Search Results - "Hazay, Carmit"
-
1
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
Published in Journal of cryptology (01-04-2018)“…In this paper, we study the two fundamental functionalities oblivious polynomial evaluation in the exponent and set-intersection and introduce a new technique…”
Get full text
Journal Article -
2
Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and more
Published in Journal of cryptology (01-03-2025)“…Leakage-resilient cryptography aims to protect cryptographic primitives from so-called “side channel attacks” that exploit their physical implementation to…”
Get full text
Journal Article -
3
The Price of Active Security in Cryptographic Protocols
Published in Journal of cryptology (01-07-2024)“…We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting, for an…”
Get full text
Journal Article -
4
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer
Published in Journal of cryptology (01-10-2020)“…In this work, we present two new actively secure, constant-round multi-party computation (MPC) protocols with security against all-but-one corruptions. Our…”
Get full text
Journal Article -
5
ZK-PCPs from Leakage-Resilient Secret Sharing
Published in Journal of cryptology (01-10-2022)“…Zero-Knowledge PCPs (ZK-PCPs; Kilian, Petrank, and Tardos, STOC ‘97) are PCPs with the additional zero-knowledge guarantee that the view of any (possibly…”
Get full text
Journal Article -
6
Efficient Set Intersection with Simulation-Based Security
Published in Journal of cryptology (01-01-2016)“…We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large…”
Get full text
Journal Article -
7
Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model
Published in Journal of cryptology (01-07-2023)“…We consider the problem of constant-round secure two-party computation in the presence of active (malicious) adversaries. We present the first protocol that…”
Get full text
Journal Article -
8
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
Published in Journal of cryptology (15-04-2019)“…The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many…”
Get full text
Journal Article -
9
Ligero: lightweight sublinear arguments without a trusted setup
Published in Designs, codes, and cryptography (01-11-2023)“…We design and implement a simple zero-knowledge argument protocol for NP whose communication complexity is proportional to the square-root of the verification…”
Get full text
Journal Article -
10
TinyKeys: A New Approach to Efficient Multi-Party Computation
Published in Journal of cryptology (01-04-2022)“…We present a new approach to designing concretely efficient MPC protocols with semi-honest security in the dishonest majority setting. Motivated by the fact…”
Get full text
Journal Article -
11
Round-Optimal Secure Multi-party Computation
Published in Journal of cryptology (01-07-2021)“…Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually distrustful parties to jointly compute some function of…”
Get full text
Journal Article -
12
On the Power of Secure Two-Party Computation
Published in Journal of cryptology (2020)“…Ishai, Kushilevitz, Ostrovsky and Sahai (STOC 2007 ; SIAM J Comput 39(3):1121–1152, 2009 ) introduced the powerful “MPC-in-the-head” technique that provided a…”
Get full text
Journal Article -
13
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model
Published in Journal of cryptology (01-10-2019)“…The random-access memory model of computation allows program constant-time memory lookup and is more applicable in practice today, covering many important…”
Get full text
Journal Article -
14
What Security Can We Achieve Within 4 Rounds?
Published in Journal of cryptology (01-10-2019)“…Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black-box constructions of secure two-party protocols and at…”
Get full text
Journal Article -
15
On Black-Box Complexity of Universally Composable Security in the CRS Model
Published in Journal of cryptology (15-07-2019)“…In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure computation based on general assumptions . We present a…”
Get full text
Journal Article -
16
Efficient Set Operations in the Presence of Malicious Adversaries
Published in Journal of cryptology (01-07-2012)“…We revisit the problem of constructing efficient secure two-party protocols for the problems of set intersection and set union, focusing on the model of…”
Get full text
Journal Article -
17
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
Published in Journal of cryptology (2014)“…We propose a protocol for the problem of secure two-party pattern matching, where Alice holds a text t ∈{0,1} ∗ of length n , while Bob has a pattern p ∈{0,1}…”
Get full text
Journal Article -
18
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
Published in Journal of cryptology (01-07-2010)“…In this paper, we construct efficient secure protocols for set intersection and pattern matching . Our protocols for secure computing the set intersection…”
Get full text
Journal Article -
19
Efficient One-Sided Adaptively Secure Computation
Published in Journal of cryptology (2017)“…Adaptive security is a strong security notion that captures additional security threats that are not addressed by static corruptions. For instance, it captures…”
Get full text
Journal Article -
20
Toward a Game Theoretic View of Secure Computation
Published in Journal of cryptology (01-10-2016)“…We demonstrate how Game Theoretic concepts and formalism can be used to capture cryptographic notions of security. In the restricted but indicative case of…”
Get full text
Journal Article