Zobrazeno 1 - 10
of 55
pro vyhledávání: '"Niv Gilboa"'
Autor:
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031305443
The computational overhead of a cryptographic task is the asymptotic ratio between the computational cost of securely realizing the task and that of realizing the task with no security at all. Ishai, Kushilevitz, Ostrovsky, and Sahai (STOC 2008) show
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3531b0910c2b242b4d717c346c62ba13
https://ir.cwi.nl/pub/33193
https://ir.cwi.nl/pub/33193
Autor:
Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Lisa Kohl, Nicolas Resch, Peter Scholl
Publikováno v:
Boyle, E, Couteau, G, Gilboa, N, Ishai, Y, Kohl, L, Resch, N & Scholl, P 2022, Correlated Pseudorandomness from Expand-Accumulate Codes . in Y Dodis & T Shrimpton (eds), Advances in Cryptology – CRYPTO 2022-42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings . Springer, Lecture Notes in Computer Science, vol. 13508, pp. 603-633, 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, United States, 15/08/2022 . https://doi.org/10.1007/978-3-031-15979-4_21
Advances in Cryptology – CRYPTO 2022 ISBN: 9783031159787
Advances in Cryptology – CRYPTO 2022 ISBN: 9783031159787
A pseudorandom correlation generator (PCG) is a recent tool for securely generating useful sources of correlated randomness, such as random oblivious transfers (OT) and vector oblivious linear evaluations (VOLE), with low communication cost. We intro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6a7de97968a38eaef294257a514e5303
https://pure.au.dk/portal/da/publications/correlatedpseudorandomnessfrom-expandaccumulate-codes(5cf6ba71-c9cc-4652-94a9-5ff08ba4ac82).html
https://pure.au.dk/portal/da/publications/correlatedpseudorandomnessfrom-expandaccumulate-codes(5cf6ba71-c9cc-4652-94a9-5ff08ba4ac82).html
Autor:
Oren Shvartzman, Adar Ovadya, Kfir Zvi, Omer Shwartz, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren
Publikováno v:
Computers & Security. 127:103125
Publikováno v:
Advances in Cryptology – CRYPTO 2022 ISBN: 9783031159848
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::81070c86beaec6a1e37fb0cbb533bc15
https://doi.org/10.1007/978-3-031-15985-5_5
https://doi.org/10.1007/978-3-031-15985-5_5
Publikováno v:
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031069437
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6bf13a108fc2b265e97f92a4fa959a0c
https://doi.org/10.1007/978-3-031-06944-4_15
https://doi.org/10.1007/978-3-031-06944-4_15
Publikováno v:
CRYPTO 2021-Annual International Cryptology Conference
CRYPTO 2021-Annual International Cryptology Conference, Aug 2021, Santa Barbara, United States. pp.487-516, ⟨10.1007/978-3-030-84259-8_17⟩
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842581
CRYPTO (4)
CRYPTO 2021-Annual International Cryptology Conference, Aug 2021, Santa Barbara, United States. pp.487-516, ⟨10.1007/978-3-030-84259-8_17⟩
Advances in Cryptology – CRYPTO 2021 ISBN: 9783030842581
CRYPTO (4)
A weak pseudorandom function (WPRF) is a keyed function \(f_k:\{0,1\}^n\rightarrow \{0,1\}\) such that, for a random key k, a collection of samples \((x, f_k(x))\), for uniformly random inputs x, cannot be efficiently distinguished from totally rando
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::bc41a026174f66a99b5b79e32894dd22
https://hal.archives-ouvertes.fr/hal-03374521
https://hal.archives-ouvertes.fr/hal-03374521
Publikováno v:
Theoretical Computer Science. 795:81-99
Information theoretically secure multi-party computation implies severe communication overhead among the computing participants, as there is a need to reduce the polynomial degree after each multiplication. In particular, when the input is (practical
Autor:
Vladimir Kolesnikov, Niv Gilboa, Muni Venkateswarlu Kumaramangalam, Juan A. Garay, Shlomi Dolev
Publikováno v:
Theoretical Computer Science. 769:43-62
Consider a user who needs to perform computation over an initially unbounded stream of input. The user would like to compute functions of the input that change dynamically due to external events. The focus of this work is outsourcing such computation
Publikováno v:
Theory of Cryptography ISBN: 9783030904524
TCC (2)
TCC (2)
Secure multiparty computation (MPC) enables n parties, of which up to t may be corrupted, to perform joint computations on their private inputs while revealing only the outputs. Optimizing the asymptotic and concrete costs of MPC protocols has become
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d5a7999df90a076955d5d2154252ebbc
https://doi.org/10.1007/978-3-030-90453-1_5
https://doi.org/10.1007/978-3-030-90453-1_5
Autor:
Nishant Kumar, Divya Gupta, Nishanth Chandran, Yuval Ishai, Mayank Rathee, Elette Boyle, Niv Gilboa
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030778859
EUROCRYPT (2)
EUROCRYPT (2)
Boyle et al. (TCC 2019) proposed a new approach for secure computation in the preprocessing model building on function secret sharing (FSS), where a gate g is evaluated using an FSS scheme for the related offset family \(g_r(x)=g(x+r)\). They further
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1e5fb1386b4a1094e49e92428f9a827d
https://doi.org/10.1007/978-3-030-77886-6_30
https://doi.org/10.1007/978-3-030-77886-6_30