Search Results - "Hazay, Carmit"

Refine Results
  1. 1

    Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs by Hazay, Carmit

    Published in Journal of cryptology (01-04-2018)
    “…In this paper, we study the two fundamental functionalities oblivious polynomial evaluation in the exponent and set-intersection and introduce a new technique…”
    Get full text
    Journal Article
  2. 2

    Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and more by Hazay, Carmit, Venkitasubramaniam, Muthuramakrishnan, Weiss, Mor

    Published in Journal of cryptology (01-03-2025)
    “…Leakage-resilient cryptography aims to protect cryptographic primitives from so-called “side channel attacks” that exploit their physical implementation to…”
    Get full text
    Journal Article
  3. 3

    The Price of Active Security in Cryptographic Protocols by Hazay, Carmit, Venkitasubramaniam, Muthuramakrishnan, Weiss, Mor

    Published in Journal of cryptology (01-07-2024)
    “…We construct the first actively-secure Multi-Party Computation (MPC) protocols with an arbitrary number of parties in the dishonest majority setting, for an…”
    Get full text
    Journal Article
  4. 4

    Low Cost Constant Round MPC Combining BMR and Oblivious Transfer by Hazay, Carmit, Scholl, Peter, Soria-Vazquez, Eduardo

    Published in Journal of cryptology (01-10-2020)
    “…In this work, we present two new actively secure, constant-round multi-party computation (MPC) protocols with security against all-but-one corruptions. Our…”
    Get full text
    Journal Article
  5. 5

    ZK-PCPs from Leakage-Resilient Secret Sharing by Hazay, Carmit, Venkitasubramaniam, Muthuramakrishnan, Weiss, Mor

    Published in Journal of cryptology (01-10-2022)
    “…Zero-Knowledge PCPs (ZK-PCPs; Kilian, Petrank, and Tardos, STOC ‘97) are PCPs with the additional zero-knowledge guarantee that the view of any (possibly…”
    Get full text
    Journal Article
  6. 6

    Efficient Set Intersection with Simulation-Based Security by Freedman, Michael J., Hazay, Carmit, Nissim, Kobbi, Pinkas, Benny

    Published in Journal of cryptology (01-01-2016)
    “…We consider the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large…”
    Get full text
    Journal Article
  7. 7

    Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model by Hazay, Carmit, Ishai, Yuval, Venkitasubramaniam, Muthuramakrishnan

    Published in Journal of cryptology (01-07-2023)
    “…We consider the problem of constant-round secure two-party computation in the presence of active (malicious) adversaries. We present the first protocol that…”
    Get full text
    Journal Article
  8. 8

    Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting by Hazay, Carmit, Mikkelsen, Gert Læssøe, Rabin, Tal, Toft, Tomas, Nicolosi, Angelo Agatino

    Published in Journal of cryptology (15-04-2019)
    “…The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many…”
    Get full text
    Journal Article
  9. 9

    Ligero: lightweight sublinear arguments without a trusted setup by Ames, Scott, Hazay, Carmit, Ishai, Yuval, Venkitasubramaniam, Muthuramakrishnan

    Published in Designs, codes, and cryptography (01-11-2023)
    “…We design and implement a simple zero-knowledge argument protocol for NP whose communication complexity is proportional to the square-root of the verification…”
    Get full text
    Journal Article
  10. 10

    TinyKeys: A New Approach to Efficient Multi-Party Computation by Hazay, Carmit, Orsini, Emmanuela, Scholl, Peter, Soria-Vazquez, Eduardo

    Published in Journal of cryptology (01-04-2022)
    “…We present a new approach to designing concretely efficient MPC protocols with semi-honest security in the dishonest majority setting. Motivated by the fact…”
    Get full text
    Journal Article
  11. 11

    Round-Optimal Secure Multi-party Computation by Halevi, Shai, Hazay, Carmit, Polychroniadou, Antigoni, Venkitasubramaniam, Muthuramakrishnan

    Published in Journal of cryptology (01-07-2021)
    “…Secure multi-party computation (MPC) is a central cryptographic task that allows a set of mutually distrustful parties to jointly compute some function of…”
    Get full text
    Journal Article
  12. 12

    On the Power of Secure Two-Party Computation by Hazay, Carmit, Venkitasubramaniam, Muthuramakrishnan

    Published in Journal of cryptology (2020)
    “…Ishai, Kushilevitz, Ostrovsky and Sahai (STOC 2007 ; SIAM J Comput 39(3):1121–1152, 2009 ) introduced the powerful “MPC-in-the-head” technique that provided a…”
    Get full text
    Journal Article
  13. 13

    Constant-Round Maliciously Secure Two-Party Computation in the RAM Model by Hazay, Carmit, Yanai, Avishay

    Published in Journal of cryptology (01-10-2019)
    “…The random-access memory model of computation allows program constant-time memory lookup and is more applicable in practice today, covering many important…”
    Get full text
    Journal Article
  14. 14

    What Security Can We Achieve Within 4 Rounds? by Hazay, Carmit, Venkitasubramaniam, Muthuramakrishnan

    Published in Journal of cryptology (01-10-2019)
    “…Katz and Ostrovsky (Crypto 2004) proved that five rounds are necessary for stand-alone general black-box constructions of secure two-party protocols and at…”
    Get full text
    Journal Article
  15. 15

    On Black-Box Complexity of Universally Composable Security in the CRS Model by Hazay, Carmit, Venkitasubramaniam, Muthuramakrishnan

    Published in Journal of cryptology (15-07-2019)
    “…In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure computation based on general assumptions . We present a…”
    Get full text
    Journal Article
  16. 16

    Efficient Set Operations in the Presence of Malicious Adversaries by Hazay, Carmit, Nissim, Kobbi

    Published in Journal of cryptology (01-07-2012)
    “…We revisit the problem of constructing efficient secure two-party protocols for the problems of set intersection and set union, focusing on the model of…”
    Get full text
    Journal Article
  17. 17

    Computationally Secure Pattern Matching in the Presence of Malicious Adversaries by Hazay, Carmit, Toft, Tomas

    Published in Journal of cryptology (2014)
    “…We propose a protocol for the problem of secure two-party pattern matching, where Alice holds a text t ∈{0,1} ∗ of length  n , while Bob has a pattern p ∈{0,1}…”
    Get full text
    Journal Article
  18. 18

    Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries by Hazay, Carmit, Lindell, Yehuda

    Published in Journal of cryptology (01-07-2010)
    “…In this paper, we construct efficient secure protocols for set intersection and pattern matching . Our protocols for secure computing the set intersection…”
    Get full text
    Journal Article
  19. 19

    Efficient One-Sided Adaptively Secure Computation by Hazay, Carmit, Patra, Arpita

    Published in Journal of cryptology (2017)
    “…Adaptive security is a strong security notion that captures additional security threats that are not addressed by static corruptions. For instance, it captures…”
    Get full text
    Journal Article
  20. 20

    Toward a Game Theoretic View of Secure Computation by Asharov, Gilad, Canetti, Ran, Hazay, Carmit

    Published in Journal of cryptology (01-10-2016)
    “…We demonstrate how Game Theoretic concepts and formalism can be used to capture cryptographic notions of security. In the restricted but indicative case of…”
    Get full text
    Journal Article