Skip to main content
European Commission logo print header

Foundations and Applications of Functional Cryptography

Publications

Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions

Author(s): Lior Rotem, Gil Segev
Published in: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III, Issue 12552, 2020, Page(s) 366-389, ISBN 978-3-030-64380-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64381-2_13

Generically Speeding-Up Repeated Squaring Is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions

Author(s): Lior Rotem, Gil Segev
Published in: Advances in Cryptology – CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020, Proceedings, Part III, Issue 12172, 2020, Page(s) 481-509, ISBN 978-3-030-56876-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-56877-1_17

Accumulators in (and Beyond) Generic Groups: Non-trivial Batch Verification Requires Interaction

Author(s): Gili Schul-Ganz, Gil Segev
Published in: Theory of Cryptography - 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part II, Issue 12551, 2020, Page(s) 77-107, ISBN 978-3-030-64377-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64378-2_4

Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier?

Author(s): Lior Rotem, Gil Segev
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I, Issue 11239, 2018, Page(s) 421-447, ISBN 978-3-030-03806-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-03807-6_16

The Security of Lazy Users in Out-of-Band Authentication

Author(s): Moni Naor, Lior Rotem, Gil Segev
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 575-599, ISBN 978-3-030-03809-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-03810-6_21

Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound

Author(s): Gil Segev, Ido Shahaf
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 177-191, ISBN 978-3-030-03809-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-03810-6_7

Generic-Group Delay Functions Require Hidden-Order Groups

Author(s): Lior Rotem, Gil Segev, Ido Shahaf
Published in: Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10–14, 2020, Proceedings, Part III, Issue 12107, 2020, Page(s) 155-180, ISBN 978-3-030-45726-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-45727-3_6

Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for Σ-Protocols

Author(s): Lior Rotem, Gil Segev
Published in: Advances in Cryptology – CRYPTO 2021, 2021, Page(s) 222-250
Publisher: Springer
DOI: 10.1007/978-3-030-84242-0_9

Crypto-Oriented Neural Architecture Design

Author(s): Avital Shafran, Gil Segev, Shmuel Peleg, Yedid Hoshen
Published in: ICASSP 2021 - 2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2021, Page(s) 2680-2684, ISBN 978-1-7281-7605-5
Publisher: IEEE
DOI: 10.1109/icassp39728.2021.9413592

A Fully-Constructive Discrete-Logarithm Preprocessing Algorithm with an Optimal Time-Space Tradeoff

Author(s): Lior Rotem, Gil Segev
Published in: 3rd Conference on Information-Theoretic Cryptography (ITC 2022), 2022, Page(s) 12:1--12:16, ISBN 978-3-95977-238-9
Publisher: "Schloss Dagstuhl -- Leibniz-Zentrum f{\""u}r Informatik"
DOI: 10.4230/lipics.itc.2022.12

Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective

Author(s): Gil Segev, Ido Shahaf
Published in: 1st Conference on Information-Theoretic Cryptography (ITC 2020), 2020, Page(s) 10:1--10:23, ISBN 978-3-95977-151-1
Publisher: "Schloss Dagstuhl--Leibniz-Zentrum f{\""u}r Informatik"
DOI: 10.4230/lipics.itc.2020.10

Generic-Group Identity-Based Encryption: A Tight Impossibility Result

Author(s): Gili Schul-Ganz, Gil Segev
Published in: 2nd Conference on Information-Theoretic Cryptography (ITC 2021), 2021, Page(s) 26:1--26:23, ISBN 978-3-95977-197-9
Publisher: "Schloss Dagstuhl -- Leibniz-Zentrum f{\""u}r Informatik"
DOI: 10.4230/lipics.itc.2021.26

An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption

Author(s): Ido Shahaf, Or Ordentlich, Gil Segev
Published in: 2020 IEEE International Symposium on Information Theory (ISIT), 2020, Page(s) 858-863, ISBN 978-1-7281-6432-8
Publisher: IEEE
DOI: 10.1109/isit44484.2020.9174331

Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal

Author(s): Lior Rotem, Gil Segev
Published in: Advances in Cryptology – CRYPTO 2018, 2018, Page(s) 63-89
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-96884-1_3

Tight Tradeoffs in Searchable Symmetric Encryption

Author(s): Gilad Asharov, Gil Segev, Ido Shahaf
Published in: Advances in Cryptology -- CRYPTO 2018, 2018, Page(s) 407-436
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-96884-1_14

Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions

Author(s): Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan
Published in: Advances in Cryptology -- EUROCRYPT 2018, 2018, Page(s) 535-564
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-78381-9_20

Securing Abe's Mix-Net Against Malicious Verifiers via Witness Indistinguishability

Author(s): Elette Boyle, Saleet Klein, Alon Rosen, Gil Segev
Published in: Security and Cryptography for Networks - 11th International Conference, SCN 2018, 2018, Page(s) 274-291
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-98113-0_15

From Minicrypt to Obfustopia via Private-Key Functional Encryption

Author(s): Ilan Komargodski, Gil Segev
Published in: Advances in Cryptology - EUROCRYPT 2017, 2017, Page(s) 122-151
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-56620-7_5

Can PPAD Hardness be Based on Standard Cryptographic Assumptions?

Author(s): Alon Rosen, Gil Segev, Ido Shahaf
Published in: Theory of Cryptography Conference (TCC 2017), 2017, Page(s) 747-776
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-70503-3_25

Strengthening the Security of Encrypted Databases: Non-Transitive JOINs

Author(s): Ilya Mironov, Gil Segev, Ido Shahaf
Published in: Theory of Cryptography Conference (TCC 2017), 2017, Page(s) 631-661
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-70503-3_21

Non-Malleable Vector Commitments via Local Equivocability

Author(s): Lior Rotem, Gil Segev
Published in: Theory of Cryptography Conference (TCC 2021), 2021, Page(s) 415--446
Publisher: Springer
DOI: 10.1007/978-3-030-90456-2_14

Out-Of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery

Author(s): Moni Naor, Lior Rotem, Gil Segev
Published in: 1st Conference on Information-Theoretic Cryptography (ITC 2020), 2020, Page(s) 9:1--9:25, ISBN 978-3-95977-151-1
Publisher: "Schloss Dagstuhl--Leibniz-Zentrum f{\""u}r Informatik"
DOI: 10.4230/lipics.itc.2020.9

Tight Tradeoffs in Searchable Symmetric Encryption

Author(s): Gilad Asharov, Gil Segev, Ido Shahaf
Published in: Journal of Cryptology, Issue 34/2, 2021, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-020-09370-z

Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions

Author(s): Zvika Brakerski, Ilan Komargodski, Gil Segev
Published in: Journal of Cryptology, Issue 31/2, 2018, Page(s) 434-520, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-017-9261-0

On Constructing One-Way Permutations from Indistinguishability Obfuscation

Author(s): Gilad Asharov, Gil Segev
Published in: Journal of Cryptology, Issue 31/3, 2018, Page(s) 698-736, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-017-9268-6

Function-Private Functional Encryption in the Private-Key Setting

Author(s): Zvika Brakerski, Gil Segev
Published in: Journal of Cryptology, Issue 31/1, 2018, Page(s) 202-225, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-017-9255-y

Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions

Author(s): Ananth Raghunathan, Gil Segev, Salil Vadhan
Published in: Journal of Cryptology, Issue 31/4, 2018, Page(s) 1012-1063, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-018-9287-y

Privacy-Preserving Interdomain Routing at Internet Scale

Author(s): Gilad Asharov, Daniel Demmler, Michael Schapira, Thomas Schneider, Gil Segev, Scott Shenker, Michael Zohner
Published in: Proceedings on Privacy Enhancing Technologies, Issue 2017/3, 2017, Page(s) 147-167, ISSN 2299-0984
Publisher: Proceedings on Privacy Enhancing Technologies
DOI: 10.1515/popets-2017-0033

From Minicrypt to Obfustopia via Private-Key Functional Encryption

Author(s): Ilan Komargodski, Gil Segev
Published in: Journal of Cryptology, 2020, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-019-09327-x

Can PPAD Hardness be Based on Standard Cryptographic Assumptions?

Author(s): Alon Rosen, Gil Segev, Ido Shahaf
Published in: Journal of Cryptology, Issue 34/1, 2021, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-020-09369-6

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available