Edit Profile (opens in new tab) Pinkas, Benny Compute Distance To: Compute Author ID: pinkas.benny Published as: Pinkas, Benny Documents Indexed: 52 Publications since 1991 Co-Authors: 50 Co-Authors with 50 Joint Publications 1,087 Co-Co-Authors all top 5 Co-Authors 2 single-authored 14 Lindell, Yehuda 14 Naor, Moni 7 Yanai, Avishay 4 Schneider, Thomas 4 Smart, Nigel P. 3 Freedman, Michael J. 3 Rosulek, Mike 3 Trieu, Ni 2 Abraham, Ittai 2 Aggarwal, Gagan 2 Frederiksen, Tore Kasper 2 Gradwohl, Ronen 2 Mishra, Nina 2 Nissim, Kobbi 2 Reingold, Omer 2 Rothblum, Guy N. 1 Afshar, Arash 1 Boneh, Dan 1 Chor, Benny 1 Fiat, Amos 1 Fischlin, Marc 1 Fletcher, Christopher W. 1 Garimella, Gayathri 1 Goh, Eu-Jin 1 Golle, Philippe 1 Gueron, Shay 1 Halevi, Shai 1 Harchol, Yotam 1 Hazay, Carmit 1 Inbar, Roi 1 Ishai, Yuval 1 Jarrous, Ayman 1 Manulis, Mark 1 McInnes, James L. 1 Mohassel, Payman 1 Nayak, Kartik 1 Nof, Ariel 1 Omri, Eran 1 Osheter, Valery 1 Oxman, Eli 1 Poettering, Bertram 1 Reinman, Tzachy 1 Ren, Ling 1 Riva, Ben 1 Sadeghi, Ahmad-Reza 1 Tkachenko, Oleksandr 1 Visconti, Ivan 1 Weinert, Christian 1 Wieder, Udi 1 Williams, Stephen C. Serials 9 Journal of Cryptology 1 IEEE Transactions on Information Theory 1 SIAM Journal on Computing 1 Theory of Computing Systems 1 International Journal of Applied Cryptography Fields 49 Information and communication theory, circuits (94-XX) 29 Computer science (68-XX) 1 Number theory (11-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 46 Publications have been cited 700 times in 442 Documents Cited by ▼ Year ▼ A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364Lindell, Yehuda; Pinkas, Benny 63 2009 Efficient oblivious transfer protocols. Zbl 0991.94045Naor, Moni; Pinkas, Benny 52 2001 Efficient private matching and set intersection. Zbl 1122.94416Freedman, Michael J.; Nissim, Kobbi; Pinkas, Benny 46 2004 An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1141.94362Lindell, Yehuda; Pinkas, Benny 42 2007 Oblivious transfer and polynomial evaluation. Zbl 1345.68018Naor, Moni; Pinkas, Benny 29 1999 Privacy preserving data mining. Zbl 1010.94008Lindell, Yehuda; Pinkas, Benny 28 2002 Tracing traitors. Zbl 1007.94017Chor, Benny; Fiat, Amos; Naor, Moni; Pinkas, Benny 28 2000 Secure two-party computation is practical. Zbl 1267.94091Pinkas, Benny; Schneider, Thomas; Smart, Nigel P.; Williams, Stephen C. 27 2009 Keyword search and oblivious pseudorandom functions. Zbl 1079.94546Freedman, Michael J.; Ishai, Yuval; Pinkas, Benny; Reingold, Omer 26 2005 Efficient trace and revoke schemes. Zbl 0999.94522Naor, Moni; Pinkas, Benny 26 2001 Oblivious transfer with adaptive queries. Zbl 0942.94011Naor, Moni; Pinkas, Benny 25 1999 Privacy preserving data mining. Zbl 0989.68506Lindell, Yehuda; Pinkas, Benny 24 2000 Secure two-party computation via cut-and-choose oblivious transfer. Zbl 1281.94037Lindell, Yehuda; Pinkas, Benny 23 2011 Efficient constant round multi-party computation combining BMR and SPDZ. Zbl 1352.94049Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P.; Yanai, Avishay 21 2015 Oblivious polynomial evaluation. Zbl 1101.94026Naor, Moni; Pinkas, Benny 17 2006 Distributed pseudo-random functions and KDCs. Zbl 0931.94046Naor, Moni; Pinkas, Benny; Reingold, Omer 16 1999 Secure computation on the web: computing without simultaneous interaction. Zbl 1287.94070Halevi, Shai; Lindell, Yehuda; Pinkas, Benny 15 2011 Visual authentication and identification. Zbl 0880.94008Naor, Moni; Pinkas, Benny 14 1997 Non-interactive secure computation based on cut-and-choose. Zbl 1332.94053Afshar, Arash; Mohassel, Payman; Pinkas, Benny; Riva, Ben 13 2014 Fast garbling of circuits under standard assumptions. Zbl 1400.94146Gueron, Shay; Lindell, Yehuda; Nof, Ariel; Pinkas, Benny 13 2018 The IPS compiler: optimizations, variants and concrete efficiency. Zbl 1288.68023Lindell, Yehuda; Oxman, Eli; Pinkas, Benny 12 2011 Secure two-party computation via cut-and-choose oblivious transfer. Zbl 1278.94056Lindell, Yehuda; Pinkas, Benny 10 2012 Fair secure two-party computation. Zbl 1038.94544Pinkas, Benny 9 2003 Computationally secure oblivious transfer. Zbl 1075.68026Naor, Moni; Pinkas, Benny 9 2005 Oblivious RAM revisited. Zbl 1283.94102Pinkas, Benny; Reinman, Tzachy 9 2010 Implementing two-party computation efficiently with security against malicious adversaries. Zbl 1180.68152Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P. 9 2008 Secure computation of the \(k\)th-ranked element. Zbl 1122.68422Aggarwal, Gagan; Mishra, Nina; Pinkas, Benny 9 2004 Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles. Zbl 1179.68055Gradwohl, Ronen; Naor, Moni; Pinkas, Benny; Rothblum, Guy N. 9 2009 SpOT-light: lightweight private set intersection from sparse OT extension. Zbl 07178322Pinkas, Benny; Rosulek, Mike; Trieu, Ni; Yanai, Avishay 8 2019 Asymptotically tight bounds for composing ORAM with PIR. Zbl 1404.94033Abraham, Ittai; Fletcher, Christopher W.; Nayak, Kartik; Pinkas, Benny; Ren, Ling 8 2017 Efficient circuit-based PSI via cuckoo hashing. Zbl 1415.94456Pinkas, Benny; Schneider, Thomas; Weinert, Christian; Wieder, Udi 8 2018 Threshold traitor tracing. Zbl 0938.68041Naor, Moni; Pinkas, Benny 8 1998 Efficient set intersection with simulation-based security. Zbl 1351.94044Freedman, Michael J.; Hazay, Carmit; Nissim, Kobbi; Pinkas, Benny 6 2016 Efficient circuit-based PSI with linear communication. Zbl 07162726Pinkas, Benny; Schneider, Thomas; Tkachenko, Oleksandr; Yanai, Avishay 5 2019 Distributed oblivious transfer. Zbl 0974.94020Naor, Moni; Pinkas, Benny 5 2000 Fast distributed RSA key generation for semi-honest and malicious adversaries. Zbl 1436.94061Frederiksen, Tore Kasper; Lindell, Yehuda; Osheter, Valery; Pinkas, Benny 4 2018 PSI from PaXoS: fast, malicious private set intersection. Zbl 1492.94160Pinkas, Benny; Rosulek, Mike; Trieu, Ni; Yanai, Avishay 3 2020 Efficient scalable multiparty private set-intersection via garbled Bloom filters. Zbl 06957556Inbar, Roi; Omri, Eran; Pinkas, Benny 3 2018 Committed MPC – maliciously secure multiparty computation from homomorphic commitments. Zbl 1441.94078Frederiksen, Tore K.; Pinkas, Benny; Yanai, Avishay 3 2018 An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1314.94086Lindell, Yehuda; Pinkas, Benny 3 2015 Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles. Zbl 1201.68050Gradwohl, Ronen; Naor, Moni; Pinkas, Benny; Rothblum, Guy N. 3 2007 Secure set intersection with untrusted hardware tokens. Zbl 1285.68009Fischlin, Marc; Pinkas, Benny; Sadeghi, Ahmad-Reza; Schneider, Thomas; Visconti, Ivan 2 2011 Secure and efficient metering. Zbl 1028.68525Naor, Moni; Pinkas, Benny 2 1998 Privacy-preserving group discovery with linear complexity. Zbl 1443.94095Manulis, Mark; Pinkas, Benny; Poettering, Bertram 2 2010 Secure computation of functionalities based on Hamming distance and its application to computing document similarity. Zbl 1307.94086Pinkas, Benny; Jarrous, Ayman 2 2013 On the impossibility of private key cryptography with weakly random keys. Zbl 0786.94012McInnes, James L.; Pinkas, Benny 1 1991 PSI from PaXoS: fast, malicious private set intersection. Zbl 1492.94160Pinkas, Benny; Rosulek, Mike; Trieu, Ni; Yanai, Avishay 3 2020 SpOT-light: lightweight private set intersection from sparse OT extension. Zbl 07178322Pinkas, Benny; Rosulek, Mike; Trieu, Ni; Yanai, Avishay 8 2019 Efficient circuit-based PSI with linear communication. Zbl 07162726Pinkas, Benny; Schneider, Thomas; Tkachenko, Oleksandr; Yanai, Avishay 5 2019 Fast garbling of circuits under standard assumptions. Zbl 1400.94146Gueron, Shay; Lindell, Yehuda; Nof, Ariel; Pinkas, Benny 13 2018 Efficient circuit-based PSI via cuckoo hashing. Zbl 1415.94456Pinkas, Benny; Schneider, Thomas; Weinert, Christian; Wieder, Udi 8 2018 Fast distributed RSA key generation for semi-honest and malicious adversaries. Zbl 1436.94061Frederiksen, Tore Kasper; Lindell, Yehuda; Osheter, Valery; Pinkas, Benny 4 2018 Efficient scalable multiparty private set-intersection via garbled Bloom filters. Zbl 06957556Inbar, Roi; Omri, Eran; Pinkas, Benny 3 2018 Committed MPC – maliciously secure multiparty computation from homomorphic commitments. Zbl 1441.94078Frederiksen, Tore K.; Pinkas, Benny; Yanai, Avishay 3 2018 Asymptotically tight bounds for composing ORAM with PIR. Zbl 1404.94033Abraham, Ittai; Fletcher, Christopher W.; Nayak, Kartik; Pinkas, Benny; Ren, Ling 8 2017 Efficient set intersection with simulation-based security. Zbl 1351.94044Freedman, Michael J.; Hazay, Carmit; Nissim, Kobbi; Pinkas, Benny 6 2016 Efficient constant round multi-party computation combining BMR and SPDZ. Zbl 1352.94049Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P.; Yanai, Avishay 21 2015 An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1314.94086Lindell, Yehuda; Pinkas, Benny 3 2015 Non-interactive secure computation based on cut-and-choose. Zbl 1332.94053Afshar, Arash; Mohassel, Payman; Pinkas, Benny; Riva, Ben 13 2014 Secure computation of functionalities based on Hamming distance and its application to computing document similarity. Zbl 1307.94086Pinkas, Benny; Jarrous, Ayman 2 2013 Secure two-party computation via cut-and-choose oblivious transfer. Zbl 1278.94056Lindell, Yehuda; Pinkas, Benny 10 2012 Secure two-party computation via cut-and-choose oblivious transfer. Zbl 1281.94037Lindell, Yehuda; Pinkas, Benny 23 2011 Secure computation on the web: computing without simultaneous interaction. Zbl 1287.94070Halevi, Shai; Lindell, Yehuda; Pinkas, Benny 15 2011 The IPS compiler: optimizations, variants and concrete efficiency. Zbl 1288.68023Lindell, Yehuda; Oxman, Eli; Pinkas, Benny 12 2011 Secure set intersection with untrusted hardware tokens. Zbl 1285.68009Fischlin, Marc; Pinkas, Benny; Sadeghi, Ahmad-Reza; Schneider, Thomas; Visconti, Ivan 2 2011 Oblivious RAM revisited. Zbl 1283.94102Pinkas, Benny; Reinman, Tzachy 9 2010 Privacy-preserving group discovery with linear complexity. Zbl 1443.94095Manulis, Mark; Pinkas, Benny; Poettering, Bertram 2 2010 A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364Lindell, Yehuda; Pinkas, Benny 63 2009 Secure two-party computation is practical. Zbl 1267.94091Pinkas, Benny; Schneider, Thomas; Smart, Nigel P.; Williams, Stephen C. 27 2009 Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles. Zbl 1179.68055Gradwohl, Ronen; Naor, Moni; Pinkas, Benny; Rothblum, Guy N. 9 2009 Implementing two-party computation efficiently with security against malicious adversaries. Zbl 1180.68152Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P. 9 2008 An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1141.94362Lindell, Yehuda; Pinkas, Benny 42 2007 Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles. Zbl 1201.68050Gradwohl, Ronen; Naor, Moni; Pinkas, Benny; Rothblum, Guy N. 3 2007 Oblivious polynomial evaluation. Zbl 1101.94026Naor, Moni; Pinkas, Benny 17 2006 Keyword search and oblivious pseudorandom functions. Zbl 1079.94546Freedman, Michael J.; Ishai, Yuval; Pinkas, Benny; Reingold, Omer 26 2005 Computationally secure oblivious transfer. Zbl 1075.68026Naor, Moni; Pinkas, Benny 9 2005 Efficient private matching and set intersection. Zbl 1122.94416Freedman, Michael J.; Nissim, Kobbi; Pinkas, Benny 46 2004 Secure computation of the \(k\)th-ranked element. Zbl 1122.68422Aggarwal, Gagan; Mishra, Nina; Pinkas, Benny 9 2004 Fair secure two-party computation. Zbl 1038.94544Pinkas, Benny 9 2003 Privacy preserving data mining. Zbl 1010.94008Lindell, Yehuda; Pinkas, Benny 28 2002 Efficient oblivious transfer protocols. Zbl 0991.94045Naor, Moni; Pinkas, Benny 52 2001 Efficient trace and revoke schemes. Zbl 0999.94522Naor, Moni; Pinkas, Benny 26 2001 Tracing traitors. Zbl 1007.94017Chor, Benny; Fiat, Amos; Naor, Moni; Pinkas, Benny 28 2000 Privacy preserving data mining. Zbl 0989.68506Lindell, Yehuda; Pinkas, Benny 24 2000 Distributed oblivious transfer. Zbl 0974.94020Naor, Moni; Pinkas, Benny 5 2000 Oblivious transfer and polynomial evaluation. Zbl 1345.68018Naor, Moni; Pinkas, Benny 29 1999 Oblivious transfer with adaptive queries. Zbl 0942.94011Naor, Moni; Pinkas, Benny 25 1999 Distributed pseudo-random functions and KDCs. Zbl 0931.94046Naor, Moni; Pinkas, Benny; Reingold, Omer 16 1999 Threshold traitor tracing. Zbl 0938.68041Naor, Moni; Pinkas, Benny 8 1998 Secure and efficient metering. Zbl 1028.68525Naor, Moni; Pinkas, Benny 2 1998 Visual authentication and identification. Zbl 0880.94008Naor, Moni; Pinkas, Benny 14 1997 On the impossibility of private key cryptography with weakly random keys. Zbl 0786.94012McInnes, James L.; Pinkas, Benny 1 1991 all cited Publications top 5 cited Publications all top 5 Cited by 845 Authors 25 Hazay, Carmit 12 Lindell, Yehuda 12 Ostrovsky, Rafail 11 Ishai, Yuval 11 Pinkas, Benny 10 Venkitasubramaniam, Muthuramakrishnan 9 Katz, Jonathan N. 9 Mohassel, Payman 9 Wichs, Daniel 8 Rosulek, Mike 7 Mu, Yi 7 Polychroniadou, Antigoni 6 Miyahara, Daiki 6 Mizuki, Takaaki 6 Orsini, Emmanuela 6 Scholl, Peter 6 Smart, Nigel P. 6 Srinivasan, Akshayaram 6 Susilo, Willy 5 Brakerski, Zvika 5 D’Arco, Paolo 5 Döttling, Nico 5 Garg, Sanjam 5 Guo, Fuchun 5 Kabatiansky, Grigorii A. 5 Kolesnikov, Vladimir 5 Lai, Jianchang 5 Li, Shundong 5 Libert, Benoît 5 Moran, Tal 5 Naor, Moni 5 Soria-Vazquez, Eduardo 5 Vaikuntanathan, Vinod 5 Yanai, Avishay 5 Zikas, Vassilis 4 Bitansky, Nir 4 Blundo, Carlo 4 Boneh, Dan 4 Chen, Rongmao 4 Chevalier, Céline 4 Choi, Seung Geol 4 Cohen, Ran 4 Garay, Juan A. 4 Goyal, Vipul 4 Haitner, Iftach 4 Halevi, Shai 4 Jain, Abhishek 4 Lafourcade, Pascal 4 Malkin, Tal G. 4 Orlandi, Claudio 4 Pointcheval, David 4 Rindal, Peter 4 Ruangwises, Suthee 4 Sahai, Amit 4 Schröder, Dominique 4 Shi, Runhua 4 Toft, Tomas 4 Visconti, Ivan 4 Wang, Daoshun 4 Wu, David J. 4 Zhandry, Mark 4 Zhang, Shun 4 Zhou, Hong-Sheng 3 Applebaum, Benny 3 Attrapadung, Nuttapong 3 Badrinarayanan, Saikrishna 3 Benhamouda, Fabrice 3 Blazy, Olivier 3 Ciampi, Michele 3 Couteau, Geoffroy 3 Dai, Yiqi 3 Damgård, Ivan Bjerre 3 Debnath, Sumit Kumar 3 Deng, Robert Huijie 3 Domingo-Ferrer, Josep 3 Fernandez, Marcel 3 Fischlin, Marc 3 Ghodosi, Hossein 3 Gordon, S. Dov 3 Hofheinz, Dennis 3 Itoh, Toshiya 3 Jafargholi, Zahra 3 Jiang, Peng 3 Katzenbeisser, Stefan 3 Khurana, Dakshita 3 Komargodski, Ilan 3 Kurosawa, Kaoru 3 Li, Jin 3 Lin, Huijia 3 Nielsen, Jesper Buus 3 Nissim, Kobbi 3 Paneth, Omer 3 Patra, Arpita 3 Phan Duong Hieu 3 Raghuraman, Srinivasan 3 Robert, Léo 3 Safavi-Naini, Reihaneh 3 Schneider, Thomas 3 Segev, Gil 3 Shyu, Shyong Jian ...and 745 more Authors all top 5 Cited in 59 Serials 50 Journal of Cryptology 22 Designs, Codes and Cryptography 21 Information Sciences 18 Theoretical Computer Science 9 SIAM Journal on Computing 5 Information Processing Letters 5 Pattern Recognition 5 Quantum Information Processing 4 Journal of Computer and System Sciences 4 Algorithmica 4 Advances in Mathematics of Communications 3 International Journal of Theoretical Physics 3 Problems of Information Transmission 3 Computing 3 Journal of Complexity 3 Science in China. Series F 2 Discrete Applied Mathematics 2 International Journal of Foundations of Computer Science 2 Distributed Computing 2 Soft Computing 2 Data Mining and Knowledge Discovery 2 Journal of Discrete Mathematical Sciences & Cryptography 2 Mathematical Biosciences and Engineering 2 Journal of Mathematical Cryptology 2 Science China. Information Sciences 1 Computers & Mathematics with Applications 1 IEEE Transactions on Information Theory 1 Applied Mathematics and Computation 1 Automatica 1 Journal of Combinatorial Theory. Series A 1 Synthese 1 Cryptologia 1 Journal of Computer Science and Technology 1 Information and Computation 1 Mathematical and Computer Modelling 1 Neural Computation 1 European Journal of Operational Research 1 Computational Statistics and Data Analysis 1 Finite Fields and their Applications 1 Mathematical Problems in Engineering 1 Theory of Computing Systems 1 Wuhan University Journal of Natural Sciences (WUJNS) 1 International Journal of Applied Mathematics and Computer Science 1 Sādhanā 1 1 International Journal of Wavelets, Multiresolution and Information Processing 1 International Journal of Quantum Information 1 Mathematics in Computer Science 1 Optimization Letters 1 Computational & Mathematical Methods in Medicine 1 Journal of Physics A: Mathematical and Theoretical 1 Statistical Analysis and Data Mining 1 The Annals of Applied Statistics 1 Arabian Journal for Science and Engineering 1 Statistics and Computing 1 Computer Science Review 1 Journal of Siberian Federal University. Mathematics & Physics 1 Mathematical Foundations of Computing 1 Japanese Journal of Statistics and Data Science all top 5 Cited in 19 Fields 385 Information and communication theory, circuits (94-XX) 189 Computer science (68-XX) 15 Quantum theory (81-XX) 10 Statistics (62-XX) 9 Combinatorics (05-XX) 5 Operations research, mathematical programming (90-XX) 5 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 3 Number theory (11-XX) 3 Numerical analysis (65-XX) 2 Linear and multilinear algebra; matrix theory (15-XX) 2 Probability theory and stochastic processes (60-XX) 2 Biology and other natural sciences (92-XX) 1 Mathematical logic and foundations (03-XX) 1 Field theory and polynomials (12-XX) 1 Algebraic geometry (14-XX) 1 Approximations and expansions (41-XX) 1 Harmonic analysis on Euclidean spaces (42-XX) 1 Mechanics of particles and systems (70-XX) 1 Geophysics (86-XX) Citations by Year