Notice: Unexpected clearActionName after getActionName already called in /var/www/html/w/includes/context/RequestContext.php on line 333
Amos Beimel - MaRDI portal

Amos Beimel

From MaRDI portal
(Redirected from Person:1271192)
Person:290383

Available identifiers

zbMath Open beimel.amosMaRDI QIDQ290383

List of research outcomes





PublicationDate of PublicationType
Structural lower bounds on black-box constructions of pseudorandom functions2024-12-13Paper
Lower bounds for secret-sharing schemes for \(k\)-hypergraphs2024-11-22Paper
Complete characterization of fairness in secure two-party computation of Boolean functions2024-10-21Paper
Three party secure computation with friends and foes2024-08-02Paper
Improved polynomial secret-sharing schemes2024-08-02Paper
Cryptography from planted graphs: security with logarithmic-size messages2024-08-01Paper
Quadratic secret sharing and conditional disclosure of secrets2024-07-21Paper
Succinct computational secret sharing2024-05-08Paper
https://portal.mardi4nfdi.de/entity/Q61262302024-04-09Paper
Dynamic algorithms against an adaptive adversary: generic constructions and lower bounds2023-12-08Paper
https://portal.mardi4nfdi.de/entity/Q60593742023-11-02Paper
https://portal.mardi4nfdi.de/entity/Q58755252023-02-03Paper
Tighter Bounds on MultiParty Coin Flipping via Augmented Weak Martingales and Differentially Private Sampling2022-08-12Paper
Linear Secret-Sharing Schemes for Forbidden Graph Access Structures2022-05-30Paper
Quadratic secret sharing and conditional disclosure of secrets2022-04-22Paper
On the round complexity of the shuffle model2022-03-23Paper
The share size of secret-sharing schemes for almost all access structures and graphs2022-03-23Paper
Evolving ramp secret sharing with a small gap2021-12-01Paper
Learning privately with labeled and unlabeled examples2021-02-01Paper
Better secret sharing via robust conditional disclosure of secrets2021-01-19Paper
\(1/p\)-secure multiparty computation without an honest majority and the best of both worlds2020-11-06Paper
https://portal.mardi4nfdi.de/entity/Q52142382020-02-07Paper
Secret-sharing schemes for general and uniform access structures2020-02-04Paper
Optimal linear multiparty conditional disclosure of secrets protocols2019-01-23Paper
Evolving ramp secret-sharing schemes2018-10-17Paper
The complexity of multiparty PSM protocols and related models2018-07-09Paper
Linear secret-sharing schemes for forbidden graph access structures2018-01-19Paper
Learning Privately with Labeled and Unlabeled Examples2017-10-05Paper
Secret Sharing and Non-Shannon Information Inequalities2017-07-12Paper
Ad Hoc PSM Protocols: Secure Computation Without Coordination2017-06-23Paper
Characterizing the sample complexity of private learners2017-05-16Paper
Secret Sharing Schemes for Dense Forbidden Graphs2016-10-21Paper
One-way functions are essential for single-server private information retrieval2016-09-29Paper
https://portal.mardi4nfdi.de/entity/Q57416342016-07-29Paper
Learning unions of high-dimensional boxes over the reals2016-06-16Paper
Secret-sharing schemes for very dense graphs2016-06-01Paper
Distribution Design2016-04-15Paper
Efficient reliable communication over partially authenticated networks2015-09-04Paper
Protocols for multiparty coin toss with a dishonest majority2015-08-03Paper
Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions2015-07-06Paper
Private approximation of search problems2014-11-25Paper
Choosing, agreeing, and eliminating in communication complexity2014-09-25Paper
Non-Interactive Secure Multiparty Computation2014-08-07Paper
Bounds on the sample complexity for private learning and private data release2014-07-14Paper
On the Cryptographic Complexity of the Worst Functions2014-02-18Paper
Multi-linear Secret-Sharing Schemes2014-02-18Paper
Private Learning and Sanitization: Pure vs. Approximate Differential Privacy2013-10-04Paper
On private computation in incomplete networks2013-06-20Paper
Efficient reliable communication over partially authenticated networks2013-06-07Paper
Secret Sharing Schemes for Very Dense Graphs2012-09-25Paper
Communication-efficient distributed oblivious transfer2012-08-17Paper
1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds2011-08-12Paper
Secret-Sharing Schemes: A Survey2011-06-08Paper
Private approximation of clustering and vertex cover2011-02-18Paper
Choosing, Agreeing, and Eliminating in Communication Complexity2010-09-07Paper
Protocols for Multiparty Coin Toss with Dishonest Majority2010-08-24Paper
How should we solve search problems privately?2010-03-01Paper
Bounds on the Sample Complexity for Private Learning and Private Data Release2010-02-24Paper
Monotone circuits for monotone weighted threshold functions2009-12-18Paper
Private Approximation of Search Problems2009-11-06Paper
Approximate belief updating in max-2-connected Bayes networks is NP-hard2009-09-14Paper
Matrix columns allocation problems2009-05-28Paper
Theory of Cryptography2009-05-14Paper
Characterizing Ideal Weighted Threshold Secret Sharing2009-03-16Paper
How Should We Solve Search Problems Privately?2009-03-10Paper
Secret Sharing and Non-Shannon Information Inequalities2009-03-03Paper
On Matroids and Nonideal Secret Sharing2009-02-24Paper
Distributed Private Data Analysis: Simultaneously Solving How and What2009-02-10Paper
Edge Eavesdropping Games2008-11-27Paper
On Linear Secret Sharing for Connectivity in Directed Graphs2008-11-20Paper
Matroids Can Be Far from Ideal Secret Sharing2008-03-05Paper
Weakly-Private Secret Sharing Schemes2007-08-30Paper
Private Approximation of Clustering and Vertex Cover2007-08-30Paper
Robust information-theoretic private information retrieval2007-08-20Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2005-12-07Paper
Structural Information and Communication Complexity2005-11-30Paper
Separating the Power of Monotone Span Programs over Different Fields2005-09-16Paper
On the Power of Nonlinear Secret-Sharing2005-09-16Paper
General constructions for information-theoretic private information retrieval2005-08-03Paper
Reducing the servers' computation in private information retrieval: PIR with preprocessing2004-09-27Paper
Buses for anonymous message delivery2003-08-27Paper
https://portal.mardi4nfdi.de/entity/Q44142922003-07-24Paper
Learning functions represented as multiplicity automata2003-06-25Paper
The query complexity of finding local minima in the lattice2003-01-14Paper
https://portal.mardi4nfdi.de/entity/Q45367942002-07-28Paper
https://portal.mardi4nfdi.de/entity/Q45350722002-06-12Paper
On arithmetic branching programs2000-11-22Paper
https://portal.mardi4nfdi.de/entity/Q49418492000-07-26Paper
Computing Functions of a Shared Secret2000-07-20Paper
Secret Sharing With Public Reconstruction1999-11-21Paper
https://portal.mardi4nfdi.de/entity/Q42585721999-09-13Paper
https://portal.mardi4nfdi.de/entity/Q42527531999-08-31Paper
https://portal.mardi4nfdi.de/entity/Q43186931999-08-29Paper
Reliable communication over partially authenticated networks1999-06-21Paper
Learning boxes in high dimension1999-05-18Paper
https://portal.mardi4nfdi.de/entity/Q43434471997-12-01Paper
Lower bounds for monotone span programs1997-09-07Paper
https://portal.mardi4nfdi.de/entity/Q43417711997-07-20Paper
Communication in key distribution schemes1996-06-02Paper
Universally ideal secret-sharing schemes1995-07-12Paper

Research outcomes over time

This page was built for person: Amos Beimel