×
Compute Distance To:
Author ID: ishai.yuval Recent zbMATH articles by "Ishai, Yuval"
Published as: Ishai, Yuval
External Links: MGP
all top 5

Co-Authors

2 single-authored
56 Kushilevitz, Eyal
34 Sahai, Amit
26 Ostrovsky, Rafail
14 Applebaum, Benny
13 Boyle, Elette
13 Gilboa, Niv
11 Malkin, Tal G.
10 Beimel, Amos
10 Damgård, Ivan Bjerre
9 Prabhakaran, Manoj M.
7 Rabin, Tal
7 Srinivasan, Akshayaram
5 Barkol, Omer
5 Bogdanov, Andrej
5 Nissim, Kobbi
5 Paskin-Cherniavsky, Anat
5 Petrank, Erez
5 Weiss, Mor
4 Boneh, Dan
4 Garg, Sanjam
4 Genkin, Daniel
4 Halevi, Shai
4 Lindell, Yehuda
4 Strauss, Martin J.
4 Weinreb, Enav
4 Wright, Rebecca N.
3 Canetti, Ran
3 Canteaut, Anne
3 Couteau, Geoffroy
3 Di Crescenzo, Giovanni
3 Goyal, Vipul
3 Haitner, Iftach
3 Khurana, Dakshita
3 Kilian, Joe
3 Kumaresan, Ranjit
3 Rijmen, Vincent
3 Vaikuntanathan, Vinod
3 Wu, David J.
2 Agrawal, Shweta
2 Baron, Joshua
2 Benhamouda, Fabrice
2 Bitansky, Nir
2 Bro Miltersen, Peter
2 Chiesa, Alessandro
2 Cramer, Ronald John Fitzgerald
2 Degwekar, Akshay
2 Dziembowski, Stefan
2 Feigenbaum, Joan
2 Gabizon, Ariel
2 Garay, Juan A.
2 Gennaro, Rosario
2 Gertner, Yael
2 Groth, Jens
2 Gupta, Divya
2 Harnik, Danny
2 Harsha, Prahladh
2 Hazay, Carmit
2 Jain, Abhishek
2 Kohl, Lisa
2 Krøigaard, Mikkel
2 Lai, Russell W. F.
2 Mahmoody, Mohammad
2 Malavolta, Giulio
2 Meldgaard, Sigurd
2 Nielsen, Jesper Buus
2 Nof, Ariel
2 Orlandi, Claudio
2 Paneth, Omer
2 Paskin, Anat
2 Polychroniadou, Antigoni
2 Reingold, Omer
2 Scholl, Peter
2 Wadia, Akshay
2 Wagner, David A.
2 Waters, Brent
2 Wee, Hoeteck
2 Zikas, Vassilis
1 Agrikola, Thomas
1 Aiello, Bill
1 Ananth, Prabhanjan Vijendra
1 Anthony, Martin H. G.
1 Aspnes, James
1 Badrinarayanan, Saikrishna
1 Balogh, József
1 Barak, Boaz
1 Bartlett, Peter L.
1 Ben-Sasson, Eli
1 Bentov, Iddo
1 Biham, Eli
1 Chandran, Nishanth
1 Chase, Melissa
1 Cheng, Kuan
1 Chor, Benny
1 Cohen, Gil
1 Corrigan-Gibbs, Henry
1 Csirik, János A.
1 de Castro, Leo
1 Dinur, Itai
1 Dodis, Yevgeniy
1 Döttling, Nico
...and 71 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

150 Publications have been cited 1,810 times in 864 Documents Cited by Year
Founding cryptography on oblivious transfer – efficiently. Zbl 1183.94037
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit
87
2008
Private circuits: securing hardware against probing attacks. Zbl 1122.94378
Ishai, Yuval; Sahai, Amit; Wagner, David
86
2003
Evaluating branching programs on encrypted data. Zbl 1156.94354
Ishai, Yuval; Paskin, Anat
66
2007
Extending oblivious transfers efficiently. Zbl 1122.94422
Ishai, Yuval; Kilian, Joe; Nissim, Kobbi; Petrank, Erez
57
2003
Protecting data privacy in private information retrieval schemes. Zbl 0958.68059
Gertner, Yael; Ishai, Yuval; Kushilevitz, Eyal; Malkin, Tal
47
2000
Priced oblivious transfer: how to sell digital goods. Zbl 0981.94042
Aiello, Bill; Ishai, Yuval; Reingold, Omer
44
2001
Zero-knowledge from secure multiparty computation. Zbl 1232.68044
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
42
2007
Cryptography in NC\(^0\). Zbl 1126.94014
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
39
2006
Computationally private randomizing polynomials and their applications. Zbl 1143.94009
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
38
2006
Succinct non-interactive arguments via linear interactive proofs. Zbl 1316.68056
Bitansky, Nir; Chiesa, Alessandro; Ishai, Yuval; Paneth, Omer; Ostrovsky, Rafail
31
2013
Secure arithmetic computation with no honest majority. Zbl 1213.94111
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit
31
2009
Function secret sharing. Zbl 1371.94664
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
28
2015
From secrecy to soundness: efficient verification via secure computation (extended abstract). Zbl 1287.68041
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
28
2010
Founding cryptography on tamper-proof hardware tokens. Zbl 1274.94072
Goyal, Vipul; Ishai, Yuval; Sahai, Amit; Venkatesan, Ramarathnam; Wadia, Akshay
27
2010
Perfect constant-round secure computation via perfect randomizing polynomials. Zbl 1056.68088
Ishai, Yuval; Kushilevitz, Eyal
26
2002
Efficient non-interactive secure computation. Zbl 1290.94151
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit
26
2011
Cryptography with constant computational overhead. Zbl 1231.94050
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Ratall; Sahai, Amit
26
2008
Keyword search and oblivious pseudorandom functions. Zbl 1079.94546
Freedman, Michael J.; Ishai, Yuval; Pinkas, Benny; Reingold, Omer
26
2005
Share conversion, pseudorandom secret-sharing and applications to secure computation. Zbl 1079.94541
Cramer, Ronald; Damgård, Ivan; Ishai, Yuval
26
2005
Efficient pseudorandom correlation generators: silent OT extension and more. Zbl 07178325
Boyle, Elette; Couteau, Geoffroy; Gilboa, Niv; Ishai, Yuval; Kohl, Lisa; Scholl, Peter
26
2019
Breaking the circuit size barrier for secure computation under DDH. Zbl 1384.94038
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
25
2016
Scalable secure multiparty computation. Zbl 1161.94394
Damgård, Ivan; Ishai, Yuval
25
2006
Constant-round multiparty computation using a black-box pseudorandom generator. Zbl 1145.94437
Damgård, Ivan; Ishai, Yuval
25
2005
Bounded key-dependent message security. Zbl 1280.94038
Barak, Boaz; Haitner, Iftach; Hofheinz, Dennis; Ishai, Yuval
24
2010
Perfectly secure multiparty computation and the computational overhead of cryptography. Zbl 1280.94046
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel
23
2010
Batch codes and their applications. Zbl 1192.94100
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
23
2004
Circuits resilient to additive attacks with applications to secure computation. Zbl 1315.94073
Genkin, Daniel; Ishai, Yuval; Prabhakaran, Manoj M.; Sahai, Amit; Tromer, Eran
23
2014
On the cryptographic complexity of the worst functions. Zbl 1326.94072
Beimel, Amos; Ishai, Yuval; Kumaresan, Ranjit; Kushilevitz, Eyal
21
2014
Scalable multiparty computation with nearly optimal work and resilience. Zbl 1183.68082
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel; Nielsen, Jesper Buus; Smith, Adam
20
2008
Partial garbling schemes and their applications. Zbl 1410.68112
Ishai, Yuval; Wee, Hoeteck
20
2014
Private circuits. II: Keeping secrets in tamperable circuits. Zbl 1140.94347
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit; Wagner, David
19
2006
Secure multi-party computation with identifiable abort. Zbl 1335.94053
Ishai, Yuval; Ostrovsky, Rafail; Zikas, Vassilis
19
2014
Zero-knowledge proofs from secure multiparty computation. Zbl 1192.68239
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
18
2009
The round complexity of verifiable secret sharing and secure multicast. Zbl 1317.68072
Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal
18
2001
Non-interactive and non-malleable commitment. Zbl 1029.68547
Di Crescenzo, Giovanni; Ishai, Yuval; Ostrovsky, Rafail
17
1998
Distributed point functions and their applications. Zbl 1328.68054
Gilboa, Niv; Ishai, Yuval
16
2014
Public-coin differing-inputs obfuscation and its applications. Zbl 1336.94054
Ishai, Yuval; Pandey, Omkant; Sahai, Amit
16
2015
On the power of correlated randomness in secure computation. Zbl 1315.94080
Ishai, Yuval; Kushilevitz, Eyal; Meldgaard, Sigurd; Orlandi, Claudio; Paskin-Cherniavsky, Anat
15
2013
Non-interactive secure multiparty computation. Zbl 1335.94030
Beimel, Amos; Gabizon, Ariel; Ishai, Yuval; Kushilevitz, Eyal; Meldgaard, Sigurd; Paskin-Cherniavsky, Anat
15
2014
Efficient multi-party computation over rings. Zbl 1038.94554
Cramer, Ronald; Fehr, Serge; Ishai, Yuval; Kushilevitz, Eyal
13
2003
Foundations of homomorphic secret sharing. Zbl 1462.94053
Boyle, Elette; Gilboa, Niv; Ishai, Yuval; Lin, Huijia; Tessaro, Stefano
13
2018
On the power of nonlinear secret-sharing. Zbl 1086.94020
Beimel, Amos; Ishai, Yuval
12
2005
Secure multiparty computation with minimal interaction. Zbl 1283.94093
Ishai, Yuval; Kushilevitz, Eyal; Paskin, Anat
12
2010
How to garble arithmetic circuits. Zbl 1292.94186
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
12
2011
Two-message witness indistinguishability and secure computation in the plain model from new assumptions. Zbl 1417.94040
Badrinarayanan, Saikrishna; Garg, Sanjam; Ishai, Yuval; Sahai, Amit; Wadia, Akshay
12
2017
Black-box constructions for secure computation. Zbl 1301.94116
Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
12
2006
On the local leakage resilience of linear secret sharing schemes. Zbl 1444.94119
Benhamouda, Fabrice; Degwekar, Akshay; Ishai, Yuval; Rabin, Tal
11
2018
Black-box constructions of protocols for secure computation. Zbl 1236.94056
Haitner, Iftach; Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
11
2011
OT-combiners via secure computation. Zbl 1162.94366
Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal; Nielsen, Jesper Buus
11
2008
Trapdoor hash functions and their applications. Zbl 1436.94054
Döttling, Nico; Garg, Sanjam; Ishai, Yuval; Malavolta, Giulio; Mour, Tamer; Ostrovsky, Rafail
11
2019
Zero-knowledge proofs on secret-shared data via fully linear PCPs. Zbl 1436.94043
Boneh, Dan; Boyle, Elette; Corrigan-Gibbs, Henry; Gilboa, Niv; Ishai, Yuval
11
2019
Group-based secure computation: optimizing rounds, communication, and computation. Zbl 1415.94414
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
11
2017
Protecting data privacy in private information retrieval schemes. Zbl 1027.68593
Gertner, Yael; Ishai, Yuval; Kushilevitz, Eyal; Malkin, Tal
11
1998
Bounded indistinguishability and the complexity of recovering secrets. Zbl 1406.94027
Bogdanov, Andrej; Ishai, Yuval; Viola, Emanuele; Williamson, Christopher
10
2016
Efficient multi-party computation: from passive to active security via secure SIMD circuits. Zbl 1352.94037
Genkin, Daniel; Ishai, Yuval; Polychroniadou, Antigoni
10
2015
Encoding functions with constant online rate or how to compress garbled circuits keys. Zbl 1298.94076
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
10
2013
Efficient multiparty protocols via log-depth threshold formulae. (Extended abstract). Zbl 1316.94066
Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval; Kölker, Jonas; Miltersen, Peter Bro; Raz, Ran; Rothblum, Ron D.
10
2013
Reducing the servers computation in private information retrieval: PIR with preprocessing. Zbl 0989.68507
Beimel, Amos; Ishai, Yuval; Malkin, Tal
9
2000
Information-theoretic private information retrieval: A unified construction (extended abstract). Zbl 0986.68509
Beimel, Amos; Ishai, Yuval
9
2001
Exploring crypto dark matter: new simple PRF candidates and their applications. Zbl 1430.94059
Boneh, Dan; Ishai, Yuval; Passelègue, Alain; Sahai, Amit; Wu, David J.
9
2018
Interactive locking, zero-knowledge PCPs, and unconditional cryptography. Zbl 1280.94063
Goyal, Vipul; Ishai, Yuval; Mahmoody, Mohammad; Sahai, Amit
9
2010
Sufficient conditions for collision-resistant hashing. Zbl 1079.94554
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail
9
2005
On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\). Zbl 1242.94016
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
9
2008
Reusable non-interactive secure computation. Zbl 07178324
Chase, Melissa; Dodis, Yevgeniy; Ishai, Yuval; Kraschewski, Daniel; Liu, Tianren; Ostrovsky, Rafail; Vaikuntanathan, Vinod
9
2019
Two-round MPC: information-theoretic and black-box. Zbl 1443.94058
Garg, Sanjam; Ishai, Yuval; Srinivasan, Akshayaram
9
2018
Identifying cheaters without an honest majority. Zbl 1303.94083
Ishai, Yuval; Ostrovsky, Rafail; Seyalioglu, Hakan
8
2012
On efficient zero-knowledge PCPs. Zbl 1304.68056
Ishai, Yuval; Mahmoody, Mohammad; Sahai, Amit
8
2012
General constructions for information-theoretic private information retrieval. Zbl 1076.68027
Beimel, Amos; Ishai, Yuval; Kushilevitz, Eyal
8
2005
Secure computation with minimal interaction, revisited. Zbl 1352.94075
Ishai, Yuval; Kumaresan, Ranjit; Kushilevitz, Eyal; Paskin-Cherniavsky, Anat
8
2015
Cryptography with constant input locality. Zbl 1215.94029
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
8
2007
On the randomness complexity of efficient sampling. Zbl 1301.68261
Dubrov, Bella; Ishai, Yuval
8
2006
Secure protocol transformations. Zbl 1372.94430
Ishai, Yuval; Kushilevitz, Eyal; Prabhakaran, Manoj; Sahai, Amit; Yu, Ching-Hua
7
2016
Secure multiparty computation of approximations (extended abstract). Zbl 0986.68954
Feigenbaum, Joan; Ishai, Yuval; Malkin, Tal; Nissim, Kobbi; Strauss, Martin J.
7
2001
Cryptography with constant input locality. Zbl 1183.94018
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
7
2009
Constant-rate oblivious transfer from noisy channels. Zbl 1290.94092
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit; Wullschleger, Jürg
7
2011
Extracting correlations. Zbl 1292.94080
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
7
2009
Secure computation of constant-depth circuits with applications to database search problems. Zbl 1145.68396
Barkol, Omer; Ishai, Yuval
7
2005
Sub-linear zero-knowledge argument for correctness of a shuffle. Zbl 1149.94319
Groth, Jens; Ishai, Yuval
7
2008
Probabilistically checkable proofs of proximity with zero-knowledge. Zbl 1323.94117
Ishai, Yuval; Weiss, Mor
7
2014
Secure multiparty computation of approximations. Zbl 1321.68464
Feigenbaum, Joan; Ishai, Yuval; Malkin, Tal; Nissim, Kobbi; Strauss, Martin J.; Wright, Rebecca N.
7
2006
Lattice-based SNARGs and their application to more efficient obfuscation. Zbl 1415.94412
Boneh, Dan; Ishai, Yuval; Sahai, Amit; Wu, David J.
7
2017
Secure multiparty computation with general interaction patterns. Zbl 1334.94081
Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Kushilevitz, Eyal; Rabin, Tal
7
2016
Secure arithmetic computation with constant computational overhead. Zbl 1407.94073
Applebaum, Benny; Damgård, Ivan; Ishai, Yuval; Nielsen, Michael; Zichron, Lior
7
2017
On 2-round secure multiparty computation. Zbl 1026.94527
Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal
6
2002
Adaptive versus non-adaptive security of multi-party protocols. Zbl 1091.94020
Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal
6
2004
Binary AMD circuits from secure multiparty computation. Zbl 1406.94057
Genkin, Daniel; Ishai, Yuval; Weiss, Mor
6
2016
On the complexity of UC commitments. Zbl 1328.68027
Garay, Juan A.; Ishai, Yuval; Kumaresan, Ranjit; Wee, Hoeteck
6
2014
Basing weak public-key cryptography on strong one-way functions. Zbl 1162.94339
Biham, Eli; Goren, Yaron J.; Ishai, Yuval
6
2008
Linear-time encodable codes meeting the Gilbert-Varshamov bound and their cryptographic applications. Zbl 1364.94595
Druk, Erez; Ishai, Yuval
6
2014
Low-complexity cryptographic hash functions. Zbl 1402.94051
Applebaum, Benny; Haramaty-Krasne, Naama; Ishai, Yuval; Kushilevitz, Eyal; Vaikuntanathan, Vinod
6
2017
Private computation using a PEZ dispenser. Zbl 1059.68038
Balogh, József; Csirik, János A.; Ishai, Yuval; Kushilevitz, Eyal
5
2003
Improved upper bounds on information-theoretic private information retrieval (extended abstract). Zbl 1346.68083
Ishai, Yuval; Kushilevitz, Eyal
5
1999
On \(d\)-multiplicative secret sharing. Zbl 1201.94074
Barkol, Omer; Ishai, Yuval; Weinreb, Enav
5
2010
Robust pseudorandom generators. Zbl 1336.94053
Ishai, Yuval; Kushilevitz, Eyal; Li, Xin; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit; Zuckerman, David
5
2013
On combining privacy with guaranteed output delivery in secure multiparty computation. Zbl 1161.94444
Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
5
2006
On the hardness of information-theoretic multiparty computation. Zbl 1122.94423
Ishai, Yuval; Kushilevitz, Eyal
5
2004
Secure computation with preprocessing via function secret sharing. Zbl 1455.94205
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
5
2019
Can we access a database both locally and privately? Zbl 1416.68062
Boyle, Elette; Ishai, Yuval; Pass, Rafael; Wootters, Mary
5
2017
Cryptography with one-way communication. Zbl 1351.94046
Garg, Sanjam; Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
4
2015
Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Zbl 1332.94066
Gentry, Craig; Groth, Jens; Ishai, Yuval; Peikert, Chris; Sahai, Amit; Smith, Adam
4
2015
On the local leakage resilience of linear secret sharing schemes. Zbl 1467.94030
Benhamouda, Fabrice; Degwekar, Akshay; Ishai, Yuval; Rabin, Tal
2
2021
On the round complexity of black-box secure MPC. Zbl 1486.94111
Ishai, Yuval; Khurana, Dakshita; Sahai, Amit; Srinivasan, Akshayaram
1
2021
Sublinear GMW-style compiler for MPC with preprocessing. Zbl 07511740
Boyle, Elette; Gilboa, Niv; Ishai, Yuval; Nof, Ariel
1
2021
Function secret sharing for mixed-mode and fixed-point secure computation. Zbl 1479.94297
Boyle, Elette; Chandran, Nishanth; Gilboa, Niv; Gupta, Divya; Ishai, Yuval; Kumar, Nishant; Rathee, Mayank
1
2021
Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2]\). Zbl 1489.94089
Boyle, Elette; Couteau, Geoffroy; Gilboa, Niv; Ishai, Yuval; Kohl, Lisa; Scholl, Peter
1
2021
MPC-friendly symmetric cryptography from alternating moduli: candidates, protocols, and applications. Zbl 1489.94095
Dinur, Itai; Goldfeder, Steven; Halevi, Tzipora; Ishai, Yuval; Kelkar, Mahimna; Sharma, Vivek; Zaverucha, Greg
1
2021
Efficient pseudorandom correlation generators: silent OT extension and more. Zbl 07178325
Boyle, Elette; Couteau, Geoffroy; Gilboa, Niv; Ishai, Yuval; Kohl, Lisa; Scholl, Peter
26
2019
Trapdoor hash functions and their applications. Zbl 1436.94054
Döttling, Nico; Garg, Sanjam; Ishai, Yuval; Malavolta, Giulio; Mour, Tamer; Ostrovsky, Rafail
11
2019
Zero-knowledge proofs on secret-shared data via fully linear PCPs. Zbl 1436.94043
Boneh, Dan; Boyle, Elette; Corrigan-Gibbs, Henry; Gilboa, Niv; Ishai, Yuval
11
2019
Reusable non-interactive secure computation. Zbl 07178324
Chase, Melissa; Dodis, Yevgeniy; Ishai, Yuval; Kraschewski, Daniel; Liu, Tianren; Ostrovsky, Rafail; Vaikuntanathan, Vinod
9
2019
Secure computation with preprocessing via function secret sharing. Zbl 1455.94205
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
5
2019
Unconditionally secure computation against low-complexity leakage. Zbl 07178458
Bogdanov, Andrej; Ishai, Yuval; Srinivasan, Akshayaram
4
2019
Foundations of homomorphic secret sharing. Zbl 1462.94053
Boyle, Elette; Gilboa, Niv; Ishai, Yuval; Lin, Huijia; Tessaro, Stefano
13
2018
On the local leakage resilience of linear secret sharing schemes. Zbl 1444.94119
Benhamouda, Fabrice; Degwekar, Akshay; Ishai, Yuval; Rabin, Tal
11
2018
Exploring crypto dark matter: new simple PRF candidates and their applications. Zbl 1430.94059
Boneh, Dan; Ishai, Yuval; Passelègue, Alain; Sahai, Amit; Wu, David J.
9
2018
Two-round MPC: information-theoretic and black-box. Zbl 1443.94058
Garg, Sanjam; Ishai, Yuval; Srinivasan, Akshayaram
9
2018
Private circuits: a modular approach. Zbl 1462.94028
Ananth, Prabhanjan; Ishai, Yuval; Sahai, Amit
4
2018
Minimizing locality of one-way functions via semi-private randomized encodings. Zbl 1384.94026
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
4
2018
Quasi-optimal SNARGs via linear multi-prover interactive proofs. Zbl 1415.94413
Boneh, Dan; Ishai, Yuval; Sahai, Amit; Wu, David J.
3
2018
Best possible information-theoretic MPC. Zbl 1430.94073
Halevi, Shai; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal
2
2018
On the message complexity of secure multiparty computation. Zbl 1441.94081
Ishai, Yuval; Mittal, Manika; Ostrovsky, Rafail
2
2018
Two-message witness indistinguishability and secure computation in the plain model from new assumptions. Zbl 1417.94040
Badrinarayanan, Saikrishna; Garg, Sanjam; Ishai, Yuval; Sahai, Amit; Wadia, Akshay
12
2017
Group-based secure computation: optimizing rounds, communication, and computation. Zbl 1415.94414
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
11
2017
Lattice-based SNARGs and their application to more efficient obfuscation. Zbl 1415.94412
Boneh, Dan; Ishai, Yuval; Sahai, Amit; Wu, David J.
7
2017
Secure arithmetic computation with constant computational overhead. Zbl 1407.94073
Applebaum, Benny; Damgård, Ivan; Ishai, Yuval; Nielsen, Michael; Zichron, Lior
7
2017
Low-complexity cryptographic hash functions. Zbl 1402.94051
Applebaum, Benny; Haramaty-Krasne, Naama; Ishai, Yuval; Kushilevitz, Eyal; Vaikuntanathan, Vinod
6
2017
Can we access a database both locally and privately? Zbl 1416.68062
Boyle, Elette; Ishai, Yuval; Pass, Rafael; Wootters, Mary
5
2017
Ad hoc PSM protocols: secure computation without coordination. Zbl 1415.94408
Beimel, Amos; Ishai, Yuval; Kushilevitz, Eyal
4
2017
The price of low communication in secure multi-party computation. Zbl 1407.94107
Garay, Juan; Ishai, Yuval; Ostrovsky, Rafail; Zikas, Vassilis
4
2017
Non-interactive multiparty computation without correlated randomness. Zbl 1417.94061
Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Komargodski, Ilan; Sahai, Amit; Yogev, Eylon
3
2017
Actively secure garbled circuits with constant communication overhead in the plain model. Zbl 1406.94059
Hazay, Carmit; Ishai, Yuval; Venkitasubramaniam, Muthuramakrishnan
3
2017
How to construct a leakage-resilient (stateless) trusted party. Zbl 1412.94176
Genkin, Daniel; Ishai, Yuval; Weiss, Mor
3
2017
Near-optimal secret sharing and error correcting codes in \(\mathsf{AC}^0\). Zbl 1412.94223
Cheng, Kuan; Ishai, Yuval; Li, Xin
1
2017
Breaking the circuit size barrier for secure computation under DDH. Zbl 1384.94038
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
25
2016
Bounded indistinguishability and the complexity of recovering secrets. Zbl 1406.94027
Bogdanov, Andrej; Ishai, Yuval; Viola, Emanuele; Williamson, Christopher
10
2016
Secure protocol transformations. Zbl 1372.94430
Ishai, Yuval; Kushilevitz, Eyal; Prabhakaran, Manoj; Sahai, Amit; Yu, Ching-Hua
7
2016
Secure multiparty computation with general interaction patterns. Zbl 1334.94081
Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Kushilevitz, Eyal; Rabin, Tal
7
2016
Binary AMD circuits from secure multiparty computation. Zbl 1406.94057
Genkin, Daniel; Ishai, Yuval; Weiss, Mor
6
2016
Making the best of a leaky situation: zero-knowledge PCPs from leakage-resilient circuits. Zbl 1375.94136
Ishai, Yuval; Weiss, Mor; Yang, Guang
4
2016
Distribution design. Zbl 1334.94058
Beimel, Amos; Gabizon, Ariel; Ishai, Yuval; Kushilevitz, Eyal
4
2016
Private large-scale databases with distributed searchable symmetric encryption. Zbl 1333.68103
Ishai, Yuval; Kushilevitz, Eyal; Lu, Steve; Ostrovsky, Rafail
3
2016
On public key encryption from noisy codewords. Zbl 1395.94267
Ben-Sasson, Eli; Ben-Tov, Iddo; Damgård, Ivan; Ishai, Yuval; Ron-Zewi, Noga
1
2016
Function secret sharing. Zbl 1371.94664
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
28
2015
Public-coin differing-inputs obfuscation and its applications. Zbl 1336.94054
Ishai, Yuval; Pandey, Omkant; Sahai, Amit
16
2015
Efficient multi-party computation: from passive to active security via secure SIMD circuits. Zbl 1352.94037
Genkin, Daniel; Ishai, Yuval; Polychroniadou, Antigoni
10
2015
Secure computation with minimal interaction, revisited. Zbl 1352.94075
Ishai, Yuval; Kumaresan, Ranjit; Kushilevitz, Eyal; Paskin-Cherniavsky, Anat
8
2015
Cryptography with one-way communication. Zbl 1351.94046
Garg, Sanjam; Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
4
2015
Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Zbl 1332.94066
Gentry, Craig; Groth, Jens; Ishai, Yuval; Peikert, Chris; Sahai, Amit; Smith, Adam
4
2015
Encoding functions with constant online rate, or how to compress garbled circuit keys. Zbl 1362.94016
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
3
2015
Statistical randomized encodings: a complexity theoretic view. Zbl 1440.68073
Agrawal, Shweta; Ishai, Yuval; Khurana, Dakshita; Paskin-Cherniavsky, Anat
3
2015
Parallel hashing via list recoverability. Zbl 1351.94050
Haitner, Iftach; Ishai, Yuval; Omri, Eran; Shaltiel, Ronen
2
2015
Secure computation from leaky correlated randomness. Zbl 1352.94038
Gupta, Divya; Ishai, Yuval; Maji, Hemanta K.; Sahai, Amit
2
2015
Circuits resilient to additive attacks with applications to secure computation. Zbl 1315.94073
Genkin, Daniel; Ishai, Yuval; Prabhakaran, Manoj M.; Sahai, Amit; Tromer, Eran
23
2014
On the cryptographic complexity of the worst functions. Zbl 1326.94072
Beimel, Amos; Ishai, Yuval; Kumaresan, Ranjit; Kushilevitz, Eyal
21
2014
Partial garbling schemes and their applications. Zbl 1410.68112
Ishai, Yuval; Wee, Hoeteck
20
2014
Secure multi-party computation with identifiable abort. Zbl 1335.94053
Ishai, Yuval; Ostrovsky, Rafail; Zikas, Vassilis
19
2014
Distributed point functions and their applications. Zbl 1328.68054
Gilboa, Niv; Ishai, Yuval
16
2014
Non-interactive secure multiparty computation. Zbl 1335.94030
Beimel, Amos; Gabizon, Ariel; Ishai, Yuval; Kushilevitz, Eyal; Meldgaard, Sigurd; Paskin-Cherniavsky, Anat
15
2014
Probabilistically checkable proofs of proximity with zero-knowledge. Zbl 1323.94117
Ishai, Yuval; Weiss, Mor
7
2014
On the complexity of UC commitments. Zbl 1328.68027
Garay, Juan A.; Ishai, Yuval; Kumaresan, Ranjit; Wee, Hoeteck
6
2014
Linear-time encodable codes meeting the Gilbert-Varshamov bound and their cryptographic applications. Zbl 1364.94595
Druk, Erez; Ishai, Yuval
6
2014
How to garble arithmetic circuits. Zbl 1302.94034
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
4
2014
On linear-size pseudorandom generators and hardcore functions. Zbl 1384.94032
Baron, Joshua; Ishai, Yuval; Ostrovsky, Rafail
1
2014
Succinct non-interactive arguments via linear interactive proofs. Zbl 1316.68056
Bitansky, Nir; Chiesa, Alessandro; Ishai, Yuval; Paneth, Omer; Ostrovsky, Rafail
31
2013
On the power of correlated randomness in secure computation. Zbl 1315.94080
Ishai, Yuval; Kushilevitz, Eyal; Meldgaard, Sigurd; Orlandi, Claudio; Paskin-Cherniavsky, Anat
15
2013
Encoding functions with constant online rate or how to compress garbled circuits keys. Zbl 1298.94076
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
10
2013
Efficient multiparty protocols via log-depth threshold formulae. (Extended abstract). Zbl 1316.94066
Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval; Kölker, Jonas; Miltersen, Peter Bro; Raz, Ran; Rothblum, Ron D.
10
2013
Robust pseudorandom generators. Zbl 1336.94053
Ishai, Yuval; Kushilevitz, Eyal; Li, Xin; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit; Zuckerman, David
5
2013
Zero knowledge LTCs and their applications. Zbl 1405.68114
Ishai, Yuval; Sahai, Amit; Viderman, Michael; Weiss, Mor
3
2013
Lossy chains and fractional secret sharing. Zbl 1354.94057
Ishai, Yuval; Kushilevitz, Eyal; Strulovich, Omer
2
2013
Identifying cheaters without an honest majority. Zbl 1303.94083
Ishai, Yuval; Ostrovsky, Rafail; Seyalioglu, Hakan
8
2012
On efficient zero-knowledge PCPs. Zbl 1304.68056
Ishai, Yuval; Mahmoody, Mohammad; Sahai, Amit
8
2012
From randomizing polynomials to parallel algorithms. Zbl 1348.94059
Ishai, Yuval; Kushilevitz, Eyal; Paskin-Cherniavsky, Anat
1
2012
Efficient non-interactive secure computation. Zbl 1290.94151
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit
26
2011
How to garble arithmetic circuits. Zbl 1292.94186
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
12
2011
Black-box constructions of protocols for secure computation. Zbl 1236.94056
Haitner, Iftach; Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
11
2011
Constant-rate oblivious transfer from noisy channels. Zbl 1290.94092
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit; Wullschleger, Jürg
7
2011
On achieving the “best of both worlds” in secure multiparty computation. Zbl 1215.68035
Ishai, Yuval; Katz, Jonathan; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
2
2011
From secrecy to soundness: efficient verification via secure computation (extended abstract). Zbl 1287.68041
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
28
2010
Founding cryptography on tamper-proof hardware tokens. Zbl 1274.94072
Goyal, Vipul; Ishai, Yuval; Sahai, Amit; Venkatesan, Ramarathnam; Wadia, Akshay
27
2010
Bounded key-dependent message security. Zbl 1280.94038
Barak, Boaz; Haitner, Iftach; Hofheinz, Dennis; Ishai, Yuval
24
2010
Perfectly secure multiparty computation and the computational overhead of cryptography. Zbl 1280.94046
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel
23
2010
Secure multiparty computation with minimal interaction. Zbl 1283.94093
Ishai, Yuval; Kushilevitz, Eyal; Paskin, Anat
12
2010
Interactive locking, zero-knowledge PCPs, and unconditional cryptography. Zbl 1280.94063
Goyal, Vipul; Ishai, Yuval; Mahmoody, Mohammad; Sahai, Amit
9
2010
On \(d\)-multiplicative secret sharing. Zbl 1201.94074
Barkol, Omer; Ishai, Yuval; Weinreb, Enav
5
2010
On complete primitives for fairness. Zbl 1274.94071
Gordon, Dov; Ishai, Yuval; Moran, Tal; Ostrovsky, Rafail; Sahai, Amit
4
2010
On invertible sampling and adaptive security. Zbl 1253.94052
Ishai, Yuval; Kumarasubramanian, Abishek; Orlandi, Claudio; Sahai, Amit
3
2010
On locally decodable codes, self-correctable codes, and \(t\)-private PIR. Zbl 1200.94055
Barkol, Omer; Ishai, Yuval; Weinreb, Enav
2
2010
Secure arithmetic computation with no honest majority. Zbl 1213.94111
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit
31
2009
Zero-knowledge proofs from secure multiparty computation. Zbl 1192.68239
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
18
2009
Cryptography with constant input locality. Zbl 1183.94018
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
7
2009
Extracting correlations. Zbl 1292.94080
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
7
2009
Private multiparty sampling and approximation of vector combinations. Zbl 1172.68017
Ishai, Yuval; Malkin, Tal; Strauss, Martin J.; Wright, Rebecca N.
1
2009
Founding cryptography on oblivious transfer – efficiently. Zbl 1183.94037
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit
87
2008
Cryptography with constant computational overhead. Zbl 1231.94050
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Ratall; Sahai, Amit
26
2008
Scalable multiparty computation with nearly optimal work and resilience. Zbl 1183.68082
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel; Nielsen, Jesper Buus; Smith, Adam
20
2008
OT-combiners via secure computation. Zbl 1162.94366
Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal; Nielsen, Jesper Buus
11
2008
On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\). Zbl 1242.94016
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
9
2008
Sub-linear zero-knowledge argument for correctness of a shuffle. Zbl 1149.94319
Groth, Jens; Ishai, Yuval
7
2008
Basing weak public-key cryptography on strong one-way functions. Zbl 1162.94339
Biham, Eli; Goren, Yaron J.; Ishai, Yuval
6
2008
...and 50 more Documents
all top 5

Cited by 1,328 Authors

49 Ishai, Yuval
29 Hazay, Carmit
26 Applebaum, Benny
26 Ostrovsky, Rafail
19 Sahai, Amit
18 Venkitasubramaniam, Muthuramakrishnan
16 Vaikuntanathan, Vinod
14 Wichs, Daniel
13 Kushilevitz, Eyal
13 Lin, Huijia
13 Nielsen, Jesper Buus
13 Scholl, Peter
12 Brakerski, Zvika
12 Chiesa, Alessandro
12 Damgård, Ivan Bjerre
12 Faust, Sebastian
12 Lindell, Yehuda
12 Pass, Rafael
11 Beimel, Amos
11 Bogdanov, Andrej
11 Boyle, Elette
11 Canetti, Ran
11 Jain, Abhishek
11 Khurana, Dakshita
11 Polychroniadou, Antigoni
11 Rosulek, Mike
11 Wee, Hoeteck
11 Zikas, Vassilis
10 Gilboa, Niv
10 Mohassel, Payman
10 Orsini, Emmanuela
10 Pinkas, Benny
10 Rosen, Alon
10 Standaert, Francois-Xavier
10 Venturi, Daniele
9 Ananth, Prabhanjan Vijendra
9 Goyal, Vipul
9 Katz, Jonathan N.
9 Smart, Nigel P.
9 Srinivasan, Akshayaram
8 Bitansky, Nir
8 Cohen, Ran
8 Komargodski, Ilan
8 Malkin, Tal G.
8 Patra, Arpita
8 Segev, Gil
8 Wang, Huaxiong
8 Waters, Brent
7 Döttling, Nico
7 Garg, Sanjam
7 Halevi, Shai
7 Orlandi, Claudio
7 Padró, Carles
7 Prabhakaran, Manoj M.
7 Raykov, Pavel
7 Rothblum, Guy N.
7 Safavi-Naini, Reihaneh
7 Shi, Elaine
6 Boneh, Dan
6 Chung, Kai-Min
6 Farràs, Oriol
6 Garay, Juan A.
6 Goldwasser, Shafi
6 Jain, Aayush
6 Maji, Hemanta K.
6 Pandey, Omkant
6 Paskin-Cherniavsky, Anat
6 Ranellucci, Samuel
6 Rothblum, Ron D.
6 Schröder, Dominique
6 Tanaka, Keisuke
6 Viola, Emanuele
6 Weiss, Mor
6 Yu, Yu
6 Zhang, Jiang
6 Zhang, Liang Feng
6 Zhou, Hong-Sheng
5 Baum, Carsten
5 Ben-Sasson, Eli
5 Catalano, Dario
5 Choudhary, Ashish
5 Couteau, Geoffroy
5 Dachman-Soled, Dana
5 Fischlin, Marc
5 Gennaro, Rosario
5 Guo, Siyao
5 Kolesnikov, Vladimir
5 Koppula, Venkata
5 Libert, Benoît
5 Omri, Eran
5 Paneth, Omer
5 Song, Yifan
5 Soria-Vazquez, Eduardo
5 Tauman Kalai, Yael
5 Tromer, Eran
5 Vasudevan, Prashant Nalini
5 Visconti, Ivan
5 Wu, David J.
5 Yanai, Avishay
5 Yung, Moti
...and 1,228 more Authors
all top 5

Cited in 51 Serials

105 Journal of Cryptology
29 Theoretical Computer Science
26 SIAM Journal on Computing
23 Designs, Codes and Cryptography
15 International Journal of Theoretical Physics
15 Information Sciences
10 Computational Complexity
9 Information Processing Letters
8 Information and Computation
7 Algorithmica
7 Quantum Information Processing
6 Journal of Computer and System Sciences
6 Cryptography and Communications
5 Discrete Applied Mathematics
5 Distributed Computing
5 Advances in Mathematics of Communications
3 Linear Algebra and its Applications
3 Theory of Computing Systems
3 ACM Transactions on Computation Theory
2 SIAM Journal on Discrete Mathematics
2 Journal of Parallel and Distributed Computing
2 Soft Computing
2 Journal of the ACM
2 Journal of Mathematical Cryptology
1 Computers & Mathematics with Applications
1 Advances in Applied Mathematics
1 Combinatorica
1 Journal of Complexity
1 Mathematical and Computer Modelling
1 Annals of Operations Research
1 Machine Learning
1 Random Structures & Algorithms
1 Finite Fields and their Applications
1 Annals of Mathematics and Artificial Intelligence
1 Nonlinear Dynamics
1 Physical Review Letters
1 Journal of Applied Mathematics and Computing
1 Hacettepe Journal of Mathematics and Statistics
1 International Journal of Quantum Information
1 Foundations of Physics
1 Science in China. Series F
1 Journal of Shanghai Jiaotong University (Science)
1 Science China. Mathematics
1 Science China. Information Sciences
1 Symmetry
1 Theory of Computing
1 Frontiers of Computer Science
1 Forum of Mathematics, Sigma
1 Computer Science Review
1 Journal of Algebra, Combinatorics, Discrete Structures and Applications
1 Matematicheskie Voprosy Kriptografii

Citations by Year