×
Compute Distance To:
Author ID: pinkas.benny Recent zbMATH articles by "Pinkas, Benny"
Published as: Pinkas, Benny
Documents Indexed: 52 Publications since 1991
Co-Authors: 50 Co-Authors with 50 Joint Publications
1,087 Co-Co-Authors

Publications by Year

Citations contained in zbMATH Open

46 Publications have been cited 700 times in 442 Documents Cited by Year
A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364
Lindell, Yehuda; Pinkas, Benny
63
2009
Efficient oblivious transfer protocols. Zbl 0991.94045
Naor, Moni; Pinkas, Benny
52
2001
Efficient private matching and set intersection. Zbl 1122.94416
Freedman, Michael J.; Nissim, Kobbi; Pinkas, Benny
46
2004
An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1141.94362
Lindell, Yehuda; Pinkas, Benny
42
2007
Oblivious transfer and polynomial evaluation. Zbl 1345.68018
Naor, Moni; Pinkas, Benny
29
1999
Privacy preserving data mining. Zbl 1010.94008
Lindell, Yehuda; Pinkas, Benny
28
2002
Tracing traitors. Zbl 1007.94017
Chor, Benny; Fiat, Amos; Naor, Moni; Pinkas, Benny
28
2000
Secure two-party computation is practical. Zbl 1267.94091
Pinkas, Benny; Schneider, Thomas; Smart, Nigel P.; Williams, Stephen C.
27
2009
Keyword search and oblivious pseudorandom functions. Zbl 1079.94546
Freedman, Michael J.; Ishai, Yuval; Pinkas, Benny; Reingold, Omer
26
2005
Efficient trace and revoke schemes. Zbl 0999.94522
Naor, Moni; Pinkas, Benny
26
2001
Oblivious transfer with adaptive queries. Zbl 0942.94011
Naor, Moni; Pinkas, Benny
25
1999
Privacy preserving data mining. Zbl 0989.68506
Lindell, Yehuda; Pinkas, Benny
24
2000
Secure two-party computation via cut-and-choose oblivious transfer. Zbl 1281.94037
Lindell, Yehuda; Pinkas, Benny
23
2011
Efficient constant round multi-party computation combining BMR and SPDZ. Zbl 1352.94049
Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P.; Yanai, Avishay
21
2015
Oblivious polynomial evaluation. Zbl 1101.94026
Naor, Moni; Pinkas, Benny
17
2006
Distributed pseudo-random functions and KDCs. Zbl 0931.94046
Naor, Moni; Pinkas, Benny; Reingold, Omer
16
1999
Secure computation on the web: computing without simultaneous interaction. Zbl 1287.94070
Halevi, Shai; Lindell, Yehuda; Pinkas, Benny
15
2011
Visual authentication and identification. Zbl 0880.94008
Naor, Moni; Pinkas, Benny
14
1997
Non-interactive secure computation based on cut-and-choose. Zbl 1332.94053
Afshar, Arash; Mohassel, Payman; Pinkas, Benny; Riva, Ben
13
2014
Fast garbling of circuits under standard assumptions. Zbl 1400.94146
Gueron, Shay; Lindell, Yehuda; Nof, Ariel; Pinkas, Benny
13
2018
The IPS compiler: optimizations, variants and concrete efficiency. Zbl 1288.68023
Lindell, Yehuda; Oxman, Eli; Pinkas, Benny
12
2011
Secure two-party computation via cut-and-choose oblivious transfer. Zbl 1278.94056
Lindell, Yehuda; Pinkas, Benny
10
2012
Fair secure two-party computation. Zbl 1038.94544
Pinkas, Benny
9
2003
Computationally secure oblivious transfer. Zbl 1075.68026
Naor, Moni; Pinkas, Benny
9
2005
Oblivious RAM revisited. Zbl 1283.94102
Pinkas, Benny; Reinman, Tzachy
9
2010
Implementing two-party computation efficiently with security against malicious adversaries. Zbl 1180.68152
Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P.
9
2008
Secure computation of the \(k\)th-ranked element. Zbl 1122.68422
Aggarwal, Gagan; Mishra, Nina; Pinkas, Benny
9
2004
Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles. Zbl 1179.68055
Gradwohl, Ronen; Naor, Moni; Pinkas, Benny; Rothblum, Guy N.
9
2009
SpOT-light: lightweight private set intersection from sparse OT extension. Zbl 07178322
Pinkas, Benny; Rosulek, Mike; Trieu, Ni; Yanai, Avishay
8
2019
Asymptotically tight bounds for composing ORAM with PIR. Zbl 1404.94033
Abraham, Ittai; Fletcher, Christopher W.; Nayak, Kartik; Pinkas, Benny; Ren, Ling
8
2017
Efficient circuit-based PSI via cuckoo hashing. Zbl 1415.94456
Pinkas, Benny; Schneider, Thomas; Weinert, Christian; Wieder, Udi
8
2018
Threshold traitor tracing. Zbl 0938.68041
Naor, Moni; Pinkas, Benny
8
1998
Efficient set intersection with simulation-based security. Zbl 1351.94044
Freedman, Michael J.; Hazay, Carmit; Nissim, Kobbi; Pinkas, Benny
6
2016
Efficient circuit-based PSI with linear communication. Zbl 07162726
Pinkas, Benny; Schneider, Thomas; Tkachenko, Oleksandr; Yanai, Avishay
5
2019
Distributed oblivious transfer. Zbl 0974.94020
Naor, Moni; Pinkas, Benny
5
2000
Fast distributed RSA key generation for semi-honest and malicious adversaries. Zbl 1436.94061
Frederiksen, Tore Kasper; Lindell, Yehuda; Osheter, Valery; Pinkas, Benny
4
2018
PSI from PaXoS: fast, malicious private set intersection. Zbl 1492.94160
Pinkas, Benny; Rosulek, Mike; Trieu, Ni; Yanai, Avishay
3
2020
Efficient scalable multiparty private set-intersection via garbled Bloom filters. Zbl 06957556
Inbar, Roi; Omri, Eran; Pinkas, Benny
3
2018
Committed MPC – maliciously secure multiparty computation from homomorphic commitments. Zbl 1441.94078
Frederiksen, Tore K.; Pinkas, Benny; Yanai, Avishay
3
2018
An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1314.94086
Lindell, Yehuda; Pinkas, Benny
3
2015
Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles. Zbl 1201.68050
Gradwohl, Ronen; Naor, Moni; Pinkas, Benny; Rothblum, Guy N.
3
2007
Secure set intersection with untrusted hardware tokens. Zbl 1285.68009
Fischlin, Marc; Pinkas, Benny; Sadeghi, Ahmad-Reza; Schneider, Thomas; Visconti, Ivan
2
2011
Secure and efficient metering. Zbl 1028.68525
Naor, Moni; Pinkas, Benny
2
1998
Privacy-preserving group discovery with linear complexity. Zbl 1443.94095
Manulis, Mark; Pinkas, Benny; Poettering, Bertram
2
2010
Secure computation of functionalities based on Hamming distance and its application to computing document similarity. Zbl 1307.94086
Pinkas, Benny; Jarrous, Ayman
2
2013
On the impossibility of private key cryptography with weakly random keys. Zbl 0786.94012
McInnes, James L.; Pinkas, Benny
1
1991
PSI from PaXoS: fast, malicious private set intersection. Zbl 1492.94160
Pinkas, Benny; Rosulek, Mike; Trieu, Ni; Yanai, Avishay
3
2020
SpOT-light: lightweight private set intersection from sparse OT extension. Zbl 07178322
Pinkas, Benny; Rosulek, Mike; Trieu, Ni; Yanai, Avishay
8
2019
Efficient circuit-based PSI with linear communication. Zbl 07162726
Pinkas, Benny; Schneider, Thomas; Tkachenko, Oleksandr; Yanai, Avishay
5
2019
Fast garbling of circuits under standard assumptions. Zbl 1400.94146
Gueron, Shay; Lindell, Yehuda; Nof, Ariel; Pinkas, Benny
13
2018
Efficient circuit-based PSI via cuckoo hashing. Zbl 1415.94456
Pinkas, Benny; Schneider, Thomas; Weinert, Christian; Wieder, Udi
8
2018
Fast distributed RSA key generation for semi-honest and malicious adversaries. Zbl 1436.94061
Frederiksen, Tore Kasper; Lindell, Yehuda; Osheter, Valery; Pinkas, Benny
4
2018
Efficient scalable multiparty private set-intersection via garbled Bloom filters. Zbl 06957556
Inbar, Roi; Omri, Eran; Pinkas, Benny
3
2018
Committed MPC – maliciously secure multiparty computation from homomorphic commitments. Zbl 1441.94078
Frederiksen, Tore K.; Pinkas, Benny; Yanai, Avishay
3
2018
Asymptotically tight bounds for composing ORAM with PIR. Zbl 1404.94033
Abraham, Ittai; Fletcher, Christopher W.; Nayak, Kartik; Pinkas, Benny; Ren, Ling
8
2017
Efficient set intersection with simulation-based security. Zbl 1351.94044
Freedman, Michael J.; Hazay, Carmit; Nissim, Kobbi; Pinkas, Benny
6
2016
Efficient constant round multi-party computation combining BMR and SPDZ. Zbl 1352.94049
Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P.; Yanai, Avishay
21
2015
An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1314.94086
Lindell, Yehuda; Pinkas, Benny
3
2015
Non-interactive secure computation based on cut-and-choose. Zbl 1332.94053
Afshar, Arash; Mohassel, Payman; Pinkas, Benny; Riva, Ben
13
2014
Secure computation of functionalities based on Hamming distance and its application to computing document similarity. Zbl 1307.94086
Pinkas, Benny; Jarrous, Ayman
2
2013
Secure two-party computation via cut-and-choose oblivious transfer. Zbl 1278.94056
Lindell, Yehuda; Pinkas, Benny
10
2012
Secure two-party computation via cut-and-choose oblivious transfer. Zbl 1281.94037
Lindell, Yehuda; Pinkas, Benny
23
2011
Secure computation on the web: computing without simultaneous interaction. Zbl 1287.94070
Halevi, Shai; Lindell, Yehuda; Pinkas, Benny
15
2011
The IPS compiler: optimizations, variants and concrete efficiency. Zbl 1288.68023
Lindell, Yehuda; Oxman, Eli; Pinkas, Benny
12
2011
Secure set intersection with untrusted hardware tokens. Zbl 1285.68009
Fischlin, Marc; Pinkas, Benny; Sadeghi, Ahmad-Reza; Schneider, Thomas; Visconti, Ivan
2
2011
Oblivious RAM revisited. Zbl 1283.94102
Pinkas, Benny; Reinman, Tzachy
9
2010
Privacy-preserving group discovery with linear complexity. Zbl 1443.94095
Manulis, Mark; Pinkas, Benny; Poettering, Bertram
2
2010
A proof of security of Yao’s protocol for two-party computation. Zbl 1159.94364
Lindell, Yehuda; Pinkas, Benny
63
2009
Secure two-party computation is practical. Zbl 1267.94091
Pinkas, Benny; Schneider, Thomas; Smart, Nigel P.; Williams, Stephen C.
27
2009
Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles. Zbl 1179.68055
Gradwohl, Ronen; Naor, Moni; Pinkas, Benny; Rothblum, Guy N.
9
2009
Implementing two-party computation efficiently with security against malicious adversaries. Zbl 1180.68152
Lindell, Yehuda; Pinkas, Benny; Smart, Nigel P.
9
2008
An efficient protocol for secure two-party computation in the presence of malicious adversaries. Zbl 1141.94362
Lindell, Yehuda; Pinkas, Benny
42
2007
Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles. Zbl 1201.68050
Gradwohl, Ronen; Naor, Moni; Pinkas, Benny; Rothblum, Guy N.
3
2007
Oblivious polynomial evaluation. Zbl 1101.94026
Naor, Moni; Pinkas, Benny
17
2006
Keyword search and oblivious pseudorandom functions. Zbl 1079.94546
Freedman, Michael J.; Ishai, Yuval; Pinkas, Benny; Reingold, Omer
26
2005
Computationally secure oblivious transfer. Zbl 1075.68026
Naor, Moni; Pinkas, Benny
9
2005
Efficient private matching and set intersection. Zbl 1122.94416
Freedman, Michael J.; Nissim, Kobbi; Pinkas, Benny
46
2004
Secure computation of the \(k\)th-ranked element. Zbl 1122.68422
Aggarwal, Gagan; Mishra, Nina; Pinkas, Benny
9
2004
Fair secure two-party computation. Zbl 1038.94544
Pinkas, Benny
9
2003
Privacy preserving data mining. Zbl 1010.94008
Lindell, Yehuda; Pinkas, Benny
28
2002
Efficient oblivious transfer protocols. Zbl 0991.94045
Naor, Moni; Pinkas, Benny
52
2001
Efficient trace and revoke schemes. Zbl 0999.94522
Naor, Moni; Pinkas, Benny
26
2001
Tracing traitors. Zbl 1007.94017
Chor, Benny; Fiat, Amos; Naor, Moni; Pinkas, Benny
28
2000
Privacy preserving data mining. Zbl 0989.68506
Lindell, Yehuda; Pinkas, Benny
24
2000
Distributed oblivious transfer. Zbl 0974.94020
Naor, Moni; Pinkas, Benny
5
2000
Oblivious transfer and polynomial evaluation. Zbl 1345.68018
Naor, Moni; Pinkas, Benny
29
1999
Oblivious transfer with adaptive queries. Zbl 0942.94011
Naor, Moni; Pinkas, Benny
25
1999
Distributed pseudo-random functions and KDCs. Zbl 0931.94046
Naor, Moni; Pinkas, Benny; Reingold, Omer
16
1999
Threshold traitor tracing. Zbl 0938.68041
Naor, Moni; Pinkas, Benny
8
1998
Secure and efficient metering. Zbl 1028.68525
Naor, Moni; Pinkas, Benny
2
1998
Visual authentication and identification. Zbl 0880.94008
Naor, Moni; Pinkas, Benny
14
1997
On the impossibility of private key cryptography with weakly random keys. Zbl 0786.94012
McInnes, James L.; Pinkas, Benny
1
1991
all top 5

Cited by 845 Authors

25 Hazay, Carmit
12 Lindell, Yehuda
12 Ostrovsky, Rafail
11 Ishai, Yuval
11 Pinkas, Benny
10 Venkitasubramaniam, Muthuramakrishnan
9 Katz, Jonathan N.
9 Mohassel, Payman
9 Wichs, Daniel
8 Rosulek, Mike
7 Mu, Yi
7 Polychroniadou, Antigoni
6 Miyahara, Daiki
6 Mizuki, Takaaki
6 Orsini, Emmanuela
6 Scholl, Peter
6 Smart, Nigel P.
6 Srinivasan, Akshayaram
6 Susilo, Willy
5 Brakerski, Zvika
5 D’Arco, Paolo
5 Döttling, Nico
5 Garg, Sanjam
5 Guo, Fuchun
5 Kabatiansky, Grigorii A.
5 Kolesnikov, Vladimir
5 Lai, Jianchang
5 Li, Shundong
5 Libert, Benoît
5 Moran, Tal
5 Naor, Moni
5 Soria-Vazquez, Eduardo
5 Vaikuntanathan, Vinod
5 Yanai, Avishay
5 Zikas, Vassilis
4 Bitansky, Nir
4 Blundo, Carlo
4 Boneh, Dan
4 Chen, Rongmao
4 Chevalier, Céline
4 Choi, Seung Geol
4 Cohen, Ran
4 Garay, Juan A.
4 Goyal, Vipul
4 Haitner, Iftach
4 Halevi, Shai
4 Jain, Abhishek
4 Lafourcade, Pascal
4 Malkin, Tal G.
4 Orlandi, Claudio
4 Pointcheval, David
4 Rindal, Peter
4 Ruangwises, Suthee
4 Sahai, Amit
4 Schröder, Dominique
4 Shi, Runhua
4 Toft, Tomas
4 Visconti, Ivan
4 Wang, Daoshun
4 Wu, David J.
4 Zhandry, Mark
4 Zhang, Shun
4 Zhou, Hong-Sheng
3 Applebaum, Benny
3 Attrapadung, Nuttapong
3 Badrinarayanan, Saikrishna
3 Benhamouda, Fabrice
3 Blazy, Olivier
3 Ciampi, Michele
3 Couteau, Geoffroy
3 Dai, Yiqi
3 Damgård, Ivan Bjerre
3 Debnath, Sumit Kumar
3 Deng, Robert Huijie
3 Domingo-Ferrer, Josep
3 Fernandez, Marcel
3 Fischlin, Marc
3 Ghodosi, Hossein
3 Gordon, S. Dov
3 Hofheinz, Dennis
3 Itoh, Toshiya
3 Jafargholi, Zahra
3 Jiang, Peng
3 Katzenbeisser, Stefan
3 Khurana, Dakshita
3 Komargodski, Ilan
3 Kurosawa, Kaoru
3 Li, Jin
3 Lin, Huijia
3 Nielsen, Jesper Buus
3 Nissim, Kobbi
3 Paneth, Omer
3 Patra, Arpita
3 Phan Duong Hieu
3 Raghuraman, Srinivasan
3 Robert, Léo
3 Safavi-Naini, Reihaneh
3 Schneider, Thomas
3 Segev, Gil
3 Shyu, Shyong Jian
...and 745 more Authors
all top 5

Cited in 59 Serials

50 Journal of Cryptology
22 Designs, Codes and Cryptography
21 Information Sciences
18 Theoretical Computer Science
9 SIAM Journal on Computing
5 Information Processing Letters
5 Pattern Recognition
5 Quantum Information Processing
4 Journal of Computer and System Sciences
4 Algorithmica
4 Advances in Mathematics of Communications
3 International Journal of Theoretical Physics
3 Problems of Information Transmission
3 Computing
3 Journal of Complexity
3 Science in China. Series F
2 Discrete Applied Mathematics
2 International Journal of Foundations of Computer Science
2 Distributed Computing
2 Soft Computing
2 Data Mining and Knowledge Discovery
2 Journal of Discrete Mathematical Sciences & Cryptography
2 Mathematical Biosciences and Engineering
2 Journal of Mathematical Cryptology
2 Science China. Information Sciences
1 Computers & Mathematics with Applications
1 IEEE Transactions on Information Theory
1 Applied Mathematics and Computation
1 Automatica
1 Journal of Combinatorial Theory. Series A
1 Synthese
1 Cryptologia
1 Journal of Computer Science and Technology
1 Information and Computation
1 Mathematical and Computer Modelling
1 Neural Computation
1 European Journal of Operational Research
1 Computational Statistics and Data Analysis
1 Finite Fields and their Applications
1 Mathematical Problems in Engineering
1 Theory of Computing Systems
1 Wuhan University Journal of Natural Sciences (WUJNS)
1 International Journal of Applied Mathematics and Computer Science
1 Sādhanā
1
1 International Journal of Wavelets, Multiresolution and Information Processing
1 International Journal of Quantum Information
1 Mathematics in Computer Science
1 Optimization Letters
1 Computational & Mathematical Methods in Medicine
1 Journal of Physics A: Mathematical and Theoretical
1 Statistical Analysis and Data Mining
1 The Annals of Applied Statistics
1 Arabian Journal for Science and Engineering
1 Statistics and Computing
1 Computer Science Review
1 Journal of Siberian Federal University. Mathematics & Physics
1 Mathematical Foundations of Computing
1 Japanese Journal of Statistics and Data Science

Citations by Year