Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Avishay Yanai"'
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031334900
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a61fc5757252b36e258b06c8463e9bb5
https://doi.org/10.1007/978-3-031-33491-7_23
https://doi.org/10.1007/978-3-031-33491-7_23
Publikováno v:
Journal of Cryptology. 35
Publikováno v:
CCS
We address the problem of multiparty private set intersection against a malicious adversary. First, we show that when one can assume no collusion amongst corrupted parties then there exists an extremely efficient protocol given only symmetric-key pri
Publikováno v:
CCS
Dery et al. recently proposed a secure voting protocol for score-based elections, where independent talliers perform the tallying procedure. The protocol offers perfect ballot secrecy: it outputs the identity of the winner(s), but keeps all other inf
Autor:
Avishay Yanai, Carmit Hazay
Publikováno v:
Journal of Cryptology. 32:1144-1199
The random-access memory model of computation allows program constant-time memory lookup and is more applicable in practice today, covering many important algorithms. This is in contrast to the classic setting of secure 2-party computation (2PC) that
Publikováno v:
Theory of Cryptography ISBN: 9783030904524
TCC (2)
TCC (2)
Secure computation enables n mutually distrustful parties to compute a function over their private inputs jointly. In 1988 Ben-Or, Goldwasser, and Wigderson (BGW) demonstrated that any function can be computed with perfect security in the presence of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8bdbbae705eac2b5c4250f02baf4c0ea
https://doi.org/10.1007/978-3-030-90453-1_3
https://doi.org/10.1007/978-3-030-90453-1_3
Publikováno v:
CCS
Anonymous Committed Broadcast is a functionality that extends DC-nets and allows a set of clients to privately commit messages to set of servers, which can then simultaneously open all committed messages in a random ordering. Anonymity holds since no
Publikováno v:
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457235
EUROCRYPT (2)
EUROCRYPT (2)
We present a 2-party private set intersection (PSI) protocol which provides security against malicious participants, yet is almost as fast as the fastest known semi-honest PSI protocol of Kolesnikov et al. (CCS 2016).
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ed8229901d0773e1be67e981369fc174
https://doi.org/10.1007/978-3-030-45724-2_25
https://doi.org/10.1007/978-3-030-45724-2_25
Publikováno v:
Artificial Intelligence. 297:103501
In recent years, several studies proposed privacy-preserving algorithms for solving Distributed Constraint Optimization Problems (DCOPs). Those studies were based on existing DCOP solving algorithms, which they strengthened by implementing cryptograp
Publikováno v:
IJCAI
In recent years, several studies proposed privacy-preserving algorithms for solving Distributed Constraint Optimization Problems (DCOPs). All of those studies assumed that agents do not collude. In this study we propose the first privacy-preserving D