Benny Applebaum

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Stochastic secret sharing with 1-bit shares and applications to MPC
 
2024-12-13Paper
Conflict checkable and decodable codes and their applications
 
2024-11-28Paper
The round complexity of statistical MPC with optimal resiliency
 
2024-05-08Paper
Succinct computational secret sharing
 
2024-05-08Paper
scientific article; zbMATH DE number 7829240 (Why is no real title available?)
 
2024-04-09Paper
How to recover a secret with \(O(n)\) additions
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Sampling Graphs without Forbidden Subgraphs and Unbalanced Expanders with Negligible Error
SIAM Journal on Computing
2023-12-15Paper
Actively secure arithmetic computation and VOLE with constant computational overhead
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)
Theory of Cryptography
2023-08-14Paper
Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Quadratic multiparty randomized encodings beyond honest majority and their applications
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
scientific article; zbMATH DE number 7706036 (Why is no real title available?)
 
2023-07-03Paper
Correction to: ``Locally computable UOWHF with linear shrinkage
Journal of Cryptology
2023-04-13Paper
On actively-secure elementary MPC reductions
 
2023-03-31Paper
scientific article; zbMATH DE number 7650419 (Why is no real title available?)
 
2023-02-03Paper
scientific article; zbMATH DE number 7559047 (Why is no real title available?)
 
2022-07-18Paper
Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)
 
2022-04-22Paper
The resiliency of MPC with low interaction: the benefit of making errors (extended abstract)
 
2022-03-23Paper
On the Power of Amortization in Secret Sharing
ACM Transactions on Computation Theory
2022-03-07Paper
Garbled circuits as randomized encodings of functions: a primer
Tutorials on the Foundations of Cryptography
2022-01-12Paper
Obfuscating circuits via composite-order graded encoding
Journal of Cryptology
2021-07-02Paper
Placing conditional disclosure of secrets in the communication complexity universe
Journal of Cryptology
2021-06-28Paper
Perfect secure computation in two rounds
SIAM Journal on Computing
2021-02-08Paper
Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations
SIAM Journal on Computing
2021-02-08Paper
Better secret sharing via robust conditional disclosure of secrets
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing
2021-01-19Paper
The communication complexity of private simultaneous messages, revisited
Journal of Cryptology
2020-06-15Paper
Degree 2 is complete for the round-complexity of malicious MPC
 
2020-02-06Paper
Secret-sharing schemes for general and uniform access structures
 
2020-02-04Paper
On the relationship between statistical zero-knowledge and statistical randomized encodings
Computational Complexity
2019-12-19Paper
Perfect secure computation in two rounds
 
2018-12-11Paper
On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate
 
2018-12-11Paper
The communication complexity of private simultaneous messages, revisited
Advances in Cryptology – EUROCRYPT 2018
2018-07-09Paper
Explicit rateless codes for memoryless binary-input output-symmetric channels
Theory of Computing
2018-06-15Paper
Arithmetic cryptography
Journal of the ACM
2018-05-17Paper
Low-complexity cryptographic hash functions
 
2018-05-03Paper
Minimizing locality of one-way functions via semi-private randomized encodings
Journal of Cryptology
2018-04-26Paper
From private simultaneous messages to zero-information Arthur-Merlin protocols and back
Journal of Cryptology
2018-02-15Paper
Incompressible functions, relative-error extractors, and the power of nondeterministic reductions (extended abstract)
 
2018-01-24Paper
Algebraic attacks against random local functions and their countermeasures
SIAM Journal on Computing
2018-01-12Paper
Clique here: on the distributed complexity in fully-connected networks
Parallel Processing Letters
2017-12-15Paper
Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations
 
2017-11-03Paper
Locally computable UOWHF with linear shrinkage
Journal of Cryptology
2017-10-12Paper
Algebraic attacks against random local functions and their countermeasures
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2017-09-29Paper
Arithmetic cryptography (extended abstract)
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science
2017-05-19Paper
Deterministic rateless codes for BSC
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science
2017-05-19Paper
Encoding functions with constant online rate, or how to compress garbled circuit keys
SIAM Journal on Computing
2017-01-13Paper
Fast pseudorandom functions based on expander graphs
Theory of Cryptography
2016-12-21Paper
On the relationship between statistical zero-knowledge and statistical randomized encodings
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Cryptographic hardness of random local functions. Survey
Computational Complexity
2016-10-28Paper
Garbling XOR gates ``for free in the standard model
Journal of Cryptology
2016-09-21Paper
A dichotomy for local small-bias generators
Journal of Cryptology
2016-09-21Paper
Incompressible functions, relative-error extractors, and the power of nondeterministic reductions
Computational Complexity
2016-06-30Paper
From private simultaneous messages to zero-information Arthur-Merlin protocols and back
Theory of Cryptography
2016-04-08Paper
Obfuscating circuits via composite-order graded encoding
Theory of Cryptography
2015-07-06Paper
Bootstrapping Obfuscators via Fast Pseudorandom Functions
Lecture Notes in Computer Science
2015-01-06Paper
Key-dependent message security: generic amplification and completeness
Journal of Cryptology
2014-09-25Paper
Public-key cryptography from different assumptions
Proceedings of the forty-second ACM symposium on Theory of computing
2014-08-13Paper
How to Garble Arithmetic Circuits
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
2014-07-30Paper
How to garble arithmetic circuits
SIAM Journal on Computing
2014-07-30Paper
Pseudorandom generators with long stretch and low locality from random local one-way functions
Proceedings of the forty-fourth annual ACM symposium on Theory of computing
2014-05-13Paper
Pseudorandom generators with long stretch and low locality from random local one-way functions
SIAM Journal on Computing
2014-02-04Paper
Encoding functions with constant online rate or how to compress garbled circuits keys
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Locally computable UOWHF with linear shrinkage
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Cryptographic hardness of random local functions -- survey
Theory of Cryptography
2013-03-18Paper
Garbling XOR gates ``for free in the standard model
Theory of Cryptography
2013-03-18Paper
A dichotomy for local small-bias generators
Theory of Cryptography
2012-06-15Paper
Key-dependent message security: generic amplification and completeness
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Randomly encoding functions: a new cryptographic paradigm. (Invited talk)
Lecture Notes in Computer Science
2011-05-19Paper
Cryptography in constant parallel time
Information Security and Cryptography
2011-02-14Paper
From secrecy to soundness: efficient verification via secure computation (extended abstract)
Automata, Languages and Programming
2010-09-07Paper
Cryptography with constant input locality
Journal of Cryptology
2009-11-13Paper
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Cryptography with Constant Input Locality
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\)
Computational Complexity
2008-08-20Paper
Computationally private randomizing polynomials and their applications
Computational Complexity
2007-11-05Paper
Cryptography in $NC^0$
SIAM Journal on Computing
2007-09-07Paper
On Pseudorandom Generators with Linear Stretch in NC0
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
2007-08-28Paper


Research outcomes over time


This page was built for person: Benny Applebaum