×

zbMATH — the first resource for mathematics

Ishai, Yuval

Compute Distance To:
Author ID: ishai.yuval Recent zbMATH articles by "Ishai, Yuval"
Published as: Ishai, Yuval
External Links: MGP
Documents Indexed: 159 Publications since 1996, including 5 Books
all top 5

Co-Authors

2 single-authored
55 Kushilevitz, Eyal
31 Sahai, Amit
25 Ostrovsky, Rafail
14 Applebaum, Benny
11 Malkin, Tal G.
10 Beimel, Amos
10 Damgård, Ivan Bjerre
9 Boyle, Elette
9 Gilboa, Niv
8 Prabhakaran, Manoj M.
7 Rabin, Tal
5 Barkol, Omer
5 Nissim, Kobbi
5 Paskin-Cherniavsky, Anat
5 Petrank, Erez
5 Weiss, Mor
4 Boneh, Dan
4 Garg, Sanjam
4 Genkin, Daniel
4 Halevi, Shai
4 Lindell, Yehuda
4 Strauss, Martin J.
4 Weinreb, Enav
4 Wright, Rebecca N.
3 Canetti, Ran
3 Di Crescenzo, Giovanni
3 Haitner, Iftach
3 Kilian, Joe
3 Kumaresan, Ranjit
3 Rijmen, Vincent
3 Wu, David J.
2 Baron, Joshua
2 Benhamouda, Fabrice
2 Bogdanov, Andrej
2 Bro Miltersen, Peter
2 Cramer, Ronald John Fitzgerald
2 Degwekar, Akshay
2 Dziembowski, Stefan
2 Feigenbaum, Joan
2 Gabizon, Ariel
2 Garay, Juan A.
2 Gennaro, Rosario
2 Gertner, Yael
2 Goyal, Vipul
2 Groth, Jens
2 Harnik, Danny
2 Harsha, Prahladh
2 Jain, Abhishek
2 Krøigaard, Mikkel
2 Mahmoody, Mohammad
2 Meldgaard, Sigurd
2 Nielsen, Jesper Buus
2 Orlandi, Claudio
2 Paskin, Anat
2 Polychroniadou, Antigoni
2 Reingold, Omer
2 Srinivasan, Akshayaram
2 Vaikuntanathan, Vinod
2 Wadia, Akshay
2 Wagner, David A.
2 Waters, Brent
2 Wee, Hoeteck
2 Zikas, Vassilis
1 Agrawal, Shweta
1 Aiello, Bill
1 Ananth, Prabhanjan Vijendra
1 Anthony, Martin H. G.
1 Aspnes, James
1 Badrinarayanan, Saikrishna
1 Balogh, József
1 Barak, Boaz
1 Bartlett, Peter L.
1 Ben-Sasson, Eli
1 Bentov, Iddo
1 Biham, Eli
1 Bitansky, Nir
1 Canteaut, Anne
1 Chase, Melissa
1 Cheng, Kuan
1 Chiesa, Alessandro
1 Chor, Benny
1 Cohen, Gil
1 Corrigan-Gibbs, Henry
1 Couteau, Geoffroy
1 Csirik, János A.
1 Dodis, Yevgeniy
1 Döttling, Nico
1 Druk, Erez
1 Dubrov, Bella
1 Fehr, Serge
1 Freedman, Michael J.
1 Gentry, Craig
1 Gordon, Dov
1 Goren, Yaron J.
1 Gupta, Divya
1 Haramaty-Krasne, Naama
1 Hardt, Moritz
1 Hazay, Carmit
1 Hofheinz, Dennis
1 Katz, Jonathan N.
...and 48 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

118 Publications have been cited 962 times in 545 Documents Cited by Year
Evaluating branching programs on encrypted data. Zbl 1156.94354
Ishai, Yuval; Paskin, Anat
61
2007
Private circuits: securing hardware against probing attacks. Zbl 1122.94378
Ishai, Yuval; Sahai, Amit; Wagner, David
55
2003
Founding cryptography on oblivious transfer – efficiently. Zbl 1183.94037
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit
52
2008
Protecting data privacy in private information retrieval schemes. Zbl 0958.68059
Gertner, Yael; Ishai, Yuval; Kushilevitz, Eyal; Malkin, Tal
35
2000
Priced oblivious transfer: how to sell digital goods. Zbl 0981.94042
Aiello, Bill; Ishai, Yuval; Reingold, Omer
31
2001
Extending oblivious transfers efficiently. Zbl 1122.94422
Ishai, Yuval; Kilian, Joe; Nissim, Kobbi; Petrank, Erez
30
2003
Cryptography in NC\(^0\). Zbl 1126.94014
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
26
2006
Computationally private randomizing polynomials and their applications. Zbl 1143.94009
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
26
2006
From secrecy to soundness: efficient verification via secure computation (extended abstract). Zbl 1287.68041
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
23
2010
Bounded key-dependent message security. Zbl 1280.94038
Barak, Boaz; Haitner, Iftach; Hofheinz, Dennis; Ishai, Yuval
18
2010
Founding cryptography on tamper-proof hardware tokens. Zbl 1274.94072
Goyal, Vipul; Ishai, Yuval; Sahai, Amit; Venkatesan, Ramarathnam; Wadia, Akshay
18
2010
Private circuits. II: Keeping secrets in tamperable circuits. Zbl 1140.94347
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit; Wagner, David
18
2006
Batch codes and their applications. Zbl 1192.94100
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
17
2004
Secure arithmetic computation with no honest majority. Zbl 1213.94111
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit
16
2009
Succinct non-interactive arguments via linear interactive proofs. Zbl 1316.68056
Bitansky, Nir; Chiesa, Alessandro; Ishai, Yuval; Paneth, Omer; Ostrovsky, Rafail
16
2013
Keyword search and oblivious pseudorandom functions. Zbl 1079.94546
Freedman, Michael J.; Ishai, Yuval; Pinkas, Benny; Reingold, Omer
16
2005
Zero-knowledge from secure multiparty computation. Zbl 1232.68044
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
15
2007
The round complexity of verifiable secret sharing and secure multicast. Zbl 1317.68072
Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal
14
2001
Scalable secure multiparty computation. Zbl 1161.94394
Damgård, Ivan; Ishai, Yuval
14
2006
Public-coin differing-inputs obfuscation and its applications. Zbl 1336.94054
Ishai, Yuval; Pandey, Omkant; Sahai, Amit
13
2015
Cryptography with constant computational overhead. Zbl 1231.94050
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Ratall; Sahai, Amit
13
2008
Non-interactive and non-malleable commitment. Zbl 1029.68547
Di Crescenzo, Giovanni; Ishai, Yuval; Ostrovsky, Rafail
13
1998
Perfectly secure multiparty computation and the computational overhead of cryptography. Zbl 1280.94046
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel
13
2010
Zero-knowledge proofs from secure multiparty computation. Zbl 1192.68239
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
13
2009
Efficient non-interactive secure computation. Zbl 1290.94151
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit
12
2011
Share conversion, pseudorandom secret-sharing and applications to secure computation. Zbl 1079.94541
Cramer, Ronald; Damgård, Ivan; Ishai, Yuval
12
2005
Perfect constant-round secure computation via perfect randomizing polynomials. Zbl 1056.68088
Ishai, Yuval; Kushilevitz, Eyal
12
2002
Constant-round multiparty computation using a black-box pseudorandom generator. Zbl 1145.94437
Damgård, Ivan; Ishai, Yuval
12
2005
Scalable multiparty computation with nearly optimal work and resilience. Zbl 1183.68082
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel; Nielsen, Jesper Buus; Smith, Adam
12
2008
On the cryptographic complexity of the worst functions. Zbl 1326.94072
Beimel, Amos; Ishai, Yuval; Kumaresan, Ranjit; Kushilevitz, Eyal
11
2014
Function secret sharing. Zbl 1371.94664
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
10
2015
Partial garbling schemes and their applications. Zbl 1410.68112
Ishai, Yuval; Wee, Hoeteck
9
2014
Protecting data privacy in private information retrieval schemes. Zbl 1027.68593
Gertner, Yael; Ishai, Yuval; Kushilevitz, Eyal; Malkin, Tal
8
1998
Black-box constructions for secure computation. Zbl 1301.94116
Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
8
2006
Sufficient conditions for collision-resistant hashing. Zbl 1079.94554
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail
8
2005
Encoding functions with constant online rate or how to compress garbled circuits keys. Zbl 1298.94076
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
7
2013
Bounded indistinguishability and the complexity of recovering secrets. Zbl 1406.94027
Bogdanov, Andrej; Ishai, Yuval; Viola, Emanuele; Williamson, Christopher
7
2016
Breaking the circuit size barrier for secure computation under DDH. Zbl 1384.94038
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
7
2016
Secure multi-party computation with identifiable abort. Zbl 1335.94053
Ishai, Yuval; Ostrovsky, Rafail; Zikas, Vassilis
7
2014
Circuits resilient to additive attacks with applications to secure computation. Zbl 1315.94073
Genkin, Daniel; Ishai, Yuval; Prabhakaran, Manoj M.; Sahai, Amit; Tromer, Eran
7
2014
On the power of nonlinear secret-sharing. Zbl 1086.94020
Beimel, Amos; Ishai, Yuval
7
2005
OT-combiners via secure computation. Zbl 1162.94366
Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal; Nielsen, Jesper Buus
7
2008
Non-interactive secure multiparty computation. Zbl 1335.94030
Beimel, Amos; Gabizon, Ariel; Ishai, Yuval; Kushilevitz, Eyal; Meldgaard, Sigurd; Paskin-Cherniavsky, Anat
6
2014
Efficient multi-party computation over rings. Zbl 1038.94554
Cramer, Ronald; Fehr, Serge; Ishai, Yuval; Kushilevitz, Eyal
6
2003
Secure multiparty computation of approximations (extended abstract). Zbl 0986.68954
Feigenbaum, Joan; Ishai, Yuval; Malkin, Tal; Nissim, Kobbi; Strauss, Martin J.
6
2001
On the power of correlated randomness in secure computation. Zbl 1315.94080
Ishai, Yuval; Kushilevitz, Eyal; Meldgaard, Sigurd; Orlandi, Claudio; Paskin-Cherniavsky, Anat
6
2013
Black-box constructions of protocols for secure computation. Zbl 1236.94056
Haitner, Iftach; Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
6
2011
Interactive locking, zero-knowledge PCPs, and unconditional cryptography. Zbl 1280.94063
Goyal, Vipul; Ishai, Yuval; Mahmoody, Mohammad; Sahai, Amit
6
2010
On the randomness complexity of efficient sampling. Zbl 1301.68261
Dubrov, Bella; Ishai, Yuval
6
2006
Secure multiparty computation of approximations. Zbl 1321.68464
Feigenbaum, Joan; Ishai, Yuval; Malkin, Tal; Nissim, Kobbi; Strauss, Martin J.; Wright, Rebecca N.
6
2006
Distributed point functions and their applications. Zbl 1328.68054
Gilboa, Niv; Ishai, Yuval
6
2014
Adaptive versus non-adaptive security of multi-party protocols. Zbl 1091.94020
Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal
6
2004
On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\). Zbl 1242.94016
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
6
2008
Identifying cheaters without an honest majority. Zbl 1303.94083
Ishai, Yuval; Ostrovsky, Rafail; Seyalioglu, Hakan
5
2012
Constant-rate oblivious transfer from noisy channels. Zbl 1290.94092
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit; Wullschleger, Jürg
5
2011
On the complexity of UC commitments. Zbl 1328.68027
Garay, Juan A.; Ishai, Yuval; Kumaresan, Ranjit; Wee, Hoeteck
5
2014
General constructions for information-theoretic private information retrieval. Zbl 1076.68027
Beimel, Amos; Ishai, Yuval; Kushilevitz, Eyal
5
2005
On combining privacy with guaranteed output delivery in secure multiparty computation. Zbl 1161.94444
Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
5
2006
Cryptography with constant input locality. Zbl 1215.94029
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
5
2007
Efficient multiparty protocols via log-depth threshold formulae. (Extended abstract). Zbl 1316.94066
Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval; Kölker, Jonas; Miltersen, Peter Bro; Raz, Ran; Rothblum, Ron D.
4
2013
Probabilistically checkable proofs of proximity with zero-knowledge. Zbl 1323.94117
Ishai, Yuval; Weiss, Mor
4
2014
Extracting correlations. Zbl 1292.94080
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
4
2009
How to garble arithmetic circuits. Zbl 1292.94186
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
4
2011
Information-theoretic private information retrieval: A unified construction (extended abstract). Zbl 0986.68509
Beimel, Amos; Ishai, Yuval
4
2001
On efficient zero-knowledge PCPs. Zbl 1304.68056
Ishai, Yuval; Mahmoody, Mohammad; Sahai, Amit
4
2012
Secure multiparty computation with minimal interaction. Zbl 1283.94093
Ishai, Yuval; Kushilevitz, Eyal; Paskin, Anat
4
2010
Minimizing locality of one-way functions via semi-private randomized encodings. Zbl 1384.94026
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
4
2018
On the hardness of information-theoretic multiparty computation. Zbl 1122.94423
Ishai, Yuval; Kushilevitz, Eyal
4
2004
Linear-time encodable codes meeting the Gilbert-Varshamov bound and their cryptographic applications. Zbl 1364.94595
Druk, Erez; Ishai, Yuval
4
2014
Robust pseudorandom generators. Zbl 1336.94053
Ishai, Yuval; Kushilevitz, Eyal; Li, Xin; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit; Zuckerman, David
3
2013
Secure protocol transformations. Zbl 1372.94430
Ishai, Yuval; Kushilevitz, Eyal; Prabhakaran, Manoj; Sahai, Amit; Yu, Ching-Hua
3
2016
How to garble arithmetic circuits. Zbl 1302.94034
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
3
2014
Universal service-providers for private information retrieval. Zbl 0968.68050
Di Crescenzo, Giovanni; Ishai, Yuval; Ostrovsky, Rafail
3
2001
Private computation using a PEZ dispenser. Zbl 1059.68038
Balogh, József; Csirik, János A.; Ishai, Yuval; Kushilevitz, Eyal
3
2003
Reducing the servers computation in private information retrieval: PIR with preprocessing. Zbl 0989.68507
Beimel, Amos; Ishai, Yuval; Malkin, Tal
3
2000
On complete primitives for fairness. Zbl 1274.94071
Gordon, Dov; Ishai, Yuval; Moran, Tal; Ostrovsky, Rafail; Sahai, Amit
3
2010
Efficient multi-party computation: from passive to active security via secure SIMD circuits. Zbl 1352.94037
Genkin, Daniel; Ishai, Yuval; Polychroniadou, Antigoni
3
2015
Improved upper bounds on information-theoretic private information retrieval (extended abstract). Zbl 1346.68083
Ishai, Yuval; Kushilevitz, Eyal
3
1999
One-way functions are essential for single-server private information retrieval. Zbl 1346.68081
Beimel, Amos; Ishai, Yuval; Kushilevitz, Eyal; Malkin, Tal
3
1999
Cryptography with constant input locality. Zbl 1183.94018
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
3
2009
On pseudorandom generators with linear stretch in NC\(^{0}\). Zbl 1155.94363
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
3
2006
Basing weak public-key cryptography on strong one-way functions. Zbl 1162.94339
Biham, Eli; Goren, Yaron J.; Ishai, Yuval
3
2008
Secure computation of constant-depth circuits with applications to database search problems. Zbl 1145.68396
Barkol, Omer; Ishai, Yuval
3
2005
On locally decodable codes, self-correctable codes, and \(t\)-private PIR. Zbl 1171.94373
Barkol, Omer; Ishai, Yuval; Weinreb, Enav
3
2007
Encoding functions with constant online rate, or how to compress garbled circuit keys. Zbl 1362.94016
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
2
2015
Lossy chains and fractional secret sharing. Zbl 1354.94057
Ishai, Yuval; Kushilevitz, Eyal; Strulovich, Omer
2
2013
On 2-round secure multiparty computation. Zbl 1026.94527
Gennaro, Rosario; Ishai, Yuval; Kushilevitz, Eyal; Rabin, Tal
2
2002
Parallel hashing via list recoverability. Zbl 1351.94050
Haitner, Iftach; Ishai, Yuval; Omri, Eran; Shaltiel, Ronen
2
2015
Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Zbl 1332.94066
Gentry, Craig; Groth, Jens; Ishai, Yuval; Peikert, Chris; Sahai, Amit; Smith, Adam
2
2015
Selective private function evaluation with applications to private statistics. Zbl 1333.94052
Canetti, Ran; Ishai, Yuval; Kumar, Ravi; Reiter, Michael K.; Rubinfeld, Ronitt; Wright, Rebecca N.
2
2001
Secure multiparty computation with general interaction patterns. Zbl 1334.94081
Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Kushilevitz, Eyal; Rabin, Tal
2
2016
Private large-scale databases with distributed searchable symmetric encryption. Zbl 1333.68103
Ishai, Yuval; Kushilevitz, Eyal; Lu, Steve; Ostrovsky, Rafail
2
2016
On \(d\)-multiplicative secret sharing. Zbl 1201.94074
Barkol, Omer; Ishai, Yuval; Weinreb, Enav
2
2010
On locally decodable codes, self-correctable codes, and \(t\)-private PIR. Zbl 1200.94055
Barkol, Omer; Ishai, Yuval; Weinreb, Enav
2
2010
On adaptive vs. non-adaptive security of multiparty protocols. Zbl 0981.94040
Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal
2
2001
Statistical randomized encodings: a complexity theoretic view. Zbl 1440.68073
Agrawal, Shweta; Ishai, Yuval; Khurana, Dakshita; Paskin-Cherniavsky, Anat
2
2015
On the local leakage resilience of linear secret sharing schemes. Zbl 1444.94119
Benhamouda, Fabrice; Degwekar, Akshay; Ishai, Yuval; Rabin, Tal
2
2018
Low-complexity cryptographic hash functions. Zbl 1402.94051
Applebaum, Benny; Haramaty-Krasne, Naama; Ishai, Yuval; Kushilevitz, Eyal; Vaikuntanathan, Vinod
2
2017
Reducing the servers’ computation in private information retrieval: PIR with preprocessing. Zbl 1083.68036
Beimel, Amos; Ishai, Yuval; Malkin, Tal
2
2004
Private multiparty sampling and approximation of vector combinations. Zbl 1171.68450
Ishai, Yuval; Malkin, Tal; Strauss, Martin J.; Wright, Rebecca N.
2
2007
Minimizing locality of one-way functions via semi-private randomized encodings. Zbl 1384.94026
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
4
2018
On the local leakage resilience of linear secret sharing schemes. Zbl 1444.94119
Benhamouda, Fabrice; Degwekar, Akshay; Ishai, Yuval; Rabin, Tal
2
2018
Two-round MPC: information-theoretic and black-box. Zbl 1443.94058
Garg, Sanjam; Ishai, Yuval; Srinivasan, Akshayaram
1
2018
Low-complexity cryptographic hash functions. Zbl 1402.94051
Applebaum, Benny; Haramaty-Krasne, Naama; Ishai, Yuval; Kushilevitz, Eyal; Vaikuntanathan, Vinod
2
2017
Group-based secure computation: optimizing rounds, communication, and computation. Zbl 1415.94414
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
2
2017
Lattice-based SNARGs and their application to more efficient obfuscation. Zbl 1415.94412
Boneh, Dan; Ishai, Yuval; Sahai, Amit; Wu, David J.
2
2017
How to construct a leakage-resilient (stateless) trusted party. Zbl 1412.94176
Genkin, Daniel; Ishai, Yuval; Weiss, Mor
1
2017
Can we access a database both locally and privately? Zbl 1416.68062
Boyle, Elette; Ishai, Yuval; Pass, Rafael; Wootters, Mary
1
2017
Bounded indistinguishability and the complexity of recovering secrets. Zbl 1406.94027
Bogdanov, Andrej; Ishai, Yuval; Viola, Emanuele; Williamson, Christopher
7
2016
Breaking the circuit size barrier for secure computation under DDH. Zbl 1384.94038
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
7
2016
Secure protocol transformations. Zbl 1372.94430
Ishai, Yuval; Kushilevitz, Eyal; Prabhakaran, Manoj; Sahai, Amit; Yu, Ching-Hua
3
2016
Secure multiparty computation with general interaction patterns. Zbl 1334.94081
Halevi, Shai; Ishai, Yuval; Jain, Abhishek; Kushilevitz, Eyal; Rabin, Tal
2
2016
Private large-scale databases with distributed searchable symmetric encryption. Zbl 1333.68103
Ishai, Yuval; Kushilevitz, Eyal; Lu, Steve; Ostrovsky, Rafail
2
2016
Distribution design. Zbl 1334.94058
Beimel, Amos; Gabizon, Ariel; Ishai, Yuval; Kushilevitz, Eyal
1
2016
Making the best of a leaky situation: zero-knowledge PCPs from leakage-resilient circuits. Zbl 1375.94136
Ishai, Yuval; Weiss, Mor; Yang, Guang
1
2016
Public-coin differing-inputs obfuscation and its applications. Zbl 1336.94054
Ishai, Yuval; Pandey, Omkant; Sahai, Amit
13
2015
Function secret sharing. Zbl 1371.94664
Boyle, Elette; Gilboa, Niv; Ishai, Yuval
10
2015
Efficient multi-party computation: from passive to active security via secure SIMD circuits. Zbl 1352.94037
Genkin, Daniel; Ishai, Yuval; Polychroniadou, Antigoni
3
2015
Encoding functions with constant online rate, or how to compress garbled circuit keys. Zbl 1362.94016
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
2
2015
Parallel hashing via list recoverability. Zbl 1351.94050
Haitner, Iftach; Ishai, Yuval; Omri, Eran; Shaltiel, Ronen
2
2015
Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. Zbl 1332.94066
Gentry, Craig; Groth, Jens; Ishai, Yuval; Peikert, Chris; Sahai, Amit; Smith, Adam
2
2015
Statistical randomized encodings: a complexity theoretic view. Zbl 1440.68073
Agrawal, Shweta; Ishai, Yuval; Khurana, Dakshita; Paskin-Cherniavsky, Anat
2
2015
Cryptography with one-way communication. Zbl 1351.94046
Garg, Sanjam; Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
1
2015
Secure computation from leaky correlated randomness. Zbl 1352.94038
Gupta, Divya; Ishai, Yuval; Maji, Hemanta K.; Sahai, Amit
1
2015
On the cryptographic complexity of the worst functions. Zbl 1326.94072
Beimel, Amos; Ishai, Yuval; Kumaresan, Ranjit; Kushilevitz, Eyal
11
2014
Partial garbling schemes and their applications. Zbl 1410.68112
Ishai, Yuval; Wee, Hoeteck
9
2014
Secure multi-party computation with identifiable abort. Zbl 1335.94053
Ishai, Yuval; Ostrovsky, Rafail; Zikas, Vassilis
7
2014
Circuits resilient to additive attacks with applications to secure computation. Zbl 1315.94073
Genkin, Daniel; Ishai, Yuval; Prabhakaran, Manoj M.; Sahai, Amit; Tromer, Eran
7
2014
Non-interactive secure multiparty computation. Zbl 1335.94030
Beimel, Amos; Gabizon, Ariel; Ishai, Yuval; Kushilevitz, Eyal; Meldgaard, Sigurd; Paskin-Cherniavsky, Anat
6
2014
Distributed point functions and their applications. Zbl 1328.68054
Gilboa, Niv; Ishai, Yuval
6
2014
On the complexity of UC commitments. Zbl 1328.68027
Garay, Juan A.; Ishai, Yuval; Kumaresan, Ranjit; Wee, Hoeteck
5
2014
Probabilistically checkable proofs of proximity with zero-knowledge. Zbl 1323.94117
Ishai, Yuval; Weiss, Mor
4
2014
Linear-time encodable codes meeting the Gilbert-Varshamov bound and their cryptographic applications. Zbl 1364.94595
Druk, Erez; Ishai, Yuval
4
2014
How to garble arithmetic circuits. Zbl 1302.94034
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
3
2014
Succinct non-interactive arguments via linear interactive proofs. Zbl 1316.68056
Bitansky, Nir; Chiesa, Alessandro; Ishai, Yuval; Paneth, Omer; Ostrovsky, Rafail
16
2013
Encoding functions with constant online rate or how to compress garbled circuits keys. Zbl 1298.94076
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
7
2013
On the power of correlated randomness in secure computation. Zbl 1315.94080
Ishai, Yuval; Kushilevitz, Eyal; Meldgaard, Sigurd; Orlandi, Claudio; Paskin-Cherniavsky, Anat
6
2013
Efficient multiparty protocols via log-depth threshold formulae. (Extended abstract). Zbl 1316.94066
Cohen, Gil; Damgård, Ivan Bjerre; Ishai, Yuval; Kölker, Jonas; Miltersen, Peter Bro; Raz, Ran; Rothblum, Ron D.
4
2013
Robust pseudorandom generators. Zbl 1336.94053
Ishai, Yuval; Kushilevitz, Eyal; Li, Xin; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit; Zuckerman, David
3
2013
Lossy chains and fractional secret sharing. Zbl 1354.94057
Ishai, Yuval; Kushilevitz, Eyal; Strulovich, Omer
2
2013
Zero knowledge LTCs and their applications. Zbl 1405.68114
Ishai, Yuval; Sahai, Amit; Viderman, Michael; Weiss, Mor
1
2013
Identifying cheaters without an honest majority. Zbl 1303.94083
Ishai, Yuval; Ostrovsky, Rafail; Seyalioglu, Hakan
5
2012
On efficient zero-knowledge PCPs. Zbl 1304.68056
Ishai, Yuval; Mahmoody, Mohammad; Sahai, Amit
4
2012
From randomizing polynomials to parallel algorithms. Zbl 1348.94059
Ishai, Yuval; Kushilevitz, Eyal; Paskin-Cherniavsky, Anat
1
2012
Efficient non-interactive secure computation. Zbl 1290.94151
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit
12
2011
Black-box constructions of protocols for secure computation. Zbl 1236.94056
Haitner, Iftach; Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
6
2011
Constant-rate oblivious transfer from noisy channels. Zbl 1290.94092
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit; Wullschleger, Jürg
5
2011
How to garble arithmetic circuits. Zbl 1292.94186
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
4
2011
On achieving the “best of both worlds” in secure multiparty computation. Zbl 1215.68035
Ishai, Yuval; Katz, Jonathan; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
1
2011
From secrecy to soundness: efficient verification via secure computation (extended abstract). Zbl 1287.68041
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
23
2010
Bounded key-dependent message security. Zbl 1280.94038
Barak, Boaz; Haitner, Iftach; Hofheinz, Dennis; Ishai, Yuval
18
2010
Founding cryptography on tamper-proof hardware tokens. Zbl 1274.94072
Goyal, Vipul; Ishai, Yuval; Sahai, Amit; Venkatesan, Ramarathnam; Wadia, Akshay
18
2010
Perfectly secure multiparty computation and the computational overhead of cryptography. Zbl 1280.94046
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel
13
2010
Interactive locking, zero-knowledge PCPs, and unconditional cryptography. Zbl 1280.94063
Goyal, Vipul; Ishai, Yuval; Mahmoody, Mohammad; Sahai, Amit
6
2010
Secure multiparty computation with minimal interaction. Zbl 1283.94093
Ishai, Yuval; Kushilevitz, Eyal; Paskin, Anat
4
2010
On complete primitives for fairness. Zbl 1274.94071
Gordon, Dov; Ishai, Yuval; Moran, Tal; Ostrovsky, Rafail; Sahai, Amit
3
2010
On \(d\)-multiplicative secret sharing. Zbl 1201.94074
Barkol, Omer; Ishai, Yuval; Weinreb, Enav
2
2010
On locally decodable codes, self-correctable codes, and \(t\)-private PIR. Zbl 1200.94055
Barkol, Omer; Ishai, Yuval; Weinreb, Enav
2
2010
On invertible sampling and adaptive security. Zbl 1253.94052
Ishai, Yuval; Kumarasubramanian, Abishek; Orlandi, Claudio; Sahai, Amit
1
2010
Secure arithmetic computation with no honest majority. Zbl 1213.94111
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit
16
2009
Zero-knowledge proofs from secure multiparty computation. Zbl 1192.68239
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
13
2009
Extracting correlations. Zbl 1292.94080
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
4
2009
Cryptography with constant input locality. Zbl 1183.94018
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
3
2009
Founding cryptography on oblivious transfer – efficiently. Zbl 1183.94037
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit
52
2008
Cryptography with constant computational overhead. Zbl 1231.94050
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Ratall; Sahai, Amit
13
2008
Scalable multiparty computation with nearly optimal work and resilience. Zbl 1183.68082
Damgård, Ivan; Ishai, Yuval; Krøigaard, Mikkel; Nielsen, Jesper Buus; Smith, Adam
12
2008
OT-combiners via secure computation. Zbl 1162.94366
Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal; Nielsen, Jesper Buus
7
2008
On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\). Zbl 1242.94016
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
6
2008
Basing weak public-key cryptography on strong one-way functions. Zbl 1162.94339
Biham, Eli; Goren, Yaron J.; Ishai, Yuval
3
2008
Communication in the presence of replication. Zbl 1231.68137
Barkol, Omer; Ishai, Yuval; Weinreb, Enav
1
2008
Sub-linear zero-knowledge argument for correctness of a shuffle. Zbl 1149.94319
Groth, Jens; Ishai, Yuval
1
2008
Evaluating branching programs on encrypted data. Zbl 1156.94354
Ishai, Yuval; Paskin, Anat
61
2007
Zero-knowledge from secure multiparty computation. Zbl 1232.68044
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
15
2007
Cryptography with constant input locality. Zbl 1215.94029
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
5
2007
On locally decodable codes, self-correctable codes, and \(t\)-private PIR. Zbl 1171.94373
Barkol, Omer; Ishai, Yuval; Weinreb, Enav
3
2007
Private multiparty sampling and approximation of vector combinations. Zbl 1171.68450
Ishai, Yuval; Malkin, Tal; Strauss, Martin J.; Wright, Rebecca N.
2
2007
How many oblivious transfers are needed for secure multiparty computation? Zbl 1215.94076
Harnik, Danny; Ishai, Yuval; Kushilevitz, Eyal
1
2007
Cryptography in NC\(^0\). Zbl 1126.94014
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
26
2006
Computationally private randomizing polynomials and their applications. Zbl 1143.94009
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
26
2006
Private circuits. II: Keeping secrets in tamperable circuits. Zbl 1140.94347
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit; Wagner, David
18
2006
Scalable secure multiparty computation. Zbl 1161.94394
Damgård, Ivan; Ishai, Yuval
14
2006
Black-box constructions for secure computation. Zbl 1301.94116
Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
8
2006
On the randomness complexity of efficient sampling. Zbl 1301.68261
Dubrov, Bella; Ishai, Yuval
6
2006
Secure multiparty computation of approximations. Zbl 1321.68464
Feigenbaum, Joan; Ishai, Yuval; Malkin, Tal; Nissim, Kobbi; Strauss, Martin J.; Wright, Rebecca N.
6
2006
On combining privacy with guaranteed output delivery in secure multiparty computation. Zbl 1161.94444
Ishai, Yuval; Kushilevitz, Eyal; Lindell, Yehuda; Petrank, Erez
5
2006
On pseudorandom generators with linear stretch in NC\(^{0}\). Zbl 1155.94363
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal
3
2006
Keyword search and oblivious pseudorandom functions. Zbl 1079.94546
Freedman, Michael J.; Ishai, Yuval; Pinkas, Benny; Reingold, Omer
16
2005
Share conversion, pseudorandom secret-sharing and applications to secure computation. Zbl 1079.94541
Cramer, Ronald; Damgård, Ivan; Ishai, Yuval
12
2005
Constant-round multiparty computation using a black-box pseudorandom generator. Zbl 1145.94437
Damgård, Ivan; Ishai, Yuval
12
2005
Sufficient conditions for collision-resistant hashing. Zbl 1079.94554
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail
8
2005
On the power of nonlinear secret-sharing. Zbl 1086.94020
Beimel, Amos; Ishai, Yuval
7
2005
General constructions for information-theoretic private information retrieval. Zbl 1076.68027
Beimel, Amos; Ishai, Yuval; Kushilevitz, Eyal
5
2005
Secure computation of constant-depth circuits with applications to database search problems. Zbl 1145.68396
Barkol, Omer; Ishai, Yuval
3
2005
Batch codes and their applications. Zbl 1192.94100
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit
17
2004
Adaptive versus non-adaptive security of multi-party protocols. Zbl 1091.94020
Canetti, Ran; Damgård, Ivan; Dziembowski, Stefan; Ishai, Yuval; Malkin, Tal
6
2004
On the hardness of information-theoretic multiparty computation. Zbl 1122.94423
Ishai, Yuval; Kushilevitz, Eyal
4
2004
Reducing the servers’ computation in private information retrieval: PIR with preprocessing. Zbl 1083.68036
Beimel, Amos; Ishai, Yuval; Malkin, Tal
2
2004
Private circuits: securing hardware against probing attacks. Zbl 1122.94378
Ishai, Yuval; Sahai, Amit; Wagner, David
55
2003
Extending oblivious transfers efficiently. Zbl 1122.94422
Ishai, Yuval; Kilian, Joe; Nissim, Kobbi; Petrank, Erez
30
2003
Efficient multi-party computation over rings. Zbl 1038.94554
Cramer, Ronald; Fehr, Serge; Ishai, Yuval; Kushilevitz, Eyal
6
2003
...and 18 more Documents
all top 5

Cited by 892 Authors

31 Ishai, Yuval
21 Applebaum, Benny
21 Hazay, Carmit
16 Ostrovsky, Rafail
15 Sahai, Amit
12 Lindell, Yehuda
12 Vaikuntanathan, Vinod
10 Damgård, Ivan Bjerre
10 Faust, Sebastian
10 Kushilevitz, Eyal
10 Pass, Rafael
10 Venkitasubramaniam, Muthuramakrishnan
9 Beimel, Amos
9 Nielsen, Jesper Buus
9 Wichs, Daniel
8 Bogdanov, Andrej
8 Pinkas, Benny
8 Standaert, Francois-Xavier
7 Ananth, Prabhanjan Vijendra
7 Boyle, Elette
7 Brakerski, Zvika
7 Canetti, Ran
7 Lin, Huijia
7 Padró, Carles
7 Raykov, Pavel
7 Rosen, Alon
7 Rosulek, Mike
7 Zikas, Vassilis
6 Chiesa, Alessandro
6 Farràs, Oriol
6 Gilboa, Niv
6 Goldwasser, Shafi
6 Katz, Jonathan N.
6 Komargodski, Ilan
6 Malkin, Tal G.
6 Mohassel, Payman
6 Patra, Arpita
6 Rothblum, Guy N.
6 Venturi, Daniele
6 Viola, Emanuele
5 Ben-Sasson, Eli
5 Bitansky, Nir
5 Dachman-Soled, Dana
5 Fischlin, Marc
5 Garay, Juan A.
5 Guo, Siyao
5 Polychroniadou, Antigoni
5 Prabhakaran, Manoj M.
5 Rothblum, Ron D.
5 Segev, Gil
5 Tauman Kalai, Yael
5 Waters, Brent
5 Wee, Hoeteck
5 Zhang, Liang Feng
4 Boneh, Dan
4 Cascudo, Ignacio
4 Catalano, Dario
4 Choudhary, Ashish
4 Chung, Kai-Min
4 Cohen, Ran
4 Coretti, Sandro
4 Dolev, Shlomi
4 Dziembowski, Stefan
4 Garg, Sanjam
4 Gennaro, Rosario
4 Guilley, Sylvain
4 Hemenway, Brett
4 Jain, Abhishek
4 Kapron, Bruce M.
4 Koppula, Venkata
4 Mahmoody, Mohammad
4 Nissim, Kobbi
4 Orsini, Emmanuela
4 Peikert, Chris
4 Ranellucci, Samuel
4 Safavi-Naini, Reihaneh
4 Scholl, Peter
4 Schröder, Dominique
4 Shpilka, Amir
4 Smart, Nigel P.
4 Tromer, Eran
4 Vasudevan, Prashant Nalini
4 Wang, Huaxiong
4 Wu, David J.
4 Yang, Yuguang
4 Yung, Moti
4 Zhao, Minghao
3 Akavia, Adi
3 Asharov, Gilad
3 Cao, Zhenfu
3 Chang, Yan
3 Choi, Seung Geol
3 Cramer, Ronald John Fitzgerald
3 Dodis, Yevgeniy
3 Döttling, Nico
3 Dvir, Zeev
3 Fehr, Serge
3 Fiore, Dario
3 Genkin, Daniel
3 Gentry, Craig
...and 792 more Authors
all top 5

Cited in 46 Serials

85 Journal of Cryptology
22 SIAM Journal on Computing
21 Theoretical Computer Science
19 Designs, Codes and Cryptography
12 International Journal of Theoretical Physics
12 Information Sciences
9 Information Processing Letters
9 Computational Complexity
7 Algorithmica
7 Quantum Information Processing
6 Journal of Computer and System Sciences
6 Information and Computation
5 Distributed Computing
5 Advances in Mathematics of Communications
4 Discrete Applied Mathematics
4 Cryptography and Communications
3 Linear Algebra and its Applications
3 ACM Transactions on Computation Theory
2 SIAM Journal on Discrete Mathematics
2 Journal of Parallel and Distributed Computing
2 Theory of Computing Systems
2 Soft Computing
2 Journal of the ACM
2 Journal of Mathematical Cryptology
1 Computers & Mathematics with Applications
1 Advances in Applied Mathematics
1 Combinatorica
1 Journal of Complexity
1 Mathematical and Computer Modelling
1 Annals of Operations Research
1 Random Structures & Algorithms
1 Annals of Mathematics and Artificial Intelligence
1 Nonlinear Dynamics
1 Physical Review Letters
1 Journal of Applied Mathematics and Computing
1 International Journal of Quantum Information
1 Foundations of Physics
1 Journal of Shanghai Jiaotong University (Science)
1 Science China. Mathematics
1 Science China. Information Sciences
1 Symmetry
1 Theory of Computing
1 Frontiers of Computer Science
1 Forum of Mathematics, Sigma
1 Computer Science Review
1 Journal of Algebra, Combinatorics, Discrete Structures and Applications

Citations by Year