Skip to main content

Foundations and Applications of Functional Cryptography

Searching for OpenAIRE data...

Publications

Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions

Author(s): Zvika Brakerski, Ilan Komargodski, Gil Segev
Published in: Journal of Cryptology, Issue 31/2, 2018, Page(s) 434-520, ISSN 0933-2790
DOI: 10.1007/s00145-017-9261-0

On Constructing One-Way Permutations from Indistinguishability Obfuscation

Author(s): Gilad Asharov, Gil Segev
Published in: Journal of Cryptology, Issue 31/3, 2018, Page(s) 698-736, ISSN 0933-2790
DOI: 10.1007/s00145-017-9268-6

Function-Private Functional Encryption in the Private-Key Setting

Author(s): Zvika Brakerski, Gil Segev
Published in: Journal of Cryptology, Issue 31/1, 2018, Page(s) 202-225, ISSN 0933-2790
DOI: 10.1007/s00145-017-9255-y

Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions

Author(s): Ananth Raghunathan, Gil Segev, Salil Vadhan
Published in: Journal of Cryptology, Issue 31/4, 2018, Page(s) 1012-1063, ISSN 0933-2790
DOI: 10.1007/s00145-018-9287-y

Privacy-Preserving Interdomain Routing at Internet Scale

Author(s): Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner
Published in: Proceedings on Privacy Enhancing Technologies, Issue 2017/3, 2017, Page(s) 147-167, ISSN 2299-0984
DOI: 10.1515/popets-2017-0033

From Minicrypt to Obfustopia via Private-Key Functional Encryption

Author(s): Ilan Komargodski, Gil Segev
Published in: Journal of Cryptology, 2020, ISSN 0933-2790
DOI: 10.1007/s00145-019-09327-x

Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal

Author(s): Lior Rotem, Gil Segev
Published in: Advances in Cryptology – CRYPTO 2018, 2018, Page(s) 63-89
DOI: 10.1007/978-3-319-96884-1_3

Tight Tradeoffs in Searchable Symmetric Encryption

Author(s): Gilad Asharov, Gil Segev, Ido Shahaf
Published in: Advances in Cryptology -- CRYPTO 2018, 2018, Page(s) 407-436
DOI: 10.1007/978-3-319-96884-1_14

Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions

Author(s): Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan
Published in: Advances in Cryptology -- EUROCRYPT 2018, 2018, Page(s) 535-564
DOI: 10.1007/978-3-319-78381-9_20

Securing Abe's Mix-Net Against Malicious Verifiers via Witness Indistinguishability

Author(s): Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev
Published in: Security and Cryptography for Networks - 11th International Conference, SCN 2018, 2018, Page(s) 274-291
DOI: 10.1007/978-3-319-98113-0_15

From Minicrypt to Obfustopia via Private-Key Functional Encryption

Author(s): Ilan Komargodski, Gil Segev
Published in: Advances in Cryptology - EUROCRYPT 2017, 2017, Page(s) 122-151
DOI: 10.1007/978-3-319-56620-7_5

Can PPAD Hardness be Based on Standard Cryptographic Assumptions?

Author(s): Alon Rosen, Gil Segev, Ido Shahaf
Published in: Theory of Cryptography Conference (TCC 2017), 2017, Page(s) 747-776
DOI: 10.1007/978-3-319-70503-3_25

Strengthening the Security of Encrypted Databases: Non-Transitive JOINs

Author(s): Ilya Mironov, Gil Segev, Ido Shahaf
Published in: Theory of Cryptography Conference (TCC 2017), 2017, Page(s) 631-661
DOI: 10.1007/978-3-319-70503-3_21

Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier?

Author(s): Lior Rotem, Gil Segev
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I, Issue 11239, 2018, Page(s) 421-447
DOI: 10.1007/978-3-030-03807-6_16

The Security of Lazy Users in Out-of-Band Authentication

Author(s): Moni Naor, Lior Rotem, Gil Segev
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 575-599
DOI: 10.1007/978-3-030-03810-6_21

Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound

Author(s): Gil Segev, Ido Shahaf
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 177-191
DOI: 10.1007/978-3-030-03810-6_7