Chandran, Nishanth; Chongchitmate, Wutichai; Garay, Juan A.; Goldwasser, Shafi; Ostrovsky, Rafail; Zikas, Vassilis The hidden graph model: communication locality and optimal resiliency with adaptive faults. (English) Zbl 1365.68255 Proceedings of the 6th conference on innovations in theoretical computer science, ITCS’15, Rehovot, Israel, January 11–13, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3333-7). 153-162 (2015). MSC: 68Q05 68M12 68Q10 68R10 94A60 PDFBibTeX XMLCite \textit{N. Chandran} et al., in: Proceedings of the 6th conference on innovations in theoretical computer science, ITCS'15, Rehovot, Israel, January 11--13, 2015. New York, NY: Association for Computing Machinery (ACM). 153--162 (2015; Zbl 1365.68255) Full Text: DOI
Franklin, Matthew; Gelles, Ran; Ostrovsky, Rafail; Schulman, Leonard J. Optimal coding for streaming authentication and interactive communication. (English) Zbl 1359.94643 IEEE Trans. Inf. Theory 61, No. 1, 133-145 (2015). MSC: 94A62 94A29 94A60 PDFBibTeX XMLCite \textit{M. Franklin} et al., IEEE Trans. Inf. Theory 61, No. 1, 133--145 (2015; Zbl 1359.94643) Full Text: DOI
Baron, Joshua; Defrawy, Karim El; Lampkins, Joshua; Ostrovsky, Rafail Communication-optimal proactive secret sharing for dynamic groups. (English) Zbl 1459.94157 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 23-41 (2015). MSC: 94A62 68Q10 PDFBibTeX XMLCite \textit{J. Baron} et al., Lect. Notes Comput. Sci. 9092, 23--41 (2015; Zbl 1459.94157) Full Text: DOI
Chandran, Nishanth; Garay, Juan A.; Ostrovsky, Rafail Almost-everywhere secure computation with edge corruptions. (English) Zbl 1332.94062 J. Cryptology 28, No. 4, 745-768 (2015). MSC: 94A60 68P25 68M15 PDFBibTeX XMLCite \textit{N. Chandran} et al., J. Cryptology 28, No. 4, 745--768 (2015; Zbl 1332.94062) Full Text: DOI
Alwen, Joël; Ostrovsky, Rafail; Zhou, Hong-Sheng; Zikas, Vassilis Incoercible multi-party computation and universally composable receipt-free voting. (English) Zbl 1352.94024 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 763-780 (2015). MSC: 94A60 68P25 68M12 PDFBibTeX XMLCite \textit{J. Alwen} et al., Lect. Notes Comput. Sci. 9216, 763--780 (2015; Zbl 1352.94024) Full Text: DOI
Ostrovsky, Rafail; Richelson, Silas; Scafuro, Alessandra Round-optimal black-box two-party computation. (English) Zbl 1352.94056 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 339-358 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 9216, 339--358 (2015; Zbl 1352.94056) Full Text: DOI
Garg, Sanjam; Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit Cryptography with one-way communication. (English) Zbl 1351.94046 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 191-208 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 9216, 191--208 (2015; Zbl 1351.94046) Full Text: DOI
Ostrovsky, Rafail; Persiano, Giuseppe; Visconti, Ivan Impossibility of black-box simulation against leakage attacks. (English) Zbl 1336.94068 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 130-149 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 9216, 130--149 (2015; Zbl 1336.94068) Full Text: DOI
Chase, Melissa; Ostrovsky, Rafail; Visconti, Ivan Executable proofs, input-size hiding secure computation and a new ideal world. (English) Zbl 1403.94047 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 532-560 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Chase} et al., Lect. Notes Comput. Sci. 9057, 532--560 (2015; Zbl 1403.94047) Full Text: DOI
Braverman, Vladimir; Ostrovsky, Rafail; Vorsanger, Gregory Weighted sampling without replacement from data streams. (English) Zbl 1338.68295 Inf. Process. Lett. 115, No. 12, 923-926 (2015). MSC: 68W27 94A20 PDFBibTeX XMLCite \textit{V. Braverman} et al., Inf. Process. Lett. 115, No. 12, 923--926 (2015; Zbl 1338.68295) Full Text: DOI arXiv
Garg, Sanjam; Lu, Steve; Ostrovsky, Rafail; Scafuro, Alessandra Garbled RAM from one-way functions. (English) Zbl 1321.94061 Proceedings of the 47th annual ACM symposium on theory of computing, STOC ’15, Portland, OR, USA, June 14–17, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3536-2). 449-458 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., in: Proceedings of the 47th annual ACM symposium on theory of computing, STOC '15, Portland, OR, USA, June 14--17, 2015. New York, NY: Association for Computing Machinery (ACM). 449--458 (2015; Zbl 1321.94061) Full Text: DOI
Hemenway, Brett; Ostrovsky, Rafail; Rosen, Alon Non-committing encryption from \(\Phi\)-hiding. (English) Zbl 1359.94605 Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part I. Heidelberg: Springer (ISBN 978-3-662-46493-9/pbk). Lecture Notes in Computer Science 9014, 591-608 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Hemenway} et al., Lect. Notes Comput. Sci. 9014, 591--608 (2015; Zbl 1359.94605) Full Text: DOI
Ostrovsky, Rafail; Scafuro, Alessandra; Venkitasubramanian, Muthuramakrishnan Resettably sound zero-knowledge arguments from OWFs – the (semi) black-box way. (English) Zbl 1354.94042 Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part I. Heidelberg: Springer (ISBN 978-3-662-46493-9/pbk). Lecture Notes in Computer Science 9014, 345-374 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 9014, 345--374 (2015; Zbl 1354.94042) Full Text: DOI
Garay, Juan; Givens, Clint; Ostrovsky, Rafail Secure message transmission with small public discussion. (English) Zbl 1360.94309 IEEE Trans. Inf. Theory 60, No. 4, 2373-2390 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Garay} et al., IEEE Trans. Inf. Theory 60, No. 4, 2373--2390 (2014; Zbl 1360.94309) Full Text: DOI
Garay, Juan; Givens, Clint; Ostrovsky, Rafail; Raykov, Pavel Broadcast (and round) efficient verifiable secret sharing. (English) Zbl 1395.94323 Padró, Carles (ed.), Information theoretic security. 7th international conference, ICITS 2013, Singapore, November 28–30, 2013. Proceedings. Cham: Springer (ISBN 978-3-319-04267-1/pbk; 978-3-319-04268-8/ebook). Lecture Notes in Computer Science 8317, 200-219 (2014). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Garay} et al., Lect. Notes Comput. Sci. 8317, 200--219 (2014; Zbl 1395.94323) Full Text: DOI
Garay, Juan A.; Givens, Clinton; Ostrovsky, Rafail; Raykov, Pavel Fast and unconditionally secure anonymous channel. (English) Zbl 1321.94059 Proceedings of the 2014 ACM symposium on principles of distributed computing, PODC ’14, Paris, France, July 15–18, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2944-6). 313-321 (2014). MSC: 94A60 68M10 68M12 68M15 90B18 PDFBibTeX XMLCite \textit{J. A. Garay} et al., in: Proceedings of the 33rd ACM symposium on principles of distributed computing, PODC '14, Paris, France, July 15--18, 2014. New York, NY: Association for Computing Machinery (ACM). 313--321 (2014; Zbl 1321.94059) Full Text: DOI
Baron, Joshua; El Defrawy, Karim; Lampkins, Joshua; Ostrovsky, Rafail How to withstand mobile virus attacks, revisited. (English) Zbl 1321.94036 Proceedings of the 2014 ACM symposium on principles of distributed computing, PODC ’14, Paris, France, July 15–18, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2944-6). 293-302 (2014). MSC: 94A60 68M11 68M12 68M14 68Q25 68W15 94A62 PDFBibTeX XMLCite \textit{J. Baron} et al., in: Proceedings of the 33rd ACM symposium on principles of distributed computing, PODC '14, Paris, France, July 15--18, 2014. New York, NY: Association for Computing Machinery (ACM). 293--302 (2014; Zbl 1321.94036) Full Text: DOI
Chandran, Nishanth; Kanukurthi, Bhavana; Ostrovsky, Rafail; Reyzin, Leonid Privacy amplification with asymptotically optimal entropy loss. (English) Zbl 1321.94103 J. ACM 61, No. 5, Article No. 29, 28 p. (2014). MSC: 94A62 PDFBibTeX XMLCite \textit{N. Chandran} et al., J. ACM 61, No. 5, Article No. 29, 28 p. (2014; Zbl 1321.94103) Full Text: DOI
Goyal, Vipul; Ostrovsky, Rafail; Scafuro, Alessandra; Visconti, Ivan Black-box non-black-box zero knowledge. (English) Zbl 1315.94077 Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 515-524 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Goyal} et al., in: Proceedings of the 46th annual ACM symposium on theory of computing, STOC '14, New York, NY, USA, May 31 -- June 3, 2014. New York, NY: Association for Computing Machinery (ACM). 515--524 (2014; Zbl 1315.94077) Full Text: DOI
Amir, Yair; Bunn, Paul; Ostrovsky, Rafail Authenticated adversarial routing. (English) Zbl 1319.68015 J. Cryptology 27, No. 4, 636-771 (2014). MSC: 68M10 68M12 68M14 68M15 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Amir} et al., J. Cryptology 27, No. 4, 636--771 (2014; Zbl 1319.68015) Full Text: DOI arXiv
Chandran, Nishanth; Goyal, Vipul; Moriarty, Ryan; Ostrovsky, Rafail Position-based cryptography. (English) Zbl 1345.94052 SIAM J. Comput. 43, No. 4, 1291-1341 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{N. Chandran} et al., SIAM J. Comput. 43, No. 4, 1291--1341 (2014; Zbl 1345.94052) Full Text: DOI Link
Ostrovsky, Rafail; Rao, Vanishree; Visconti, Ivan On selective-opening attacks against encryption schemes. (English) Zbl 1378.94060 Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 578-597 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 8642, 578--597 (2014; Zbl 1378.94060) Full Text: DOI
Lampkins, Joshua; Ostrovsky, Rafail Communication-efficient MPC for general adversary structures. (English) Zbl 1423.68184 Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8642, 155-174 (2014). MSC: 68Q10 68M12 68P25 94A62 PDFBibTeX XMLCite \textit{J. Lampkins} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 8642, 155--174 (2014; Zbl 1423.68184) Full Text: DOI
Baron, Joshua; Ishai, Yuval; Ostrovsky, Rafail On linear-size pseudorandom generators and hardcore functions. (English) Zbl 1384.94032 Theor. Comput. Sci. 554, 50-63 (2014). MSC: 94A60 11K45 68Q17 PDFBibTeX XMLCite \textit{J. Baron} et al., Theor. Comput. Sci. 554, 50--63 (2014; Zbl 1384.94032) Full Text: DOI
Groth, Jens; Ostrovsky, Rafail Cryptography in the multi-string model. (English) Zbl 1302.94050 J. Cryptology 27, No. 3, 506-543 (2014). MSC: 94A60 68P25 68M12 68Q10 PDFBibTeX XMLCite \textit{J. Groth} and \textit{R. Ostrovsky}, J. Cryptology 27, No. 3, 506--543 (2014; Zbl 1302.94050) Full Text: DOI
Ishai, Yuval; Ostrovsky, Rafail; Zikas, Vassilis Secure multi-party computation with identifiable abort. (English) Zbl 1335.94053 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 369-386 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 8617, 369--386 (2014; Zbl 1335.94053) Full Text: DOI
Ostrovsky, Rafail; Paskin-Cherniavsky, Anat; Paskin-Cherniavsky, Beni Maliciously circuit-private FHE. (English) Zbl 1343.94075 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 536-553 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 8616, 536--553 (2014; Zbl 1343.94075) Full Text: DOI
Ostrovsky, Rafail; Persiano, Giuseppe; Visconti, Ivan On input indistinguishable proof systems. (English) Zbl 1412.68066 Esparza, Javier (ed.) et al., Automata, languages, and programming. 41st international colloquium, ICALP 2014, Copenhagen, Denmark, July 8–11, 2014. Proceedings, Part I. Berlin: Springer. Lect. Notes Comput. Sci. 8572, 895-906 (2014). MSC: 68Q10 94A60 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 8572, 895--906 (2014; Zbl 1412.68066) Full Text: DOI
Buhrman, Harry; Chandran, Nishanth; Fehr, Serge; Gelles, Ran; Goyal, Vipul; Ostrovsky, Rafail; Schaffner, Christian Position-based quantum cryptography: impossibility and constructions. (English) Zbl 1290.94052 SIAM J. Comput. 43, No. 1, 150-178 (2014). MSC: 94A60 81P94 81P68 PDFBibTeX XMLCite \textit{H. Buhrman} et al., SIAM J. Comput. 43, No. 1, 150--178 (2014; Zbl 1290.94052) Full Text: DOI arXiv
Gentry, Craig; Halevi, Shai; Lu, Steve; Ostrovsky, Rafail; Raykova, Mariana; Wichs, Daniel Garbled RAM revisited. (English) Zbl 1332.94067 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 405-422 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 8441, 405--422 (2014; Zbl 1332.94067) Full Text: DOI
Cho, Chongwon; Garg, Sanjam; Ostrovsky, Rafail Cross-domain secure computation. (English) Zbl 1335.94038 Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 650-668 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Cho} et al., Lect. Notes Comput. Sci. 8383, 650--668 (2014; Zbl 1335.94038) Full Text: DOI
Ananth, Prabhanjan; Chandran, Nishanth; Goyal, Vipul; Kanukurthi, Bhavana; Ostrovsky, Rafail Achieving privacy in verifiable computation with multiple servers – without FHE and without pre-processing. (English) Zbl 1335.94026 Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 149-166 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Ananth} et al., Lect. Notes Comput. Sci. 8383, 149--166 (2014; Zbl 1335.94026) Full Text: DOI
Chung, Kai-Min; Ostrovsky, Rafail; Pass, Rafael; Venkitasubramaniam, Muthuramakrishnan; Visconti, Ivan 4-round resettably-sound zero knowledge. (English) Zbl 1323.94107 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 192-216 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K.-M. Chung} et al., Lect. Notes Comput. Sci. 8349, 192--216 (2014; Zbl 1323.94107) Full Text: DOI
Orlandi, Claudio; Ostrovsky, Rafail; Rao, Vanishree; Sahai, Amit; Visconti, Ivan Statistical concurrent non-malleable zero knowledge. (English) Zbl 1323.94132 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 167-191 (2014). MSC: 94A60 68P25 68Q15 PDFBibTeX XMLCite \textit{C. Orlandi} et al., Lect. Notes Comput. Sci. 8349, 167--191 (2014; Zbl 1323.94132) Full Text: DOI
Goyal, Vipul; Jain, Abhishek; Ostrovsky, Rafail; Richelson, Silas; Visconti, Ivan Constant-round concurrent zero knowledge in the bounded player model. (English) Zbl 1300.94057 Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 21-40 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 8269, 21--40 (2013; Zbl 1300.94057) Full Text: DOI
Hemenway, Brett; Ostrovsky, Rafail Building lossy trapdoor functions from lossy encryption. (English) Zbl 1326.94099 Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 241-260 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Hemenway} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 8270, 241--260 (2013; Zbl 1326.94099) Full Text: DOI
Franklin, Matthew; Gelles, Ran; Ostrovsky, Rafail; Schulman, Leonard J. Optimal coding for streaming authentication and interactive communication. (English) Zbl 1316.94073 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 258-276 (2013). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Franklin} et al., Lect. Notes Comput. Sci. 8043, 258--276 (2013; Zbl 1316.94073) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Li, Xin; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit; Zuckerman, David Robust pseudorandom generators. (English) Zbl 1336.94053 Fomin, Fedor V. (ed.) et al., Automata, languages, and programming. 40th international colloquium, ICALP 2013, Riga, Latvia, July 8–12, 2013, Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-39205-4/pbk). Lecture Notes in Computer Science 7965, 576-588 (2013). MSC: 94A60 68Q25 94A55 94C10 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 7965, 576--588 (2013; Zbl 1336.94053) Full Text: DOI
Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles. (English) Zbl 1279.94098 J. Cryptology 26, No. 2, 340-373 (2013). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Lu} et al., J. Cryptology 26, No. 2, 340--373 (2013; Zbl 1279.94098) Full Text: DOI
Baron, Joshua; Ishai, Yuval; Ostrovsky, Rafail On linear-size pseudorandom generators and hardcore functions. (English) Zbl 1381.94061 Du, Ding-Zhu (ed.) et al., Computing and combinatorics. 19th international conference, COCOON 2013, Hangzhou, China, June 21–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38767-8/pbk). Lecture Notes in Computer Science 7936, 169-181 (2013). MSC: 94A60 11K45 68Q17 PDFBibTeX XMLCite \textit{J. Baron} et al., Lect. Notes Comput. Sci. 7936, 169--181 (2013; Zbl 1381.94061) Full Text: DOI
Lu, Steve; Ostrovsky, Rafail How to garble RAM programs? (English) Zbl 1300.68027 Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 719-734 (2013). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{S. Lu} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 7881, 719--734 (2013; Zbl 1300.68027) Full Text: DOI
Ostrovsky, Rafail; Scafuro, Alessandra; Visconti, Ivan; Wadia, Akshay Universally composable secure computation with (malicious) physically uncloneable functions. (English) Zbl 1300.68029 Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 702-718 (2013). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 7881, 702--718 (2013; Zbl 1300.68029) Full Text: DOI
Kumarasubramanian, Abishek; Ostrovsky, Rafail; Pandey, Omkant; Wadia, Akshay Cryptography using CAPTCHA puzzles. (English) Zbl 1314.94080 Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 89-106 (2013). MSC: 94A60 68T20 PDFBibTeX XMLCite \textit{A. Kumarasubramanian} et al., Lect. Notes Comput. Sci. 7778, 89--106 (2013; Zbl 1314.94080) Full Text: DOI
Ostrovsky, Rafail; Rao, Vanishree; Scafuro, Alessandra; Visconti, Ivan Revisiting lower and upper bounds for selective decommitments. (English) Zbl 1315.94097 Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 559-578 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 7785, 559--578 (2013; Zbl 1315.94097) Full Text: DOI
Lu, Steve; Ostrovsky, Rafail Distributed oblivious RAM for secure two-party computation. (English) Zbl 1315.94088 Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 377-396 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Lu} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 7785, 377--396 (2013; Zbl 1315.94088) Full Text: DOI
Bitansky, Nir; Chiesa, Alessandro; Ishai, Yuval; Paneth, Omer; Ostrovsky, Rafail Succinct non-interactive arguments via linear interactive proofs. (English) Zbl 1316.68056 Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 315-333 (2013). MSC: 68Q25 68Q15 94A60 PDFBibTeX XMLCite \textit{N. Bitansky} et al., Lect. Notes Comput. Sci. 7785, 315--333 (2013; Zbl 1316.68056) Full Text: DOI
Goyal, Vipul; Jain, Abhishek; Ostrovsky, Rafail; Richelson, Silas; Visconti, Ivan Concurrent zero knowledge in the bounded player model. (English) Zbl 1297.94073 Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 60-79 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 7785, 60--79 (2013; Zbl 1297.94073) Full Text: DOI
Groth, Jens; Ostrovsky, Rafail; Sahai, Amit New techniques for noninteractive zero-knowledge. (English) Zbl 1281.68102 J. ACM 59, No. 3, Article No. 11, 35 p. (2012). MSC: 68P25 94A60 68Q15 PDFBibTeX XMLCite \textit{J. Groth} et al., J. ACM 59, No. 3, Article No. 11, 35 p. (2012; Zbl 1281.68102) Full Text: DOI
Baron, Joshua; Ostrovsky, Rafail; Visconti, Ivan Nearly simultaneously resettable black-box zero knowledge. (English) Zbl 1272.94014 Czumaj, Artur (ed.) et al., Automata, languages, and programming. 39th international colloquium, ICALP 2012, Warwick, UK, July 9–13, 2012. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-31593-0/pbk). Lecture Notes in Computer Science 7391, 88-99 (2012). MSC: 94A60 68Q25 PDFBibTeX XMLCite \textit{J. Baron} et al., Lect. Notes Comput. Sci. 7391, 88--99 (2012; Zbl 1272.94014) Full Text: DOI
Gelles, Ran; Ostrovsky, Rafail; Winoto, Kina Multiparty proximity testing with dishonest majority from equality testing. (English) Zbl 1367.68017 Czumaj, Artur (ed.) et al., Automata, languages, and programming. 39th international colloquium, ICALP 2012, Coventry, UK, July 9–13, 2012. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-31584-8/pbk). Lecture Notes in Computer Science 7392, 537-548 (2012). MSC: 68M12 94A60 PDFBibTeX XMLCite \textit{R. Gelles} et al., Lect. Notes Comput. Sci. 7392, 537--548 (2012; Zbl 1367.68017) Full Text: DOI
Ben-Sasson, Eli; Fehr, Serge; Ostrovsky, Rafail Near-linear unconditionally-secure multiparty computation with a dishonest minority. (English) Zbl 1296.94082 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 663-680 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Ben-Sasson} et al., Lect. Notes Comput. Sci. 7417, 663--680 (2012; Zbl 1296.94082) Full Text: DOI
Garg, Sanjam; Kumarasubramanian, Abishek; Ostrovsky, Rafail; Visconti, Ivan Impossibility results for static input secure computation. (English) Zbl 1296.94114 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 424-442 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 7417, 424--442 (2012; Zbl 1296.94114) Full Text: DOI
Hemenway, Brett; Ostrovsky, Rafail Extended-DDH and lossy trapdoor functions. (English) Zbl 1291.94096 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 627-643 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Hemenway} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 7293, 627--643 (2012; Zbl 1291.94096) Full Text: DOI
Hemenway, Brett; Lu, Steve; Ostrovsky, Rafail Correlated product security from any one-way function. (English) Zbl 1300.94058 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 558-575 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Hemenway} et al., Lect. Notes Comput. Sci. 7293, 558--575 (2012; Zbl 1300.94058) Full Text: DOI
Hemenway, Brett; Ostrovsky, Rafail On homomorphic encryption and chosen-ciphertext security. (English) Zbl 1252.94071 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 52-65 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Hemenway} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 7293, 52--65 (2012; Zbl 1252.94071) Full Text: DOI Link
Cevallos, Alfonso; Fehr, Serge; Ostrovsky, Rafail; Rabani, Yuval Unconditionally-secure robust secret sharing with compact shares. (English) Zbl 1297.94116 Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 195-208 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{A. Cevallos} et al., Lect. Notes Comput. Sci. 7237, 195--208 (2012; Zbl 1297.94116) Full Text: DOI
Cho, Chongwon; Ostrovsky, Rafail; Scafuro, Alessandra; Visconti, Ivan Simultaneously resettable arguments of knowledge. (English) Zbl 1296.94101 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 530-547 (2012). MSC: 94A60 68P25 68Q15 PDFBibTeX XMLCite \textit{C. Cho} et al., Lect. Notes Comput. Sci. 7194, 530--547 (2012; Zbl 1296.94101) Full Text: DOI
Garg, Sanjam; Ostrovsky, Rafail; Visconti, Ivan; Wadia, Akshay Resettable statistical zero knowledge. (English) Zbl 1296.94115 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 494-511 (2012). MSC: 94A60 68M12 68Q15 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 7194, 494--511 (2012; Zbl 1296.94115) Full Text: DOI
Ishai, Yuval; Ostrovsky, Rafail; Seyalioglu, Hakan Identifying cheaters without an honest majority. (English) Zbl 1303.94083 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 21-38 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 7194, 21--38 (2012; Zbl 1303.94083) Full Text: DOI
Hemenway, Brett; Libert, Benoît; Ostrovsky, Rafail; Vergnaud, Damien Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security. (English) Zbl 1227.94048 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 70-88 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Hemenway} et al., Lect. Notes Comput. Sci. 7073, 70--88 (2011; Zbl 1227.94048) Full Text: DOI
Hemenway, Brett; Ostrovsky, Rafail; Strauss, Martin J.; Wootters, Mary Public key locally decodable codes with short keys. (English) Zbl 1343.94102 Goldberg, Leslie Ann (ed.) et al., Approximation, randomization, and combinatorial optimization. Algorithms and techniques. 14th international workshop, APPROX 2011, and 15th international workshop, RANDOM 2011, Princeton, NJ, USA, August 17–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22934-3/pbk). Lecture Notes in Computer Science 6845, 605-615 (2011). MSC: 94B35 94A60 PDFBibTeX XMLCite \textit{B. Hemenway} et al., Lect. Notes Comput. Sci. 6845, 605--615 (2011; Zbl 1343.94102) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit; Wullschleger, Jürg Constant-rate oblivious transfer from noisy channels. (English) Zbl 1290.94092 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 667-684 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 6841, 667--684 (2011; Zbl 1290.94092) Full Text: DOI
Buhrman, Harry; Chandran, Nishanth; Fehr, Serge; Gelles, Ran; Goyal, Vipul; Ostrovsky, Rafail; Schaffner, Christian Position-based quantum cryptography: impossibility and constructions. (English) Zbl 1287.94060 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 429-446 (2011). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{H. Buhrman} et al., Lect. Notes Comput. Sci. 6841, 429--446 (2011; Zbl 1287.94060) Full Text: DOI
Garay, Juan; Givens, Clint; Ostrovsky, Rafail Secure message transmission by public discussion: a brief survey. (English) Zbl 1272.94003 Chee, Yeow Meng (ed.) et al., Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 – June 3, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20900-0/pbk). Lecture Notes in Computer Science 6639, 126-141 (2011). MSC: 94A05 68M12 94A40 PDFBibTeX XMLCite \textit{J. Garay} et al., Lect. Notes Comput. Sci. 6639, 126--141 (2011; Zbl 1272.94003) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit Efficient non-interactive secure computation. (English) Zbl 1290.94151 Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 406-425 (2011). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 6632, 406--425 (2011; Zbl 1290.94151) Full Text: DOI
Chandran, Nishanth; Kanukurthi, Bhavana; Ostrovsky, Rafail; Reyzin, Leonid Privacy amplification with asymptotically optimal entropy loss. (English) Zbl 1293.94101 Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5–8, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-817-9). 785-794 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{N. Chandran} et al., in: Proceedings of the 42nd annual ACM symposium on theory of computing, STOC '10. Cambridge, MA, USA, June 5--8, 2010. New York, NY: Association for Computing Machinery (ACM). 785--794 (2010; Zbl 1293.94101) Full Text: DOI
Chandran, Nishanth; Ostrovsky, Rafail; Skeith, William E. III Public-key encryption with efficient amortized updates. (English) Zbl 1291.68162 Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 17-35 (2010). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{N. Chandran} et al., Lect. Notes Comput. Sci. 6280, 17--35 (2010; Zbl 1291.68162) Full Text: DOI
Cho, Chongwon; Lee, Chen-Kuei; Ostrovsky, Rafail Equivalence of uniform key agreement and composition insecurity. (English) Zbl 1283.94059 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 447-464 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Cho} et al., Lect. Notes Comput. Sci. 6223, 447--464 (2010; Zbl 1283.94059) Full Text: DOI
Goyal, Vipul; Jain, Abhishek; Ostrovsky, Rafail Password-authenticated session-key generation on the internet in the plain model. (English) Zbl 1280.94109 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 277-294 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 6223, 277--294 (2010; Zbl 1280.94109) Full Text: DOI
Garay, Juan; Givens, Clint; Ostrovsky, Rafail Secure message transmission with small public discussion. (English) Zbl 1280.94057 Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 177-196 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Garay} et al., Lect. Notes Comput. Sci. 6110, 177--196 (2010; Zbl 1280.94057) Full Text: DOI
Ostrovsky, Rafail; Pandey, Omkant; Visconti, Ivan Efficiency preserving transformations for concurrent non-malleable zero knowledge. (English) Zbl 1274.94102 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 535-552 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 5978, 535--552 (2010; Zbl 1274.94102) Full Text: DOI
Gordon, Dov; Ishai, Yuval; Moran, Tal; Ostrovsky, Rafail; Sahai, Amit On complete primitives for fairness. (English) Zbl 1274.94071 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 91-108 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Gordon} et al., Lect. Notes Comput. Sci. 5978, 91--108 (2010; Zbl 1274.94071) Full Text: DOI
Katz, Jonathan; Ostrovsky, Rafail; Yung, Moti Efficient and secure authenticated key exchange using weak passwords. (English) Zbl 1326.94128 J. ACM 57, No. 1, Article No. 3, 39 p. (2009). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{J. Katz} et al., J. ACM 57, No. 1, Article No. 3, 39 p. (2009; Zbl 1326.94128) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit Extracting correlations. (English) Zbl 1292.94080 2009 IEEE 50th annual symposium on foundations of computer science – FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24–27, 2009. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-3850-1; 978-1-4244-5116-6/ebook). 261-270 (2009). MSC: 94A60 68Q87 68M12 PDFBibTeX XMLCite \textit{Y. Ishai} et al., in: 2009 IEEE 50th annual symposium on foundations of computer science -- FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24--27, 2009. Los Alamitos, CA: IEEE Computer Society. 261--270 (2009; Zbl 1292.94080) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit Zero-knowledge proofs from secure multiparty computation. (English) Zbl 1192.68239 SIAM J. Comput. 39, No. 3, 1121-1152 (2009). MSC: 68P25 94A60 68M12 68Q17 PDFBibTeX XMLCite \textit{Y. Ishai} et al., SIAM J. Comput. 39, No. 3, 1121--1152 (2009; Zbl 1192.68239) Full Text: DOI Link
Chandran, Nishanth; Goyal, Vipul; Moriarty, Ryan; Ostrovsky, Rafail Position based cryptography. (English) Zbl 1252.94053 Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 391-407 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Chandran} et al., Lect. Notes Comput. Sci. 5677, 391--407 (2009; Zbl 1252.94053) Full Text: DOI
Amir, Yair; Bunn, Paul; Ostrovsky, Rafail Authenticated adversarial routing. (English) Zbl 1213.68073 Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 163-182 (2009). MSC: 68M10 68M12 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Amir} et al., Lect. Notes Comput. Sci. 5444, 163--182 (2009; Zbl 1213.68073) Full Text: DOI
Ostrovsky, Rafail; Persiano, Giuseppe; Visconti, Ivan Simulation-based concurrent non-malleable commitments and decommitments. (English) Zbl 1213.94125 Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 91-108 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 5444, 91--108 (2009; Zbl 1213.94125) Full Text: DOI
Dodis, Yevgeniy; Ostrovsky, Rafail; Reyzin, Leonid; Smith, Adam Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. (English) Zbl 1165.94326 SIAM J. Comput. 38, No. 1, 97-139 (2008). MSC: 94A62 94A60 68P25 68P30 68Q99 94A17 94B35 94B99 PDFBibTeX XMLCite \textit{Y. Dodis} et al., SIAM J. Comput. 38, No. 1, 97--139 (2008; Zbl 1165.94326) Full Text: DOI arXiv
Ostrovsky, Rafail; Skeith, William E. III Communication complexity in algebraic two-party protocols. (English) Zbl 1183.94043 Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 379-396 (2008). MSC: 94A60 68P20 68Q25 PDFBibTeX XMLCite \textit{R. Ostrovsky} and \textit{W. E. Skeith III}, Lect. Notes Comput. Sci. 5157, 379--396 (2008; Zbl 1183.94043) Full Text: DOI
Hemenway, Brett; Ostrovsky, Rafail Public-key locally-decodable codes. (English) Zbl 1183.94036 Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 126-143 (2008). MSC: 94A60 68P20 94B35 PDFBibTeX XMLCite \textit{B. Hemenway} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 5157, 126--143 (2008; Zbl 1183.94036) Full Text: DOI
Boneh, Dan; Halevi, Shai; Hamburg, Mike; Ostrovsky, Rafail Circular-secure encryption from decision Diffie-Hellman. (English) Zbl 1183.94025 Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 108-125 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 5157, 108--125 (2008; Zbl 1183.94025) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Ratall; Sahai, Amit Cryptography with constant computational overhead. (English) Zbl 1231.94050 STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 433-442 (2008). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Ishai} et al., in: Proceedings of the 40th annual ACM symposium on theory of computing, STOC 2008. Victoria, Canada, May 17--20, 2008. New York, NY: Association for Computing Machinery (ACM). 433--442 (2008; Zbl 1231.94050)
Ostrovsky, Rafail (ed.); De Prisco, Roberto (ed.); Visconti, Ivan (ed.) Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. (English) Zbl 1148.68006 Lecture Notes in Computer Science 5229. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). xi, 423 p. (2008). MSC: 68-06 94-06 68P25 94A60 00B25 PDFBibTeX XMLCite \textit{R. Ostrovsky} (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10--12, 2008. Proceedings. Berlin: Springer (2008; Zbl 1148.68006) Full Text: DOI
Ostrovsky, Rafail; Persiano, Giuseppe; Visconti, Ivan Constant-round concurrent non-malleable zero knowledge in the bare public-key model. (English) Zbl 1155.94379 Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 548-559 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 5126, 548--559 (2008; Zbl 1155.94379) Full Text: DOI
Lu, Steve; Manchala, Daniel; Ostrovsky, Rafail Visual cryptography on graphs. (English) Zbl 1148.94435 Hu, Xiaodong (ed.) et al., Computing and combinatorics. 14th annual international conference, COCOON 2008, Dalian, China, June 27–29, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69732-9/pbk). Lecture Notes in Computer Science 5092, 225-234 (2008). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. Lu} et al., Lect. Notes Comput. Sci. 5092, 225--234 (2008; Zbl 1148.94435) Full Text: DOI Link
Garay, Juan A.; Ostrovsky, Rafail Almost-everywhere secure computation. (English) Zbl 1149.68377 Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 307-323 (2008). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. A. Garay} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 4965, 307--323 (2008; Zbl 1149.68377) Full Text: DOI
Groth, Jens; Ostrovsky, Rafail Cryptography in the multi-string model. (English) Zbl 1215.94048 Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 323-341 (2007). MSC: 94A60 68M12 68Q10 94A62 PDFBibTeX XMLCite \textit{J. Groth} and \textit{R. Ostrovsky}, Lect. Notes Comput. Sci. 4622, 323--341 (2007; Zbl 1215.94048) Full Text: DOI
Boneh, Dan; Kushilevitz, Eyal; Ostrovsky, Rafail; Skeith, William E. III Public key encryption that allows PIR queries. (English) Zbl 1215.68096 Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 50-67 (2007). MSC: 68P25 68P15 68P20 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 4622, 50--67 (2007; Zbl 1215.68096) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit Zero-knowledge from secure multiparty computation. (English) Zbl 1232.68044 STOC’07. Proceedings of the 39th annual ACM symposium on theory of computing, San Diego, CA, USA, June 11–13, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-631-8). 21-30 (2007). MSC: 68P25 94A60 68M12 68Q17 PDFBibTeX XMLCite \textit{Y. Ishai} et al., in: Proceedings of the 39th annual ACM symposium on theory of computing, STOC 2007. San Diego, CA, USA, June 11--13, 2007. New York, NY: Association for Computing Machinery (ACM). 21--30 (2007; Zbl 1232.68044)
Goyal, Vipul; Moriarty, Ryan; Ostrovsky, Rafail; Sahai, Amit Concurrent statistical zero-knowledge arguments for NP from one way functions. (English) Zbl 1153.94384 Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 444-459 (2007). MSC: 94A60 68Q15 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 4833, 444--459 (2007; Zbl 1153.94384) Full Text: DOI
Ostrovsky, Rafail; Skeith, William E. Private searching on streaming data. (English) Zbl 1132.68023 J. Cryptology 20, No. 4, 397-430 (2007). Reviewer: Aniket Mahanti (Saint John) MSC: 68P10 68P15 68P20 68P25 94A62 PDFBibTeX XMLCite \textit{R. Ostrovsky} and \textit{W. E. Skeith}, J. Cryptology 20, No. 4, 397--430 (2007; Zbl 1132.68023) Full Text: DOI
Ostrovsky, Rafail; Pandey, Omkant; Sahai, Amit Private locally decodable codes. (English) Zbl 1171.94375 Arge, Lars (ed.) et al., Automata, languages and programming. 34th international colloquium, ICALP 2007, Wrocław, Poland, July 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73419-2/pbk). Lecture Notes in Computer Science 4596, 387-398 (2007). MSC: 94B35 94A62 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 4596, 387--398 (2007; Zbl 1171.94375) Full Text: DOI
Ostrovsky, Rafail; Skeith, William E. III A survey of single-database private information retrieval: techniques and applications. (English) Zbl 1161.68435 Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 393-411 (2007). MSC: 68P20 68P25 94A60 PDFBibTeX XMLCite \textit{R. Ostrovsky} and \textit{W. E. Skeith III}, Lect. Notes Comput. Sci. 4450, 393--411 (2007; Zbl 1161.68435) Full Text: DOI
Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent Sequential aggregate signatures and multisignatures without random oracles. (English) Zbl 1140.94358 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 465-485 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Lu} et al., Lect. Notes Comput. Sci. 4004, 465--485 (2006; Zbl 1140.94358) Full Text: DOI
Groth, Jens; Ostrovsky, Rafail; Sahai, Amit Perfect non-interactive zero knowledge for NP. (English) Zbl 1129.94025 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 339-358 (2006). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Groth} et al., Lect. Notes Comput. Sci. 4004, 339--358 (2006; Zbl 1129.94025) Full Text: DOI
Groth, Jens; Ostrovsky, Rafail; Sahai, Amit Non-interactive ZAPs and new techniques for NIZK. (English) Zbl 1129.94024 Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 97-111 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Groth} et al., Lect. Notes Comput. Sci. 4117, 97--111 (2006; Zbl 1129.94024) Full Text: DOI
Boyen, Xavier; Dodis, Yevgeniy; Katz, Jonathan; Ostrovsky, Rafail; Smith, Adam Secure remote authentication using biometric data. (English) Zbl 1137.94365 Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 147-163 (2005). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{X. Boyen} et al., Lect. Notes Comput. Sci. 3494, 147--163 (2005; Zbl 1137.94365) Full Text: DOI
Ostrovsky, Rafail; Skeith, William E. III Private searching on streaming data. (English) Zbl 1145.94472 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 223-240 (2005). MSC: 94A62 68P10 68P15 68P20 PDFBibTeX XMLCite \textit{R. Ostrovsky} and \textit{W. E. Skeith III}, Lect. Notes Comput. Sci. 3621, 223--240 (2005; Zbl 1145.94472) Full Text: DOI
Katz, Jonathan; Ostrovsky, Rafail; Rabin, Michael O. Identity-based zero-knowledge. (English) Zbl 1116.94323 Blundo, Carlo (ed.) et al., Security in communication networks. 4th international conference, SCN 2004, Amalfi, Italy, September 8–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24301-1/pbk). Lecture Notes in Computer Science 3352, 180-192 (2005). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Katz} et al., Lect. Notes Comput. Sci. 3352, 180--192 (2005; Zbl 1116.94323) Full Text: DOI