Benny Applebaum

From MaRDI portal
Revision as of 18:30, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:301520

Available identifiers

zbMath Open applebaum.bennyMaRDI QIDQ301520

List of research outcomes

PublicationDate of PublicationType
The round complexity of statistical MPC with optimal resiliency2024-05-08Paper
Succinct computational secret sharing2024-05-08Paper
https://portal.mardi4nfdi.de/entity/Q61262302024-04-09Paper
How to recover a secret with \(O(n)\) additions2024-02-02Paper
Sampling Graphs without Forbidden Subgraphs and Unbalanced Expanders with Negligible Error2023-12-15Paper
Actively secure arithmetic computation and VOLE with constant computational overhead2023-12-08Paper
Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)2023-08-14Paper
Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)2023-07-07Paper
Quadratic multiparty randomized encodings beyond honest majority and their applications2023-07-07Paper
https://portal.mardi4nfdi.de/entity/Q61072532023-07-03Paper
Correction to: ``Locally computable UOWHF with linear shrinkage2023-04-13Paper
On actively-secure elementary MPC reductions2023-03-31Paper
https://portal.mardi4nfdi.de/entity/Q58757782023-02-03Paper
https://portal.mardi4nfdi.de/entity/Q50903742022-07-18Paper
Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)2022-04-22Paper
The resiliency of MPC with low interaction: the benefit of making errors (extended abstract)2022-03-23Paper
On the Power of Amortization in Secret Sharing2022-03-07Paper
Garbled Circuits as Randomized Encodings of Functions: a Primer2022-01-12Paper
Obfuscating circuits via composite-order graded encoding2021-07-02Paper
Placing conditional disclosure of secrets in the communication complexity universe2021-06-28Paper
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations2021-02-08Paper
Perfect Secure Computation in Two Rounds2021-02-08Paper
Better secret sharing via robust conditional disclosure of secrets2021-01-19Paper
The communication complexity of private simultaneous messages, revisited2020-06-15Paper
Degree 2 is complete for the round-complexity of malicious MPC2020-02-06Paper
Secret-sharing schemes for general and uniform access structures2020-02-04Paper
On the relationship between statistical zero-knowledge and statistical randomized encodings2019-12-19Paper
Perfect secure computation in two rounds2018-12-11Paper
On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate2018-12-11Paper
The communication complexity of private simultaneous messages, revisited2018-07-09Paper
https://portal.mardi4nfdi.de/entity/Q45681102018-06-15Paper
Arithmetic Cryptography2018-05-17Paper
https://portal.mardi4nfdi.de/entity/Q46380562018-05-03Paper
Minimizing locality of one-way functions via semi-private randomized encodings2018-04-26Paper
From private simultaneous messages to zero-information Arthur-Merlin protocols and back2018-02-15Paper
https://portal.mardi4nfdi.de/entity/Q46018482018-01-24Paper
Algebraic Attacks against Random Local Functions and Their Countermeasures2018-01-12Paper
Clique Here: On the Distributed Complexity in Fully-Connected Networks2017-12-15Paper
Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations2017-11-03Paper
Locally computable UOWHF with linear shrinkage2017-10-12Paper
Algebraic attacks against random local functions and their countermeasures2017-09-29Paper
Deterministic Rateless Codes for BSC2017-05-19Paper
Arithmetic Cryptography2017-05-19Paper
Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys2017-01-13Paper
Fast Pseudorandom Functions Based on Expander Graphs2016-12-21Paper
On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings2016-11-09Paper
Cryptographic hardness of random local functions. Survey2016-10-28Paper
Garbling XOR gates ``for free in the standard model2016-09-21Paper
A dichotomy for local small-bias generators2016-09-21Paper
Incompressible functions, relative-error extractors, and the power of nondeterministic reductions2016-06-30Paper
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back2016-04-08Paper
Obfuscating Circuits via Composite-Order Graded Encoding2015-07-06Paper
Bootstrapping Obfuscators via Fast Pseudorandom Functions2015-01-06Paper
Key-dependent message security: generic amplification and completeness2014-09-25Paper
Public-key cryptography from different assumptions2014-08-13Paper
How to Garble Arithmetic Circuits2014-07-30Paper
How to Garble Arithmetic Circuits2014-07-30Paper
Pseudorandom generators with long stretch and low locality from random local one-way functions2014-05-13Paper
Pseudorandom Generators with Long Stretch and Low Locality from Random Local One-Way Functions2014-02-04Paper
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys2013-09-17Paper
Locally Computable UOWHF with Linear Shrinkage2013-05-31Paper
Garbling XOR Gates “For Free” in the Standard Model2013-03-18Paper
Cryptographic Hardness of Random Local Functions–Survey2013-03-18Paper
A Dichotomy for Local Small-Bias Generators2012-06-15Paper
Key-Dependent Message Security: Generic Amplification and Completeness2011-05-27Paper
Randomly Encoding Functions: A New Cryptographic Paradigm2011-05-19Paper
Cryptography in constant parallel time2011-02-14Paper
From Secrecy to Soundness: Efficient Verification via Secure Computation2010-09-07Paper
Cryptography with constant input locality2009-11-13Paper
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems2009-10-20Paper
Cryptography with Constant Input Locality2009-03-10Paper
On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\)2008-08-20Paper
Computationally private randomizing polynomials and their applications2007-11-05Paper
Cryptography in $NC^0$2007-09-07Paper
On Pseudorandom Generators with Linear Stretch in NC02007-08-28Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Benny Applebaum