×

zbMATH — the first resource for mathematics

Segev, Gil

Compute Distance To:
Author ID: segev.gil Recent zbMATH articles by "Segev, Gil"
Published as: Segev, Gil
External Links: MGP
Documents Indexed: 67 Publications since 2006

Publications by Year

Citations contained in zbMATH Open

53 Publications have been cited 516 times in 294 Documents Cited by Year
Public-key cryptosystems resilient to key leakage. Zbl 1252.94091
Naor, Moni; Segev, Gil
63
2009
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
42
2014
Public-key encryption in the bounded-retrieval model. Zbl 1279.94051
Alwen, Joël; Dodis, Yevgeniy; Naor, Moni; Segev, Gil; Walfish, Shabsi; Wichs, Daniel
30
2010
From selective to adaptive security in functional encryption. Zbl 1351.94021
Ananth, Prabhanjan; Brakerski, Zvika; Segev, Gil; Vaikuntanathan, Vinod
29
2015
Function-private identity-based encryption: hiding the function in functional encryption. Zbl 1311.94071
Boneh, Dan; Raghunathan, Ananth; Segev, Gil
21
2013
Fully leakage-resilient signatures. Zbl 1335.94089
Boyle, Elette; Segev, Gil; Wichs, Daniel
18
2013
Function-private functional encryption in the private-key setting. Zbl 1334.94065
Brakerski, Zvika; Segev, Gil
18
2015
Chosen-ciphertext security via correlated products. Zbl 1213.94130
Rosen, Alon; Segev, Gil
17
2009
Limits on the power of indistinguishability obfuscation and functional encryption. Zbl 1356.94048
Asharov, Gilad; Segev, Gil
17
2016
Public-key cryptosystems resilient to key leakage. Zbl 1273.94355
Naor, Moni; Segev, Gil
16
2012
More constructions of lossy and correlation-secure trapdoor functions. Zbl 1281.94024
Freeman, David Mandell; Goldreich, Oded; Kiltz, Eike; Rosen, Alon; Segev, Gil
15
2010
Finding collisions in interactive protocols – tight lower bounds on the round and communication complexities of statistically hiding commitments. Zbl 1397.94068
Haitner, Iftach; Hoch, Jonathan J.; Reingold, Omer; Segev, Gil
15
2015
An optimally fair coin toss. Zbl 1213.94123
Moran, Tal; Naor, Moni; Segev, Gil
14
2009
Better security for deterministic public-key encryption: the auxiliary-input setting. Zbl 1290.94050
Brakerski, Zvika; Segev, Gil
13
2011
Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions. Zbl 1371.94627
Brakerski, Zvika; Komargodski, Ilan; Segev, Gil
13
2016
Deterministic public-key encryption for adaptively chosen plaintext distributions. Zbl 1306.94088
Raghunathan, Ananth; Segev, Gil; Vadhan, Salil
11
2013
Fully leakage-resilient signatures. Zbl 1281.94075
Boyle, Elette; Segev, Gil; Wichs, Daniel
11
2011
Hedged public-key encryption: how to protect against bad randomness. Zbl 1267.94036
Bellare, Mihir; Brakerski, Zvika; Naor, Moni; Ristenpart, Thomas; Segev, Gil; Shacham, Hovav; Yilek, Scott
11
2009
Public-key cryptographic primitives provably as secure as subset sum. Zbl 1274.94096
Lyubashevsky, Vadim; Palacio, Adriana; Segev, Gil
10
2010
De-amortized cuckoo hashing: provable worst-case performance and experimental results. Zbl 1248.68230
Arbitman, Yuriy; Naor, Moni; Segev, Gil
10
2009
Function-private subspace-membership encryption and its applications. Zbl 1327.94036
Boneh, Dan; Raghunathan, Ananth; Segev, Gil
9
2013
Incremental deterministic public-key encryption. Zbl 1297.94091
Mironov, Ilya; Pandey, Omkant; Reingold, Omer; Segev, Gil
9
2012
More constructions of lossy and correlation-secure trapdoor functions. Zbl 1291.94083
Freeman, David Mandell; Goldreich, Oded; Kiltz, Eike; Rosen, Alon; Segev, Gil
9
2013
Chosen-ciphertext security via correlated products. Zbl 1227.94063
Rosen, Alon; Segev, Gil
9
2010
Targeted malleability: homomorphic encryption for restricted computations. Zbl 1347.68119
Boneh, Dan; Segev, Gil; Waters, Brent
9
2012
Limits on the power of zero-knowledge proofs in cryptographic constructions. Zbl 1290.94049
Brakerski, Zvika; Katz, Jonathan; Segev, Gil; Yerukhimovich, Arkady
8
2011
Functional encryption for randomized functionalities in the private-key setting from minimal assumptions. Zbl 1319.94073
Komargodski, Ilan; Segev, Gil; Yogev, Eylon
8
2015
David and Goliath commitments: UC computation for asymmetric parties using tamper-proof hardware. Zbl 1149.94325
Moran, Tal; Segev, Gil
7
2008
Message-locked encryption for lock-dependent messages. Zbl 1310.94120
Abadi, Martín; Boneh, Dan; Mironov, Ilya; Raghunathan, Ananth; Segev, Gil
4
2013
From Minicrypt to Obfustopia via private-key functional encryption. Zbl 1410.94086
Komargodski, Ilan; Segev, Gil
4
2017
On constructing one-way permutations from indistinguishability obfuscation. Zbl 1382.94051
Asharov, Gilad; Segev, Gil
4
2016
Can PPAD hardness be based on standard cryptographic assumptions? Zbl 1416.68079
Rosen, Alon; Segev, Gil; Shahaf, Ido
4
2017
Tight bounds for unconditional authentication protocols in the manual channel and shared key models. Zbl 1328.94079
Naor, Moni; Segev, Gil; Smith, Adam
3
2008
Lossy functions do not amplify well. Zbl 1303.94098
Pietrzak, Krzysztof; Rosen, Alon; Segev, Gil
3
2012
Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations. Zbl 1373.68211
Asharov, Gilad; Naor, Moni; Segev, Gil; Shahaf, Ido
3
2016
Nonmalleable extractors with short seeds and applications to privacy amplification. Zbl 1302.94040
Cohen, Gil; Raz, Ran; Segev, Gil
3
2014
Approximate \(k\)-Steiner forests via the Lagrangian relaxation technique with internal preprocessing. Zbl 1194.68263
Segev, Danny; Segev, Gil
2
2010
Hierarchical functional encryption. Zbl 1402.68055
Brakerski, Zvika; Chandran, Nishanth; Goyal, Vipul; Jain, Aayush; Sahai, Amit; Segev, Gil
2
2017
Functional encryption for randomized functionalities in the private-key setting from minimal assumptions. Zbl 1421.94061
Komargodski, Ilan; Segev, Gil; Yogev, Eylon
2
2018
Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions. Zbl 1444.94049
Brakerski, Zvika; Komargodski, Ilan; Segev, Gil
2
2018
Balls and bins: smaller hash families and faster evaluation. Zbl 1275.68075
Celis, L. Elisa; Reingold, Omer; Segev, Gil; Wieder, Udi
2
2013
A linear lower bound on the communication complexity of single-server private information retrieval. Zbl 1162.94363
Haitner, Iftach; Hoch, Jonathan J.; Segev, Gil
2
2008
Approximate \(k\)-Steiner forests via the Lagrangian relaxation technique with internal preprocessing. Zbl 1131.68595
Segev, Danny; Segev, Gil
2
2006
Tight bounds for unconditional authentication protocols in the manual channel and shared key models. Zbl 1161.68448
Naor, Moni; Segev, Gil; Smith, Adam
2
2006
From minicrypt to obfustopia via private-key functional encryption. Zbl 1455.94175
Komargodski, Ilan; Segev, Gil
2
2020
Deterministic history-independent strategies for storing information on write-once memories. Zbl 1213.68230
Moran, Tal; Naor, Moni; Segev, Gil
1
2009
Anonymous IBE, leakage resilience and circular security from new assumptions. Zbl 1423.94056
Brakerski, Zvika; Lombardi, Alex; Segev, Gil; Vaikuntanathan, Vinod
1
2018
On constructing one-way permutations from indistinguishability obfuscation. Zbl 1400.94112
Asharov, Gilad; Segev, Gil
1
2018
Injective trapdoor functions via derandomization: how strong is Rudich’s black-box barrier? Zbl 1443.94077
Rotem, Lior; Segev, Gil
1
2018
Function-private functional encryption in the private-key setting. Zbl 1426.94085
Brakerski, Zvika; Segev, Gil
1
2018
Sketching in adversarial environments. Zbl 1235.68072
Mironov, Ilya; Naor, Moni; Segev, Gil
1
2011
Better security for deterministic public-key encryption: the auxiliary-input setting. Zbl 1297.94056
Brakerski, Zvika; Segev, Gil
1
2014
An optimally fair coin toss. Zbl 1348.94070
Moran, Tal; Naor, Moni; Segev, Gil
1
2016
From minicrypt to obfustopia via private-key functional encryption. Zbl 1455.94175
Komargodski, Ilan; Segev, Gil
2
2020
Functional encryption for randomized functionalities in the private-key setting from minimal assumptions. Zbl 1421.94061
Komargodski, Ilan; Segev, Gil; Yogev, Eylon
2
2018
Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions. Zbl 1444.94049
Brakerski, Zvika; Komargodski, Ilan; Segev, Gil
2
2018
Anonymous IBE, leakage resilience and circular security from new assumptions. Zbl 1423.94056
Brakerski, Zvika; Lombardi, Alex; Segev, Gil; Vaikuntanathan, Vinod
1
2018
On constructing one-way permutations from indistinguishability obfuscation. Zbl 1400.94112
Asharov, Gilad; Segev, Gil
1
2018
Injective trapdoor functions via derandomization: how strong is Rudich’s black-box barrier? Zbl 1443.94077
Rotem, Lior; Segev, Gil
1
2018
Function-private functional encryption in the private-key setting. Zbl 1426.94085
Brakerski, Zvika; Segev, Gil
1
2018
From Minicrypt to Obfustopia via private-key functional encryption. Zbl 1410.94086
Komargodski, Ilan; Segev, Gil
4
2017
Can PPAD hardness be based on standard cryptographic assumptions? Zbl 1416.68079
Rosen, Alon; Segev, Gil; Shahaf, Ido
4
2017
Hierarchical functional encryption. Zbl 1402.68055
Brakerski, Zvika; Chandran, Nishanth; Goyal, Vipul; Jain, Aayush; Sahai, Amit; Segev, Gil
2
2017
Limits on the power of indistinguishability obfuscation and functional encryption. Zbl 1356.94048
Asharov, Gilad; Segev, Gil
17
2016
Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions. Zbl 1371.94627
Brakerski, Zvika; Komargodski, Ilan; Segev, Gil
13
2016
On constructing one-way permutations from indistinguishability obfuscation. Zbl 1382.94051
Asharov, Gilad; Segev, Gil
4
2016
Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations. Zbl 1373.68211
Asharov, Gilad; Naor, Moni; Segev, Gil; Shahaf, Ido
3
2016
An optimally fair coin toss. Zbl 1348.94070
Moran, Tal; Naor, Moni; Segev, Gil
1
2016
From selective to adaptive security in functional encryption. Zbl 1351.94021
Ananth, Prabhanjan; Brakerski, Zvika; Segev, Gil; Vaikuntanathan, Vinod
29
2015
Function-private functional encryption in the private-key setting. Zbl 1334.94065
Brakerski, Zvika; Segev, Gil
18
2015
Finding collisions in interactive protocols – tight lower bounds on the round and communication complexities of statistically hiding commitments. Zbl 1397.94068
Haitner, Iftach; Hoch, Jonathan J.; Reingold, Omer; Segev, Gil
15
2015
Functional encryption for randomized functionalities in the private-key setting from minimal assumptions. Zbl 1319.94073
Komargodski, Ilan; Segev, Gil; Yogev, Eylon
8
2015
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. Zbl 1327.94035
Boneh, Dan; Gentry, Craig; Gorbunov, Sergey; Halevi, Shai; Nikolaenko, Valeria; Segev, Gil; Vaikuntanathan, Vinod; Vinayagamurthy, Dhinakaran
42
2014
Nonmalleable extractors with short seeds and applications to privacy amplification. Zbl 1302.94040
Cohen, Gil; Raz, Ran; Segev, Gil
3
2014
Better security for deterministic public-key encryption: the auxiliary-input setting. Zbl 1297.94056
Brakerski, Zvika; Segev, Gil
1
2014
Function-private identity-based encryption: hiding the function in functional encryption. Zbl 1311.94071
Boneh, Dan; Raghunathan, Ananth; Segev, Gil
21
2013
Fully leakage-resilient signatures. Zbl 1335.94089
Boyle, Elette; Segev, Gil; Wichs, Daniel
18
2013
Deterministic public-key encryption for adaptively chosen plaintext distributions. Zbl 1306.94088
Raghunathan, Ananth; Segev, Gil; Vadhan, Salil
11
2013
Function-private subspace-membership encryption and its applications. Zbl 1327.94036
Boneh, Dan; Raghunathan, Ananth; Segev, Gil
9
2013
More constructions of lossy and correlation-secure trapdoor functions. Zbl 1291.94083
Freeman, David Mandell; Goldreich, Oded; Kiltz, Eike; Rosen, Alon; Segev, Gil
9
2013
Message-locked encryption for lock-dependent messages. Zbl 1310.94120
Abadi, Martín; Boneh, Dan; Mironov, Ilya; Raghunathan, Ananth; Segev, Gil
4
2013
Balls and bins: smaller hash families and faster evaluation. Zbl 1275.68075
Celis, L. Elisa; Reingold, Omer; Segev, Gil; Wieder, Udi
2
2013
Public-key cryptosystems resilient to key leakage. Zbl 1273.94355
Naor, Moni; Segev, Gil
16
2012
Incremental deterministic public-key encryption. Zbl 1297.94091
Mironov, Ilya; Pandey, Omkant; Reingold, Omer; Segev, Gil
9
2012
Targeted malleability: homomorphic encryption for restricted computations. Zbl 1347.68119
Boneh, Dan; Segev, Gil; Waters, Brent
9
2012
Lossy functions do not amplify well. Zbl 1303.94098
Pietrzak, Krzysztof; Rosen, Alon; Segev, Gil
3
2012
Better security for deterministic public-key encryption: the auxiliary-input setting. Zbl 1290.94050
Brakerski, Zvika; Segev, Gil
13
2011
Fully leakage-resilient signatures. Zbl 1281.94075
Boyle, Elette; Segev, Gil; Wichs, Daniel
11
2011
Limits on the power of zero-knowledge proofs in cryptographic constructions. Zbl 1290.94049
Brakerski, Zvika; Katz, Jonathan; Segev, Gil; Yerukhimovich, Arkady
8
2011
Sketching in adversarial environments. Zbl 1235.68072
Mironov, Ilya; Naor, Moni; Segev, Gil
1
2011
Public-key encryption in the bounded-retrieval model. Zbl 1279.94051
Alwen, Joël; Dodis, Yevgeniy; Naor, Moni; Segev, Gil; Walfish, Shabsi; Wichs, Daniel
30
2010
More constructions of lossy and correlation-secure trapdoor functions. Zbl 1281.94024
Freeman, David Mandell; Goldreich, Oded; Kiltz, Eike; Rosen, Alon; Segev, Gil
15
2010
Public-key cryptographic primitives provably as secure as subset sum. Zbl 1274.94096
Lyubashevsky, Vadim; Palacio, Adriana; Segev, Gil
10
2010
Chosen-ciphertext security via correlated products. Zbl 1227.94063
Rosen, Alon; Segev, Gil
9
2010
Approximate \(k\)-Steiner forests via the Lagrangian relaxation technique with internal preprocessing. Zbl 1194.68263
Segev, Danny; Segev, Gil
2
2010
Public-key cryptosystems resilient to key leakage. Zbl 1252.94091
Naor, Moni; Segev, Gil
63
2009
Chosen-ciphertext security via correlated products. Zbl 1213.94130
Rosen, Alon; Segev, Gil
17
2009
An optimally fair coin toss. Zbl 1213.94123
Moran, Tal; Naor, Moni; Segev, Gil
14
2009
Hedged public-key encryption: how to protect against bad randomness. Zbl 1267.94036
Bellare, Mihir; Brakerski, Zvika; Naor, Moni; Ristenpart, Thomas; Segev, Gil; Shacham, Hovav; Yilek, Scott
11
2009
De-amortized cuckoo hashing: provable worst-case performance and experimental results. Zbl 1248.68230
Arbitman, Yuriy; Naor, Moni; Segev, Gil
10
2009
Deterministic history-independent strategies for storing information on write-once memories. Zbl 1213.68230
Moran, Tal; Naor, Moni; Segev, Gil
1
2009
David and Goliath commitments: UC computation for asymmetric parties using tamper-proof hardware. Zbl 1149.94325
Moran, Tal; Segev, Gil
7
2008
Tight bounds for unconditional authentication protocols in the manual channel and shared key models. Zbl 1328.94079
Naor, Moni; Segev, Gil; Smith, Adam
3
2008
A linear lower bound on the communication complexity of single-server private information retrieval. Zbl 1162.94363
Haitner, Iftach; Hoch, Jonathan J.; Segev, Gil
2
2008
Approximate \(k\)-Steiner forests via the Lagrangian relaxation technique with internal preprocessing. Zbl 1131.68595
Segev, Danny; Segev, Gil
2
2006
Tight bounds for unconditional authentication protocols in the manual channel and shared key models. Zbl 1161.68448
Naor, Moni; Segev, Gil; Smith, Adam
2
2006
all top 5

Cited by 492 Authors

18 Segev, Gil
11 Yang, Bo
10 Mu, Yi
10 Venturi, Daniele
9 Wee, Hoeteck
9 Zhou, Yanwei
8 Faonio, Antonio
8 Wichs, Daniel
7 Brakerski, Zvika
7 Dachman-Soled, Dana
7 Hanaoka, Goichiro
7 Hazay, Carmit
7 Nielsen, Jesper Buus
7 Omri, Eran
7 Sahai, Amit
6 Ananth, Prabhanjan Vijendra
6 Faust, Sebastian
6 Haitner, Iftach
6 Hofheinz, Dennis
6 Ishai, Yuval
6 Kiltz, Eike
6 Komargodski, Ilan
6 Lu, Xianhui
6 Susilo, Willy
6 Vaikuntanathan, Vinod
6 Yamada, Shota
6 Zhang, Mingwu
5 Bitansky, Nir
5 Goldwasser, Shafi
5 Goyal, Vipul
5 Huang, Jianye
5 Huang, Qiong
5 Li, Bao
5 O’Neill, Adam
5 Tauman Kalai, Yael
5 Venkitasubramaniam, Muthuramakrishnan
5 Zhandry, Mark
4 Applebaum, Benny
4 Asharov, Gilad
4 Bellare, Mihir
4 Canetti, Ran
4 Choi, Seung Geol
4 Dodis, Yevgeniy
4 Garg, Sanjam
4 Kushilevitz, Eyal
4 Li, Jiguo
4 Matsuda, Takahiro
4 Naor, Moni
4 Ostrovsky, Rafail
4 Pandey, Omkant
4 Pass, Rafael
4 Tanaka, Keisuke
4 Waters, Brent
4 Wu, David J.
4 Xia, Zhe
4 Yogev, Eylon
4 Zhang, Yichen
3 Agrawal, Shashank
3 Attrapadung, Nuttapong
3 Beimel, Amos
3 Boyle, Elette
3 Cao, Zhenfu
3 Chen, Kefei
3 Chen, Yu
3 Dziembowski, Stefan
3 Gu, Dawu
3 Guo, Fuchun
3 Hajiabadi, Mohammad
3 Jain, Aayush
3 Jain, Abhishek
3 Kapron, Bruce M.
3 Katz, Jonathan N.
3 Koppula, Venkata
3 Kunihiro, Noboru
3 Kurosawa, Kaoru
3 Libert, Benoît
3 Lin, Huijia
3 Liu, Shengli
3 Liu, Yamin
3 Pietrzak, Krzysztof
3 Rosen, Alon
3 Srinivasan, Akshayaram
3 Xue, Haiyang
3 Xue, Rui
3 Yamakawa, Takashi
3 Yu, Qihong
3 Zhang, Jiang
2 Abdalla, Michel
2 Alawatugoda, Janaka
2 Armknecht, Frederik
2 Biagioni, Silvio
2 Boneh, Dan
2 Boyen, Xavier
2 Chandran, Nishanth
2 Chase, Melissa
2 Chattopadhyay, Eshan
2 Chen, Rongmao
2 Chiesa, Alessandro
2 Chow, Sherman S. M.
2 Cohen, Ran
...and 392 more Authors

Citations by Year