Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

New Techniques for Secure Computation

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Publications

Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications (opens in new window)

Author(s): Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 699-729, ISBN 978-3-030-03809-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-03810-6_25

Best Possible Information-Theoretic MPC (opens in new window)

Author(s): Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part II, Issue 11240, 2018, Page(s) 255-281, ISBN 978-3-030-03809-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-03810-6_10

Two-Round MPC: Information-Theoretic and Black-Box (opens in new window)

Author(s): Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
Published in: Theory of Cryptography - 16th International Conference, TCC 2018, Panaji, India, November 11–14, 2018, Proceedings, Part I, Issue 11239, 2018, Page(s) 123-151, ISBN 978-3-030-03806-9
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-03807-6_5

Private Circuits: A Modular Approach (opens in new window)

Author(s): Prabhanjan Ananth, Yuval Ishai, Amit Sahai
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 427-455, ISBN 978-3-319-96877-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-96878-0_15

Unconditionally Secure Computation Against Low-Complexity Leakage (opens in new window)

Author(s): Andrej Bogdanov, Yuval Ishai, Akshayaram Srinivasan
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part II, Issue 11693, 2019, Page(s) 387-416, ISBN 978-3-030-26950-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-26951-7_14

Limits of Practical Sublinear Secure Computation (opens in new window)

Author(s): Elette Boyle, Yuval Ishai, Antigoni Polychroniadou
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III, Issue 10993, 2018, Page(s) 302-332, ISBN 978-3-319-96877-3
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-96878-0_11

On Fully Secure MPC with Solitary Output (opens in new window)

Author(s): Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Nikolaos Makriyannis, Tal Rabin
Published in: Theory of Cryptography - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I, Issue 11891, 2019, Page(s) 312-340, ISBN 978-3-030-36029-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-36030-6_13

Reusable Non-Interactive Secure Computation (opens in new window)

Author(s): Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 462-488, ISBN 978-3-030-26953-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-26954-8_15

Cryptographic Sensing (opens in new window)

Author(s): Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 583-604, ISBN 978-3-030-26953-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-26954-8_19

On the Message Complexity of Secure Multiparty Computation (opens in new window)

Author(s): Yuval Ishai, Manika Mittal, Rafail Ostrovsky
Published in: Public-Key Cryptography – PKC 2018, Issue 10769, 2018, Page(s) 698-711, ISBN 978-3-319-76577-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-76578-5_24

Trapdoor Hash Functions and Their Applications (opens in new window)

Author(s): Nico Döttling, Sanjam Garg, Yuval Ishai, Giulio Malavolta, Tamer Mour, Rafail Ostrovsky
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 3-32, ISBN 978-3-030-26953-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-26954-8_1

Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs (opens in new window)

Author(s): Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
Published in: Advances in Cryptology – EUROCRYPT 2018, Issue 10822, 2018, Page(s) 222-255, ISBN 978-3-319-78371-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-78372-7_8

On the Local Leakage Resilience of Linear Secret Sharing Schemes (opens in new window)

Author(s): Fabrice Benhamouda, Akshay Degwekar, Yuval Ishai, Tal Rabin
Published in: Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I, Issue 10991, 2018, Page(s) 531-561, ISBN 978-3-319-96883-4
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-96884-1_18

Efficient Pseudorandom Correlation Generators: Silent OT Extension and More (opens in new window)

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Scholl
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 489-518, ISBN 978-3-030-26953-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-26954-8_16

Secure Computation with Preprocessing via Function Secret Sharing (opens in new window)

Author(s): Elette Boyle, Niv Gilboa, Yuval Ishai
Published in: Theory of Cryptography - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019, Proceedings, Part I, Issue 11891, 2019, Page(s) 341-371, ISBN 978-3-030-36029-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-36030-6_14

Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs (opens in new window)

Author(s): Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai
Published in: Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings, Part III, Issue 11694, 2019, Page(s) 67-97, ISBN 978-3-030-26953-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-26954-8_3

On the Complexity of Decomposable Randomized Encodings, Or: How Friendly Can a Garbling-Friendly {PRF} Be? (opens in new window)

Author(s): Marshall Ball, Justin Holmgren, Yuval Ishai, Tianren Liu, Tal Malkin
Published in: nnovations in Theoretical Computer Science Conference, ITCS 2020, Issue 11, 2020, Page(s) 86:1--86:22
Publisher: "Schloss Dagstuhl - Leibniz-Zentrum f{\""{u}}r Informatik"
DOI: 10.4230/lipics.itcs.2020.86

Compressing Vector OLE (opens in new window)

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai
Published in: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018, Page(s) 896-912, ISBN 9781-450356930
Publisher: ACM
DOI: 10.1145/3243734.3243868

Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs (opens in new window)

Author(s): Elette Boyle, Niv Gilboa, Yuval Ishai, Ariel Nof
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 869-886, ISBN 9781-450367479
Publisher: ACM
DOI: 10.1145/3319535.3363227

Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation (opens in new window)

Author(s): Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Peter Rindal, Peter Scholl
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 291-308, ISBN 9781-450367479
Publisher: ACM
DOI: 10.1145/3319535.3354255

Foundations of Homomorphic Secret Sharing (opens in new window)

Author(s): Elette Boyle, Niv Gilboa, Yuval Ishai, Huijia Lin, Stefano Tessaro
Published in: Innovations in Theoretical Computer Science Conference, ITCS 2018, Issue 9, 2018, Page(s) 21:1--21:21
Publisher: "Schloss Dagstuhl - Leibniz-Zentrum f{\""{u}}r Informatik"
DOI: 10.4230/lipics.itcs.2018.21

Affine Determinant Programs: {A} Framework for Obfuscation and Witness Encryption (opens in new window)

Author(s): James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry
Published in: Innovations in Theoretical Computer Science Conference, ITCS 2020, Issue 11, 2020, Page(s) 82:1--82:39
Publisher: "Schloss Dagstuhl - Leibniz-Zentrum f{\""{u}}r Informatik"
DOI: 10.4230/lipics.itcs.2020.82

Separating Two-Round Secure Computation From Oblivious Transfer (opens in new window)

Author(s): Benny Applebaum, Zvika Brakerski, Sanjam Garg, Yuval Ishai, Akshayaram Srinivasan
Published in: Innovations in Theoretical Computer Science Conference, ITCS 2020, Issue 11, 2020, Page(s) 71:1--71:18
Publisher: "Schloss Dagstuhl - Leibniz-Zentrum f{\""{u}}r Informatik"
DOI: 10.4230/lipics.itcs.2020.71

LevioSA - Lightweight Secure Arithmetic Computation (opens in new window)

Author(s): Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam
Published in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, Page(s) 327-344, ISBN 9781-450367479
Publisher: ACM
DOI: 10.1145/3319535.3354258

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0