Amos Beimel

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Structural lower bounds on black-box constructions of pseudorandom functions
 
2024-12-13Paper
Lower bounds for secret-sharing schemes for \(k\)-hypergraphs
 
2024-11-22Paper
Complete characterization of fairness in secure two-party computation of Boolean functions
SIAM Journal on Computing
2024-10-21Paper
Three party secure computation with friends and foes
 
2024-08-02Paper
Improved polynomial secret-sharing schemes
 
2024-08-02Paper
Cryptography from planted graphs: security with logarithmic-size messages
 
2024-08-01Paper
Quadratic secret sharing and conditional disclosure of secrets
IEEE Transactions on Information Theory
2024-07-21Paper
Succinct computational secret sharing
 
2024-05-08Paper
scientific article; zbMATH DE number 7829240 (Why is no real title available?)
 
2024-04-09Paper
Dynamic algorithms against an adaptive adversary: generic constructions and lower bounds
Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing
2023-12-08Paper
The power of synergy in differential privacy: combining a small curator with local randomizers
 
2023-11-02Paper
scientific article; zbMATH DE number 7650132 (Why is no real title available?)
 
2023-02-03Paper
Tighter bounds on multiparty coin flipping via augmented weak martingales and differentially private sampling
SIAM Journal on Computing
2022-08-12Paper
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures
IEEE Transactions on Information Theory
2022-05-30Paper
Quadratic secret sharing and conditional disclosure of secrets
 
2022-04-22Paper
On the round complexity of the shuffle model
 
2022-03-23Paper
The share size of secret-sharing schemes for almost all access structures and graphs
 
2022-03-23Paper
Evolving ramp secret sharing with a small gap
 
2021-12-01Paper
Learning privately with labeled and unlabeled examples
Algorithmica
2021-02-01Paper
Better secret sharing via robust conditional disclosure of secrets
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing
2021-01-19Paper
\(1/p\)-secure multiparty computation without an honest majority and the best of both worlds
Journal of Cryptology
2020-11-06Paper
scientific article; zbMATH DE number 7164746 (Why is no real title available?)
 
2020-02-07Paper
Secret-sharing schemes for general and uniform access structures
 
2020-02-04Paper
Optimal linear multiparty conditional disclosure of secrets protocols
 
2019-01-23Paper
Evolving ramp secret-sharing schemes
 
2018-10-17Paper
The complexity of multiparty PSM protocols and related models
 
2018-07-09Paper
Linear secret-sharing schemes for forbidden graph access structures
 
2018-01-19Paper
Learning Privately with Labeled and Unlabeled Examples
Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms
2017-10-05Paper
Secret Sharing and Non-Shannon Information Inequalities
IEEE Transactions on Information Theory
2017-07-12Paper
Ad hoc PSM protocols: secure computation without coordination
Lecture Notes in Computer Science
2017-06-23Paper
Characterizing the sample complexity of private learners
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
2017-05-16Paper
Secret sharing schemes for dense forbidden graphs
Lecture Notes in Computer Science
2016-10-21Paper
One-way functions are essential for single-server private information retrieval
Proceedings of the thirty-first annual ACM symposium on Theory of Computing
2016-09-29Paper
Private learning and sanitization: pure vs. approximate differential privacy
Theory of Computing
2016-07-29Paper
Learning unions of high-dimensional boxes over the reals
Information Processing Letters
2016-06-16Paper
Secret-sharing schemes for very dense graphs
Journal of Cryptology
2016-06-01Paper
Distribution design
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
Efficient reliable communication over partially authenticated networks
Proceedings of the twenty-second annual symposium on Principles of distributed computing
2015-09-04Paper
Protocols for multiparty coin toss with a dishonest majority
Journal of Cryptology
2015-08-03Paper
Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
Theory of Cryptography
2015-07-06Paper
Private approximation of search problems
Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing
2014-11-25Paper
Choosing, agreeing, and eliminating in communication complexity
Computational Complexity
2014-09-25Paper
Non-interactive secure multiparty computation
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Bounds on the sample complexity for private learning and private data release
Machine Learning
2014-07-14Paper
Multi-linear secret-sharing schemes
Theory of Cryptography
2014-02-18Paper
On the Cryptographic Complexity of the Worst Functions
Theory of Cryptography
2014-02-18Paper
Private Learning and Sanitization: Pure vs. Approximate Differential Privacy
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
2013-10-04Paper
On private computation in incomplete networks
Distributed Computing
2013-06-20Paper
Efficient reliable communication over partially authenticated networks
Distributed Computing
2013-06-07Paper
Secret sharing schemes for very dense graphs
Lecture Notes in Computer Science
2012-09-25Paper
Communication-efficient distributed oblivious transfer
Journal of Computer and System Sciences
2012-08-17Paper
\(1/p\)-secure multiparty computation without honest majority and the best of both worlds
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Secret-Sharing Schemes: A Survey
Lecture Notes in Computer Science
2011-06-08Paper
Private approximation of clustering and vertex cover
Computational Complexity
2011-02-18Paper
Choosing, agreeing, and eliminating in communication complexity
Automata, Languages and Programming
2010-09-07Paper
Protocols for multiparty coin toss with dishonest majority
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
How should we solve search problems privately?
Journal of Cryptology
2010-03-01Paper
Bounds on the sample complexity for private learning and private data release
Theory of Cryptography
2010-02-24Paper
Monotone circuits for monotone weighted threshold functions
Information Processing Letters
2009-12-18Paper
Private Approximation of Search Problems
SIAM Journal on Computing
2009-11-06Paper
Approximate belief updating in max-2-connected Bayes networks is NP-hard
Artificial Intelligence
2009-09-14Paper
Matrix columns allocation problems
Theoretical Computer Science
2009-05-28Paper
Theory of Cryptography
Lecture Notes in Computer Science
2009-05-14Paper
Characterizing Ideal Weighted Threshold Secret Sharing
SIAM Journal on Discrete Mathematics
2009-03-16Paper
How Should We Solve Search Problems Privately?
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Secret Sharing and Non-Shannon Information Inequalities
Theory of Cryptography
2009-03-03Paper
On Matroids and Nonideal Secret Sharing
IEEE Transactions on Information Theory
2009-02-24Paper
Distributed Private Data Analysis: Simultaneously Solving How and What
Lecture Notes in Computer Science
2009-02-10Paper
Edge Eavesdropping Games
Lecture Notes in Computer Science
2008-11-27Paper
On Linear Secret Sharing for Connectivity in Directed Graphs
Lecture Notes in Computer Science
2008-11-20Paper
Matroids Can Be Far from Ideal Secret Sharing
Theory of Cryptography
2008-03-05Paper
Private Approximation of Clustering and Vertex Cover
Theory of Cryptography
2007-08-30Paper
Weakly-Private Secret Sharing Schemes
Theory of Cryptography
2007-08-30Paper
Robust information-theoretic private information retrieval
Journal of Cryptology
2007-08-20Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Structural Information and Communication Complexity
Lecture Notes in Computer Science
2005-11-30Paper
Separating the Power of Monotone Span Programs over Different Fields
SIAM Journal on Computing
2005-09-16Paper
On the Power of Nonlinear Secret-Sharing
SIAM Journal on Discrete Mathematics
2005-09-16Paper
General constructions for information-theoretic private information retrieval
Journal of Computer and System Sciences
2005-08-03Paper
Reducing the servers' computation in private information retrieval: PIR with preprocessing
Journal of Cryptology
2004-09-27Paper
Buses for anonymous message delivery
Journal of Cryptology
2003-08-27Paper
scientific article; zbMATH DE number 1952910 (Why is no real title available?)
 
2003-07-24Paper
Learning functions represented as multiplicity automata
Journal of the ACM
2003-06-25Paper
The query complexity of finding local minima in the lattice
Information and Computation
2003-01-14Paper
scientific article; zbMATH DE number 1759771 (Why is no real title available?)
 
2002-07-28Paper
scientific article; zbMATH DE number 1754644 (Why is no real title available?)
 
2002-06-12Paper
On arithmetic branching programs
Journal of Computer and System Sciences
2000-11-22Paper
scientific article; zbMATH DE number 1418289 (Why is no real title available?)
 
2000-07-26Paper
Computing Functions of a Shared Secret
SIAM Journal on Discrete Mathematics
2000-07-20Paper
Secret Sharing With Public Reconstruction
IEEE Transactions on Information Theory
1999-11-21Paper
scientific article; zbMATH DE number 1335881 (Why is no real title available?)
 
1999-09-13Paper
scientific article; zbMATH DE number 1306900 (Why is no real title available?)
 
1999-08-31Paper
scientific article; zbMATH DE number 708805 (Why is no real title available?)
 
1999-08-29Paper
Reliable communication over partially authenticated networks
Theoretical Computer Science
1999-06-21Paper
Learning boxes in high dimension
Algorithmica
1999-05-18Paper
scientific article; zbMATH DE number 1031004 (Why is no real title available?)
 
1997-12-01Paper
Lower bounds for monotone span programs
Computational Complexity
1997-09-07Paper
scientific article; zbMATH DE number 1024077 (Why is no real title available?)
 
1997-07-20Paper
Communication in key distribution schemes
IEEE Transactions on Information Theory
1996-06-02Paper
Universally ideal secret-sharing schemes
IEEE Transactions on Information Theory
1995-07-12Paper


Research outcomes over time


This page was built for person: Amos Beimel