated Pseudorandom Functions from Variable-Density LPN.
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

Proximity Gaps for Reed-Solomon Codes.
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

Efficient Pseudorandom Correlation Generators from Ring-LPN.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

On Succinct Arguments and Witness Encryption from Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Limits of Preprocessing.
Proceedings of the 35th Computational Complexity Conference, 2020

Is the Classical GMW Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

Cryptography from One-Way Communication: On Completeness of Finite Channels.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs.
IACR Cryptol. ePrint Arch., 2019

On Fully Secure MPC with Solitary Output.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Secure Computation with Preprocessing via Function Secret Sharing.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Cryptographic Sensing.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Trapdoor Hash Functions and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Reusable Non-Interactive Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Efficient Pseudorandom Correlation Generators: Silent OT Extension and More.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Unconditionally Secure Computation Against Low-Complexity Leakage.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

LevioSA: Lightweight Secure Arithmetic Computation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Outsourcing Private Machine Learning via Lightweight Secure Arithmetic Computation.
CoRR, 2018

Best Possible Information-Theoretic MPC.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Two-Round MPC: Information-Theoretic and Black-Box.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

On the Message Complexity of Secure Multiparty Computation.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Foundations of Homomorphic Secret Sharing.
Proceedings of the 9th Innovations in Theoretical Computer Science Conference, 2018

Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Limits of Practical Sublinear Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

On the Local Leakage Resilience of Linear Secret Sharing Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Private Circuits: A Modular Approach.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Compressing Vector OLE.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Near-Optimal Secret Sharing and Error Correcting Codes in AC0.
IACR Cryptol. ePrint Arch., 2017

Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

How to Construct a Leakage-Resilient (Stateless) Trusted Party.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Near-Optimal Secret Sharing and Error Correcting Codes in \mathsf AC^0 AC 0.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Can We Access a Database Both Locally and Privately?
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Low-Complexity Cryptographic Hash Functions .
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Lattice-Based SNARGs and Their Application to More Efficient Obfuscation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Ad Hoc PSM Protocols: Secure Computation Without Coordination.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

The Price of Low Communication in Secure Multi-party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Secure Arithmetic Computation with Constant Computational Overhead.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Homomorphic Secret Sharing: Optimizations and Applications.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Ligero: Lightweight Sublinear Arguments Without a Trusted Setup.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Non-Interactive Multiparty Computation Without Correlated Randomness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Special Section on the Fifty-Fourth Annual IEEE Symposium on Foundations of Computer Science (FOCS 2013).
SIAM J. Comput., 2016

Special Section on the Forty-Fifth Annual ACM Symposium on the Theory of Computing (STOC 2013).
SIAM J. Comput., 2016

Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Binary AMD Circuits from Secure Multiparty Computation.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

On Public Key Encryption from Noisy Codewords.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Secure Multiparty Computation with General Interaction Patterns.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

Distribution Design.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

Bounded-Communication Leakage Resilience via Parity-Resilient Circuits.
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016

Private Large-Scale Databases with Distributed Searchable Symmetric Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Secure Protocol Transformations.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Breaking the Circuit Size Barrier for Secure Computation Under DDH.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Bounded Indistinguishability and the Complexity of Recovering Secrets.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Function Secret Sharing: Improvements and Extensions.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys.
SIAM J. Comput., 2015

Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
J. Cryptol., 2015

Minimizing Locality of One-Way Functions via Semi-Private Randomized Encodings.
Electron. Colloquium Comput. Complex., 2015

Public-Coin Differing-Inputs Obfuscation and Its Applications.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Statistical Randomized Encodings: A Complexity Theoretic View.
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015

Function Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Secure Computation with Minimal Interaction, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Parallel Hashing via List Recoverability.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Cryptography with One-Way Communication.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Secure Computation from Leaky Correlated Randomness.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Probabilistically Checkable Proofs of Proximity with Zero-Knowledge.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

On the Cryptographic Complexity of the Worst Functions.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Circuits resilient to additive attacks with applications to secure computation.
Proceedings of the Symposium on Theory of Computing, 2014

Single-use ot combiners with near-optimal resilience.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications.
Proceedings of the Innovations in Theoretical Computer Science, 2014

Partial Garbling Schemes and Their Applications.
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

Distributed Point Functions and Their Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

On the Complexity of UC Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Secure Multi-Party Computation with Identifiable Abort.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Non-Interactive Secure Multiparty Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Optimizing Obfuscation: Avoiding Barrington's Theorem.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Randomization Techniques for Secure Computation.
Proceedings of the Secure Multi-Party Computation, 2013

Efficient Multiparty Protocols via Log-Depth Threshold Formulae.
Electron. Colloquium Comput. Complex., 2013

On the Power of Correlated Randomness in Secure Computation.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Erratum: Succinct Non-interactive Arguments via Linear Interactive Proofs.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Succinct Non-interactive Arguments via Linear Interactive Proofs.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Lossy Chains and Fractional Secret Sharing.
Proceedings of the 30th International Symposium on Theoretical Aspects of Computer Science, 2013

Robust Pseudorandom Generators.
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013

Efficient Multiparty Protocols via Log-Depth Threshold Formulae - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

On Linear-Size Pseudorandom Generators and Hardcore Functions.
Proceedings of the Computing and Combinatorics, 19th International Conference, 2013

Zero Knowledge LTCs and Their Applications.
Proceedings of the Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 2013

2012
Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits.
IACR Cryptol. ePrint Arch., 2012

Identifying Cheaters without an Honest Majority.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

On Efficient Zero-Knowledge PCPs.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

The complexity of information theoretic secure computation.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

From randomizing polynomials to parallel algorithms.
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012

Share Conversion and Private Information Retrieval.
Proceedings of the 27th Conference on Computational Complexity, 2012

2011
On Achieving the "Best of Both Worlds" in Secure Multiparty Computation.
SIAM J. Comput., 2011

Black-Box Constructions of Protocols for Secure Computation.
SIAM J. Comput., 2011

Semantic Security under Related-Key Attacks and Applications.
Proceedings of the Innovations in Computer Science, 2011

Correlation Extractors and Their Applications - (Invited Talk).
Proceedings of the Information Theoretic Security - 5th International Conference, 2011

How to Garble Arithmetic Circuits.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

Efficient Non-interactive Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Constant-Rate Oblivious Transfer from Noisy Channels.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
On <i>d</i>-Multiplicative Secret Sharing.
J. Cryptol., 2010

Secure Computation and Its Diverse Applications.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Founding Cryptography on Tamper-Proof Hardware Tokens.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

On Complete Primitives for Fairness.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Proceedings of the Innovations in Computer Science, 2010

From Secrecy to Soundness: Efficient Verification via Secure Computation.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010

Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Bounded Key-Dependent Message Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Secure Multiparty Computation with Minimal Interaction.
Proceedings of the Advances in Cryptology, 2010

Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.
Proceedings of the Advances in Cryptology, 2010

On Invertible Sampling and Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Zero-Knowledge Proofs from Secure Multiparty Computation.
SIAM J. Comput., 2009

Secure Arithmetic Computation with No Honest Majority.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Extracting Correlations.
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009

2008
OT-Combiners via Secure Computation.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Basing Weak Public-Key Cryptography on Strong One-Way Functions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Cryptography with constant computational overhead.
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008

Communication in the presence of replication.
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008

Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle.
Proceedings of the Advances in Cryptology, 2008

Founding Cryptography on Oblivious Transfer - Efficiently.
Proceedings of the Advances in Cryptology, 2008

Scalable Multiparty Computation with Nearly Optimal Work and Resilience.
Proceedings of the Advances in Cryptology, 2008

2007
Communication vs. Computation.
Comput. Complex., 2007

Evaluating Branching Programs on Encrypted Data.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Zero-knowledge from secure multiparty computation.
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007

Private Multiparty Sampling and Approximation of Vector Combinations.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Proceedings of the Advances in Cryptology, 2007

Cryptography with Constant Input Locality.
Proceedings of the Advances in Cryptology, 2007

Efficient Arguments without Short PCPs.
Proceedings of the 22nd Annual IEEE Conference on Computational Complexity (CCC 2007), 2007

On Locally Decodable Codes, Self-correctable Codes, and <i>t</i> -Private PIR.
Proceedings of the Approximation, 2007

2006
Black-box constructions for secure computation.
Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006

On the randomness complexity of efficient sampling.
Proceedings of the 38th Annual ACM Symposium on Theory of Computing, 2006

Cryptography from Anonymity.
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, 2006

Private Circuits II: Keeping Secrets in Tamperable Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation.
Proceedings of the Advances in Cryptology, 2006

Scalable Secure Multiparty Computation.
Proceedings of the Advances in Cryptology, 2006

On Pseudorandom Generators with Linear Stretch in NC<sup>0</sup>.
Proceedings of the Approximation, 2006

2005
General constructions for information-theoretic private information retrieval.
J. Comput. Syst. Sci., 2005

Sufficient Conditions for Collision-Resistant Hashing.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Keyword Search and Oblivious Pseudorandom Functions.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator.
Proceedings of the Advances in Cryptology, 2005

Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems.
Proceedings of the Advances in Cryptology, 2005

Computationally Private Randomizing Polynomials and Their Applications.
Proceedings of the 20th Annual IEEE Conference on Computational Complexity (CCC 2005), 2005

2004
Adaptive versus Non-Adaptive Security of Multi-Party Protocols.
J. Cryptol., 2004

Batch codes and their applications.
Proceedings of the 36th Annual ACM Symposium on Theory of Computing, 2004

Communication Versus Computation.
Proceedings of the Automata, Languages and Programming: 31st International Colloquium, 2004

Cryptography in NC<sup>0</sup>.
Proceedings of the 45th Symposium on Foundations of Computer Science, 2004

On the Hardness of Information-Theoretic Multiparty Computation.
Proceedings of the Advances in Cryptology, 2004

2003
Private computation using a PEZ dispenser.
Theor. Comput. Sci., 2003

Efficient Multi-party Computation over Rings.
Proceedings of the Advances in Cryptology, 2003

Private Circuits: Securing Hardware against Probing Attacks.
Proceedings of the Advances in Cryptology, 2003

Extending Oblivious Transfers Efficiently.
Proceedings of the Advances in Cryptology, 2003

2002
Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials.
Proceedings of the Automata, Languages and Programming, 29th International Colloquium, 2002

Breaking the O(n1/(2k-1)) Barrier for Information-Theoretic Private Information Retrieval.
Proceedings of the 43rd Symposium on Foundations of Computer Science, 2002

On 2-Round Secure Multiparty Computation.
Proceedings of the Advances in Cryptology, 2002

2001
Universal Service-Providers for Private Information Retrieval.
J. Cryptol., 2001

On the Power of Nonlinear Secret-Sharing.
IACR Cryptol. ePrint Arch., 2001

The round complexity of verifiable secret sharing and secure multicast.
Proceedings of the Proceedings on 33rd Annual ACM Symposium on Theory of Computing, 2001

Selective private function evaluation with applications to private statistics.
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001

Secure Multiparty Computation of Approximations.
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001

Information-Theoretic Private Information Retrieval: A Unified Construction.
Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001

On Adaptive vs. Non-adaptive Security of Multiparty Protocols.
Proceedings of the Advances in Cryptology, 2001

Priced Oblivious Transfer: How to Sell Digital Goods.
Proceedings of the Advances in Cryptology, 2001

On the Power of Nonlinear Secrect-Sharing.
Proceedings of the 16th Annual IEEE Conference on Computational Complexity, 2001

2000
Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation.
Proceedings of the 41st Annual Symposium on Foundations of Computer Science, 2000

Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing.
Proceedings of the Advances in Cryptology, 2000

1999
Private computation and correlated randomness.
PhD thesis, 1999

Improved Upper Bounds on Information-Theoretic Private Information Retrieval (Extended Abstract).
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999

One-Way Functions Are Essential for Single-Server Private Information Retrieval.
Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, 1999

Compressing Cryptographic Resources.
Proceedings of the Advances in Cryptology, 1999

1998
Universal Service Providers for Database Private Information Retrieval.
IACR Cryptol. ePrint Arch., 1998

Protecting Data Privacy in Private Information Retrieval Schemes.
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998

Non-Interactive and Non-Malleable Commitment.
Proceedings of the Thirtieth Annual ACM Symposium on the Theory of Computing, 1998

Universal Service-Providers for Database Private Information Retrieval (Extended Abstract).
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

1997
Protecting Data Privacy in Private Information Retrieval Schemes.
IACR Cryptol. ePrint Arch., 1997

Private Simultaneous Messages Protocols with Applications.
Proceedings of the Fifth Israel Symposium on Theory of Computing and Systems, 1997

1996
Valid Generalisation from Approximate Interpolation.
Comb. Probab. Comput., 1996

On Privacy and Partition Arguments.
Proceedings of the Fourth Israel Symposium on Theory of Computing and Systems, 1996


  Loading...