Gil Segev

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Exponent-VRFs and their applications2025-12-02Paper
Limits on the power of indistinguishability obfuscation and functional encryption2025-08-05Paper
From one-time to two-round reusable multi-signatures without nested forking2025-07-25Paper
How to approximate a set without knowing its size in advance2025-05-20Paper
Backyard cuckoo hashing: constant worst-case operations with a succinct representation2025-04-29Paper
Is ML-based cryptanalysis inherently limited? Simulating cryptographic adversaries via gradient-based methods2024-12-13Paper
Rogue-instance security for batch knowledge proofs2024-08-01Paper
Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \(\Sigma\)-protocols
Journal of Cryptology
2024-07-10Paper
A fully-constructive discrete-logarithm preprocessing algorithm with an optimal time-space tradeoff2024-06-25Paper
scientific article; zbMATH DE number 7759462 (Why is no real title available?)2023-11-02Paper
Out-of-band authenticated group key exchange: from strong authentication to immediate key delivery2023-11-02Paper
Non-malleable vector commitments via local equivocability
Journal of Cryptology
2023-10-25Paper
Generic-Group Identity-Based Encryption: A Tight Impossibility Result2023-07-03Paper
Non-malleable vector commitments via local equivocability2023-04-13Paper
Generically speeding-up repeated squaring is equivalent to factoring: sharp thresholds for all generic-ring delay functions2022-12-07Paper
Tighter security for Schnorr identification and signatures: a high-moment forking lemma for \({\varSigma }\)-protocols2022-03-31Paper
Accumulators in (and beyond) generic groups: non-trivial batch verification requires interaction2022-03-23Paper
Algebraic distinguishers: from discrete logarithms to decisional Uber assumptions2022-03-23Paper
Generic-group delay functions require hidden-order groups2021-12-01Paper
Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations
SIAM Journal on Computing
2021-10-18Paper
Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
Journal of Cryptology
2021-09-10Paper
Tight tradeoffs in searchable symmetric encryption
Journal of Cryptology
2021-04-07Paper
Can PPAD hardness be based on standard cryptographic assumptions?
Journal of Cryptology
2021-04-07Paper
From minicrypt to obfustopia via private-key functional encryption
Journal of Cryptology
2020-04-28Paper
Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?
Theory of Cryptography
2018-12-11Paper
Ciphertext expansion in limited-leakage order-preserving encryption: a tight computational lower bound2018-12-06Paper
The security of lazy users in out-of-band authentication2018-12-06Paper
Deterministic public-key encryption for adaptively-chosen plaintext distributions
Journal of Cryptology
2018-11-01Paper
Securing Abe's mix-net against malicious verifiers via witness indistinguishability2018-10-17Paper
On constructing one-way permutations from indistinguishability obfuscation
Journal of Cryptology
2018-09-14Paper
Out-of-band authentication in group messaging: computational, statistical, optimal2018-09-12Paper
Tight tradeoffs in searchable symmetric encryption
Lecture Notes in Computer Science
2018-09-12Paper
Anonymous IBE, leakage resilience and circular security from new assumptions2018-07-09Paper
Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
Journal of Cryptology
2018-05-28Paper
scientific article; zbMATH DE number 6866298 (Why is no real title available?)2018-05-03Paper
Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
Journal of Cryptology
2018-04-26Paper
Incremental deterministic public-key encryption
Journal of Cryptology
2018-04-26Paper
Function-private functional encryption in the private-key setting
Journal of Cryptology
2018-04-26Paper
Strengthening the security of encrypted databases: non-transitive JOINs2018-01-19Paper
Can PPAD hardness be based on standard cryptographic assumptions?
Theory of Cryptography
2018-01-19Paper
Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2017-09-29Paper
From Minicrypt to Obfustopia via private-key functional encryption
Lecture Notes in Computer Science
2017-06-13Paper
Limits on the power of indistinguishability obfuscation and functional encryption
SIAM Journal on Computing
2016-12-21Paper
Targeted malleability: homomorphic encryption for restricted computations
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
2016-10-07Paper
An optimally fair coin toss
Journal of Cryptology
2016-09-21Paper
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
On constructing one-way permutations from indistinguishability obfuscation
Theory of Cryptography
2016-04-08Paper
From selective to adaptive security in functional encryption
Lecture Notes in Computer Science
2015-12-10Paper
Function-private functional encryption in the private-key setting
Theory of Cryptography
2015-07-06Paper
Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
Theory of Cryptography
2015-07-06Paper
Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments
SIAM Journal on Computing
2015-06-02Paper
Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments
SIAM Journal on Computing
2015-06-02Paper
Better security for deterministic public-key encryption: the auxiliary-input setting
Journal of Cryptology
2014-09-25Paper
Balls and Bins: Smaller Hash Families and Faster Evaluation
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
2014-07-30Paper
Nonmalleable extractors with short seeds and applications to privacy amplification
SIAM Journal on Computing
2014-07-30Paper
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Function-private subspace-membership encryption and its applications
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Balls and bins: smaller hash families and faster evaluation
SIAM Journal on Computing
2013-09-25Paper
Function-private identity-based encryption: hiding the function in functional encryption
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Message-Locked Encryption for Lock-Dependent Messages
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Fully leakage-resilient signatures
Journal of Cryptology
2013-08-01Paper
Deterministic public-key encryption for adaptively chosen plaintext distributions
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
More constructions of lossy and correlation-secure trapdoor functions
Journal of Cryptology
2013-04-15Paper
Public-key cryptosystems resilient to key leakage
SIAM Journal on Computing
2012-11-29Paper
Incremental Deterministic Public-Key Encryption
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Lossy functions do not amplify well
Theory of Cryptography
2012-06-15Paper
Sketching in Adversarial Environments
SIAM Journal on Computing
2012-03-15Paper
Better security for deterministic public-key encryption: the auxiliary-input setting
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Fully Leakage-Resilient Signatures
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Deterministic history-independent strategies for storing information on write-once memories
Theory of Computing
2011-05-24Paper
Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions
Theory of Cryptography
2011-05-19Paper
Chosen-ciphertext security via correlated products
SIAM Journal on Computing
2011-04-04Paper
Public-key encryption in the bounded-retrieval model
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
More constructions of lossy and correlation-secure trapdoor functions
Public Key Cryptography – PKC 2010
2010-05-28Paper
Public-Key Cryptographic Primitives Provably as Secure as Subset Sum
Theory of Cryptography
2010-02-24Paper
Approximate \(k\)-Steiner forests via the Lagrangian relaxation technique with internal preprocessing
Algorithmica
2010-02-23Paper
Hedged public-key encryption: how to protect against bad randomness
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Public-Key Cryptosystems Resilient to Key Leakage
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
De-amortized Cuckoo Hashing: Provable Worst-Case Performance and Experimental Results
Automata, Languages and Programming
2009-07-14Paper
An Optimally Fair Coin Toss
Theory of Cryptography
2009-03-03Paper
Chosen-Ciphertext Security via Correlated Products
Theory of Cryptography
2009-03-03Paper
scientific article; zbMATH DE number 5485579 (Why is no real title available?)2009-01-05Paper
History-Independent Cuckoo Hashing
Automata, Languages and Programming
2008-08-19Paper
David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Approximate k-Steiner Forests Via the Lagrangian Relaxation Technique with Internal Preprocessing
Lecture Notes in Computer Science
2008-03-11Paper
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
Theory of Cryptography
2008-03-05Paper
Deterministic History-Independent Strategies for Storing Information on Write-Once Memories
Automata, Languages and Programming
2007-11-28Paper


Research outcomes over time


This page was built for person: Gil Segev