Gilad Asharov

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
NIZKs with maliciously chosen CRS: subversion advice-ZK and accountable soundness2025-01-10Paper
Perfect asynchronous MPC with linear communication overhead2024-11-13Paper
Perfect (parallel) broadcast in constant expected rounds via statistical VSS2024-11-13Paper
Complete characterization of fairness in secure two-party computation of Boolean functions
SIAM Journal on Computing
2024-10-21Paper
Optimal oblivious parallel RAM2024-07-19Paper
OptORAMa: Optimal oblivious RAM
Journal of the ACM
2024-07-04Paper
Static vs. adaptive security in perfect MPC: a separation and the adaptive security of BGW2024-06-25Paper
Bucket oblivious sort: an extremely simple oblivious sort2024-05-14Paper
Gradecast in Synchrony and Reliable Broadcast in Asynchrony with Optimal Resilience, Efficiency, and Unconditional Security
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing
2024-03-26Paper
scientific article; zbMATH DE number 7788472 (Why is no real title available?)2024-01-15Paper
Detect, pack and batch: perfectly-secure MPC with linear communication and constant expected time
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Oblivious parallel tight compaction2023-11-02Paper
Asymptotically free broadcast in constant expected time via packed VSS
Theory of Cryptography
2023-08-14Paper
Efficient perfectly secure computation with optimal resilience
Theory of Cryptography
2023-04-13Paper
Oblivious RAM with worst-case logarithmic overhead
Journal of Cryptology
2023-04-13Paper
Efficient perfectly secure computation with optimal resilience
Journal of Cryptology
2022-10-04Paper
A complete characterization of game-theoretically fair, multi-party coin toss2022-08-30Paper
On the complexity of compressing obfuscation
Journal of Cryptology
2022-07-18Paper
Sorting Short Keys in Circuits of Size ${o(n \log n)}$
SIAM Journal on Computing
2022-05-31Paper
Oblivious RAM with \textit{worst-case} logarithmic overhead2022-05-18Paper
OptORAMa: optimal oblivious RAM2022-03-23Paper
Locality-preserving oblivious RAM
Journal of Cryptology
2022-03-03Paper
Towards accountability in CRS generation2021-12-08Paper
Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations
SIAM Journal on Computing
2021-10-18Paper
Tight tradeoffs in searchable symmetric encryption
Journal of Cryptology
2021-04-07Paper
On the complexity of compressing obfuscation
Lecture Notes in Computer Science
2020-06-30Paper
Locality-preserving oblivious RAM
Advances in Cryptology – EUROCRYPT 2019
2020-02-06Paper
On constructing one-way permutations from indistinguishability obfuscation
Journal of Cryptology
2018-09-14Paper
Tight tradeoffs in searchable symmetric encryption
Lecture Notes in Computer Science
2018-09-12Paper
More efficient oblivious transfer extensions
Journal of Cryptology
2017-10-12Paper
Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2017-09-29Paper
A full proof of the BGW protocol for perfectly secure multiparty computation
Journal of Cryptology
2017-03-02Paper
Limits on the power of indistinguishability obfuscation and functional encryption
SIAM Journal on Computing
2016-12-21Paper
Toward a game theoretic view of secure computation
Journal of Cryptology
2016-10-13Paper
On constructing one-way permutations from indistinguishability obfuscation
Theory of Cryptography
2016-04-08Paper
More efficient oblivious transfer extensions with security for malicious adversaries
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions
Theory of Cryptography
2015-07-06Paper
Towards characterizing complete fairness in secure two-party computation
Theory of Cryptography
2014-02-18Paper
Fair and efficient secure multiparty computation with reputation systems
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Calling out cheaters: covert security with public verifiability
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A full characterization of functions that imply fair coin tossing and ramifications to fairness
Theory of Cryptography
2013-03-18Paper
Multiparty computation with low communication, computation and interaction via threshold FHE
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Perfectly-secure multiplication for any \(t < n/3\)
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Towards a game theoretic view of secure computation
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Utility dependence in correct and fair rational secret sharing
Journal of Cryptology
2011-04-01Paper
Utility Dependence in Correct and Fair Rational Secret Sharing
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper


Research outcomes over time


This page was built for person: Gilad Asharov