Publications Book chapters (7) Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions Author(s): Lior Rotem, Gil Segev Published in: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III, Issue 12552, 2020, Page(s) 366-389, ISBN 978-3-030-64380-5 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-64381-2_13 Generically Speeding-Up Repeated Squaring Is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions Author(s): Lior Rotem, Gil Segev Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III, Issue 12172, 2020, Page(s) 481-509, ISBN 978-3-030-56876-4 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-56877-1_17 Accumulators in (and Beyond) Generic Groups: Non-trivial Batch Verification Requires Interaction Author(s): Gili Schul-Ganz, Gil Segev Published in: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part II, Issue 12551, 2020, Page(s) 77-107, ISBN 978-3-030-64377-5 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-64378-2_4 Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier? Author(s): Lior Rotem, Gil Segev Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I, Issue 11239, 2018, Page(s) 421-447, ISBN 978-3-030-03806-9 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-03807-6_16 The Security of Lazy Users in Out-of-Band Authentication Author(s): Moni Naor, Lior Rotem, Gil Segev Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 575-599, ISBN 978-3-030-03809-0 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-03810-6_21 Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound Author(s): Gil Segev, Ido Shahaf Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 177-191, ISBN 978-3-030-03809-0 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-03810-6_7 Generic-Group Delay Functions Require Hidden-Order Groups Author(s): Lior Rotem, Gil Segev, Ido Shahaf Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 155-180, ISBN 978-3-030-45726-6 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-45727-3_6 Conference proceedings (15) Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Σ-Protocols Author(s): Lior Rotem, Gil Segev Published in: Advances in Cryptology – CRYPTO 2021, 2021, Page(s) 222-250 Publisher: Springer DOI: 10.1007/978-3-030-84242-0_9 Crypto-Oriented Neural Architecture Design Author(s): Avital Shafran, Gil Segev, Shmuel Peleg, Yedid Hoshen Published in: ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2021, Page(s) 2680-2684, ISBN 978-1-7281-7605-5 Publisher: IEEE DOI: 10.1109/icassp39728.2021.9413592 A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff Author(s): Lior Rotem, Gil Segev Published in: 3rd Conference on Information-Theoretic Cryptography (ITC 2022), 2022, Page(s) 12:1--12:16, ISBN 978-3-95977-238-9 Publisher: "Schloss Dagstuhl -- Leibniz-Zentrum f{\""u}r Informatik" DOI: 10.4230/lipics.itc.2022.12 Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective Author(s): Gil Segev, Ido Shahaf Published in: 1st Conference on Information-Theoretic Cryptography (ITC 2020), 2020, Page(s) 10:1--10:23, ISBN 978-3-95977-151-1 Publisher: "Schloss Dagstuhl--Leibniz-Zentrum f{\""u}r Informatik" DOI: 10.4230/lipics.itc.2020.10 Generic-Group Identity-Based Encryption: A Tight Impossibility Result Author(s): Gili Schul-Ganz, Gil Segev Published in: 2nd Conference on Information-Theoretic Cryptography (ITC 2021), 2021, Page(s) 26:1--26:23, ISBN 978-3-95977-197-9 Publisher: "Schloss Dagstuhl -- Leibniz-Zentrum f{\""u}r Informatik" DOI: 10.4230/lipics.itc.2021.26 An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption Author(s): Ido Shahaf, Or Ordentlich, Gil Segev Published in: 2020 IEEE International Symposium on Information Theory (ISIT), 2020, Page(s) 858-863, ISBN 978-1-7281-6432-8 Publisher: IEEE DOI: 10.1109/isit44484.2020.9174331 Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal Author(s): Lior Rotem, Gil Segev Published in: Advances in Cryptology – CRYPTO 2018, 2018, Page(s) 63-89 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-96884-1_3 Tight Tradeoffs in Searchable Symmetric Encryption Author(s): Gilad Asharov, Gil Segev, Ido Shahaf Published in: Advances in Cryptology -- CRYPTO 2018, 2018, Page(s) 407-436 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-96884-1_14 Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions Author(s): Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan Published in: Advances in Cryptology -- EUROCRYPT 2018, 2018, Page(s) 535-564 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-78381-9_20 Securing Abe's Mix-Net Against Malicious Verifiers via Witness Indistinguishability Author(s): Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev Published in: Security and Cryptography for Networks - 11th International Conference, SCN 2018, 2018, Page(s) 274-291 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-98113-0_15 From Minicrypt to Obfustopia via Private-Key Functional Encryption Author(s): Ilan Komargodski, Gil Segev Published in: Advances in Cryptology - EUROCRYPT 2017, 2017, Page(s) 122-151 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-56620-7_5 Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Author(s): Alon Rosen, Gil Segev, Ido Shahaf Published in: Theory of Cryptography Conference (TCC 2017), 2017, Page(s) 747-776 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-70503-3_25 Strengthening the Security of Encrypted Databases: Non-Transitive JOINs Author(s): Ilya Mironov, Gil Segev, Ido Shahaf Published in: Theory of Cryptography Conference (TCC 2017), 2017, Page(s) 631-661 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-70503-3_21 Non-Malleable Vector Commitments via Local Equivocability Author(s): Lior Rotem, Gil Segev Published in: Theory of Cryptography Conference (TCC 2021), 2021, Page(s) 415--446 Publisher: Springer DOI: 10.1007/978-3-030-90456-2_14 Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery Author(s): Moni Naor, Lior Rotem, Gil Segev Published in: 1st Conference on Information-Theoretic Cryptography (ITC 2020), 2020, Page(s) 9:1--9:25, ISBN 978-3-95977-151-1 Publisher: "Schloss Dagstuhl--Leibniz-Zentrum f{\""u}r Informatik" DOI: 10.4230/lipics.itc.2020.9 Peer reviewed articles (8) Tight Tradeoffs in Searchable Symmetric Encryption Author(s): Gilad Asharov, Gil Segev, Ido Shahaf Published in: Journal of Cryptology, Issue 34/2, 2021, ISSN 0933-2790 Publisher: Springer Verlag DOI: 10.1007/s00145-020-09370-z Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions Author(s): Zvika Brakerski, Ilan Komargodski, Gil Segev Published in: Journal of Cryptology, Issue 31/2, 2018, Page(s) 434-520, ISSN 0933-2790 Publisher: Springer Verlag DOI: 10.1007/s00145-017-9261-0 On Constructing One-Way Permutations from Indistinguishability Obfuscation Author(s): Gilad Asharov, Gil Segev Published in: Journal of Cryptology, Issue 31/3, 2018, Page(s) 698-736, ISSN 0933-2790 Publisher: Springer Verlag DOI: 10.1007/s00145-017-9268-6 Function-Private Functional Encryption in the Private-Key Setting Author(s): Zvika Brakerski, Gil Segev Published in: Journal of Cryptology, Issue 31/1, 2018, Page(s) 202-225, ISSN 0933-2790 Publisher: Springer Verlag DOI: 10.1007/s00145-017-9255-y Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions Author(s): Ananth Raghunathan, Gil Segev, Salil Vadhan Published in: Journal of Cryptology, Issue 31/4, 2018, Page(s) 1012-1063, ISSN 0933-2790 Publisher: Springer Verlag DOI: 10.1007/s00145-018-9287-y Privacy-Preserving Interdomain Routing at Internet Scale Author(s): Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner Published in: Proceedings on Privacy Enhancing Technologies, Issue 2017/3, 2017, Page(s) 147-167, ISSN 2299-0984 Publisher: Proceedings on Privacy Enhancing Technologies DOI: 10.1515/popets-2017-0033 From Minicrypt to Obfustopia via Private-Key Functional Encryption Author(s): Ilan Komargodski, Gil Segev Published in: Journal of Cryptology, 2020, ISSN 0933-2790 Publisher: Springer Verlag DOI: 10.1007/s00145-019-09327-x Can PPAD Hardness be Based on Standard Cryptographic Assumptions? Author(s): Alon Rosen, Gil Segev, Ido Shahaf Published in: Journal of Cryptology, Issue 34/1, 2021, ISSN 0933-2790 Publisher: Springer Verlag DOI: 10.1007/s00145-020-09369-6 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available