Skip to main content

New Techniques for Secure Computation

Searching for OpenAIRE data...

Publications

Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications

Author(s): Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 699-729
DOI: 10.1007/978-3-030-03810-6_25

Best Possible Information-Theoretic MPC

Author(s): Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 255-281
DOI: 10.1007/978-3-030-03810-6_10

Two-Round MPC: Information-Theoretic and Black-Box

Author(s): Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I, Issue 11239, 2018, Page(s) 123-151
DOI: 10.1007/978-3-030-03807-6_5

Private Circuits: A Modular Approach

Author(s): Prabhanjan Ananth, Yuval Ishai, Amit Sahai
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 427-455
DOI: 10.1007/978-3-319-96878-0_15

Unconditionally Secure Computation Against Low-Complexity Leakage

Author(s): Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part II, Issue 11693, 2019, Page(s) 387-416
DOI: 10.1007/978-3-030-26951-7_14

Limits of Practical Sublinear Secure Computation

Author(s): Elette Boyle, Yuval Ishai, Antigoni Polychroniadou
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 302-332
DOI: 10.1007/978-3-319-96878-0_11

On Fully Secure MPC with Solitary Output

Author(s): Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin
Published in: Theory of Cryptography - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I, Issue 11891, 2019, Page(s) 312-340
DOI: 10.1007/978-3-030-36030-6_13

Reusable Non-Interactive Secure Computation

Author(s): Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 462-488
DOI: 10.1007/978-3-030-26954-8_15

Cryptographic Sensing

Author(s): Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 583-604
DOI: 10.1007/978-3-030-26954-8_19

On the Message Complexity of Secure Multiparty Computation

Author(s): Yuval Ishai, Manika Mittal, Rafail Ostrovsky
Published in: Public-Key Cryptography – PKC 2018, Issue 10769, 2018, Page(s) 698-711
DOI: 10.1007/978-3-319-76578-5_24

Trapdoor Hash Functions and Their Applications

Author(s): Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 3-32
DOI: 10.1007/978-3-030-26954-8_1

Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs

Author(s): Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10822, 2018, Page(s) 222-255
DOI: 10.1007/978-3-319-78372-7_8

On the Local Leakage Resilience of Linear Secret Sharing Schemes

Author(s): Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 531-561
DOI: 10.1007/978-3-319-96884-1_18

Efficient Pseudorandom Correlation Generators: Silent OT Extension and More

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 489-518
DOI: 10.1007/978-3-030-26954-8_16

Secure Computation with Preprocessing via Function Secret Sharing

Author(s): Elette Boyle, Niv Gilboa, Yuval Ishai
Published in: Theory of Cryptography - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I, Issue 11891, 2019, Page(s) 341-371
DOI: 10.1007/978-3-030-36030-6_14

Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs

Author(s): Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 67-97
DOI: 10.1007/978-3-030-26954-8_3

On the Complexity of Decomposable Randomized Encodings, Or: How Friendly Can a Garbling-Friendly {PRF} Be?

Author(s): Marshall Ball, Justin Holmgren, Yuval Ishai, Tianren Liu, Tal Malkin
Published in: nnovations in Theoretical Computer Science Conference, ITCS 2020, Issue 11, 2020, Page(s) 86:1--86:22
DOI: 10.4230/lipics.itcs.2020.86

Compressing Vector OLE

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, Page(s) 896-912
DOI: 10.1145/3243734.3243868

Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs

Author(s): Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 869-886
DOI: 10.1145/3319535.3363227

Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 291-308
DOI: 10.1145/3319535.3354255

Foundations of Homomorphic Secret Sharing

Author(s): Elette Boyle, Niv Gilboa, Yuval Ishai, Huijia Lin, Stefano Tessaro
Published in: Innovations in Theoretical Computer Science Conference, ITCS 2018, Issue 9, 2018, Page(s) 21:1--21:21
DOI: 10.4230/lipics.itcs.2018.21

Affine Determinant Programs: {A} Framework for Obfuscation and Witness Encryption

Author(s): James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry
Published in: Innovations in Theoretical Computer Science Conference, ITCS 2020, Issue 11, 2020, Page(s) 82:1--82:39
DOI: 10.4230/lipics.itcs.2020.82

Separating Two-Round Secure Computation From Oblivious Transfer

Author(s): Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
Published in: Innovations in Theoretical Computer Science Conference, ITCS 2020, Issue 11, 2020, Page(s) 71:1--71:18
DOI: 10.4230/lipics.itcs.2020.71

LevioSA - Lightweight Secure Arithmetic Computation

Author(s): Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 327-344
DOI: 10.1145/3319535.3354258