Rafail Ostrovsky

From MaRDI portal
Person:166365

Available identifiers

zbMath Open ostrovsky.rafailDBLPo/RafailOstrovskyWikidataQ4339024 ScholiaQ4339024MaRDI QIDQ166365

List of research outcomes





PublicationDate of PublicationType
Asymmetric multi-party computation2024-11-22Paper
Anonymous permutation routing2024-08-02Paper
Tri-state circuits. A circuit model that captures RAM2024-02-06Paper
Succinct arguments for RAM programs via projection codes2024-02-02Paper
List oblivious transfer and applications to round-optimal black-box multiparty coin tossing2024-02-02Paper
https://portal.mardi4nfdi.de/entity/Q60908882023-11-20Paper
Streaming and unbalanced PSI from function secret sharing2023-07-25Paper
Prio+: privacy preserving aggregate statistics via Boolean shares2023-07-25Paper
Authenticated garbling from simple correlations2023-07-07Paper
https://portal.mardi4nfdi.de/entity/Q61072542023-07-03Paper
How to build a trapdoor function from an encryption scheme2023-05-12Paper
Oblivious transfer from trapdoor permutations in minimal rounds2023-04-13Paper
A Combinatorial Characterization of Self-stabilizing Population Protocols2023-03-21Paper
Efficient 3-party distributed ORAM2022-12-16Paper
Communication-efficient (proactive) secure computation for dynamic general adversary structures and dynamic groups2022-12-16Paper
On succinct arguments and witness encryption from groups2022-11-09Paper
Adaptively secure computation for RAM programs2022-08-30Paper
\textsc{EpiGRAM}: practical garbled RAM2022-08-30Paper
Garbled circuits with sublinear evaluator2022-08-30Paper
Secure commitment against a powerful adversary2022-08-18Paper
CNF-FSS and Its Applications2022-07-08Paper
Succinct non-interactive arguments via linear interactive proofs2022-05-10Paper
ATLAS: efficient and scalable MPC in the honest majority setting2022-04-22Paper
A refined approximation for Euclidean \(k\)-means2022-04-07Paper
Round optimal secure multiparty computation from minimal assumptions2022-03-23Paper
Threshold garbled circuits and ad hoc secure computation2021-12-08Paper
Efficient range-trapdoor functions and applications: rate-1 OT and more2021-12-01Paper
https://portal.mardi4nfdi.de/entity/Q50027752021-07-28Paper
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND2021-03-30Paper
Adaptive garbled RAM from laconic oblivious transfer2020-06-30Paper
Continuously non-malleable codes in the split-state model from minimal assumptions2020-06-30Paper
Oblivious sampling with applications to two-party \(k\)-means clustering2020-06-15Paper
UC-secure multiparty computation from one-way functions using stateless tokens2020-05-05Paper
Lower and upper bounds on the randomness complexity of private computations of AND2020-04-30Paper
Efficient Error-Correcting Codes for Sliding Windows2020-03-26Paper
Reusable non-interactive secure computation2020-03-09Paper
Trapdoor hash functions and their applications2020-03-09Paper
Universally composable secure computation with corrupted tokens2020-03-09Paper
Cryptographic sensing2020-03-09Paper
Private anonymous data access2020-02-06Paper
A stable marriage requires communication2019-12-12Paper
Population Stability2019-09-19Paper
https://portal.mardi4nfdi.de/entity/Q57433852019-05-10Paper
Non-interactive secure computation from one-way functions2019-01-23Paper
Round optimal black-box ``commit-and-prove2018-12-11Paper
Information-theoretic broadcast with dishonest majority for long messages2018-12-11Paper
Improved algorithms for optimal embeddings2018-11-05Paper
Proactive secure multiparty computation with a dishonest majority2018-10-17Paper
Matrix Balancing in Lp Norms: Bounding the Convergence Rate of Osborne's Iteration2018-07-16Paper
Coding for Interactive Communication Correcting Insertions and Deletions2018-06-27Paper
On the message complexity of secure multiparty computation2018-05-16Paper
Space-time tradeoffs for distributed verification2018-04-12Paper
Efficient robust secret sharing from expander graphs2018-01-29Paper
Round-optimal secure two-party computation from trapdoor permutations2018-01-19Paper
Delayed-input non-malleable zero knowledge and multi-party coin tossing in four rounds2018-01-19Paper
Resettably-sound resettable zero knowledge in constant rounds2018-01-19Paper
https://portal.mardi4nfdi.de/entity/Q45982002017-12-19Paper
Provably Secure Virus Detection: Using The Observer Effect Against Malware.2017-12-19Paper
Four-round concurrent non-malleable commitments from one-way functions2017-11-15Paper
Black-box parallel garbled RAM2017-11-15Paper
https://portal.mardi4nfdi.de/entity/Q45913702017-11-14Paper
The price of low communication in secure multi-party computation2017-11-03Paper
Brief Announcement2017-10-11Paper
A Stable Marriage Requires Communication2017-10-05Paper
Randomness vs. fault-tolerance2017-09-29Paper
https://portal.mardi4nfdi.de/entity/Q53650192017-09-29Paper
Space-time tradeoffs for distributed verification2017-09-29Paper
Brief Announcement2017-09-29Paper
Memory-efficient and self-stabilizing network RESET (extended abstract)2017-09-29Paper
Faster computation on directed networks of automata2017-09-29Paper
Zero-One Laws for Sliding Windows and Universal Sketches2017-08-31Paper
A Randomized Online Quantile Summary in O(1/epsilon * log(1/epsilon)) Words.2017-08-31Paper
Error-Correcting Codes for Automatic Control2017-08-08Paper
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs2017-06-13Paper
Circuit-Private Multi-key FHE2017-06-13Paper
The Hidden Graph Model2017-05-19Paper
Secure Message Transmission With Small Public Discussion2017-05-16Paper
Optimal Coding for Streaming Authentication and Interactive Communication2017-04-28Paper
Adaptively Secure Garbled Circuits from One-Way Functions2016-11-09Paper
Concurrent Non-Malleable Commitments (and More) in 3 Rounds2016-11-09Paper
Proactive Secret Sharing with a Dishonest Majority2016-10-21Paper
High-Precision Secure Computation of Satellite Collision Probabilities2016-10-21Paper
Subquadratic approximation algorithms for clustering problems in high dimensional spaces2016-09-29Paper
Secure computation with honest-looking parties: what if nobody is truly honest? (extended abstract)2016-09-29Paper
Lower bounds for high dimensional nearest neighbor search and related problems2016-09-29Paper
Simple and efficient leader election in the full information model2016-09-01Paper
Computational complexity and knowledge complexity (extended abstract)2016-09-01Paper
Unconditionally Secure Computation with Reduced Interaction2016-07-15Paper
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption2016-04-08Paper
Adaptive Security with Quasi-Optimal Rate2016-03-23Paper
Fast distributed almost stable matchings2016-03-23Paper
Communication-Optimal Proactive Secret Sharing for Dynamic Groups2016-03-10Paper
Universal service-providers for database private information retrieval (extended abstract)2016-03-02Paper
Amortizing randomness in private multiparty computations2016-03-02Paper
On the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party Protocols2016-02-19Paper
Almost-everywhere secure computation with edge corruptions2016-01-11Paper
Round-Optimal Black-Box Two-Party Computation2015-12-10Paper
Cryptography with One-Way Communication2015-12-10Paper
Impossibility of Black-Box Simulation Against Leakage Attacks2015-12-10Paper
Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting2015-12-10Paper
Efficient and secure authenticated key exchange using weak passwords2015-12-07Paper
Polynomial-time approximation schemes for geometric min-sum median clustering2015-10-30Paper
Broadcast (and Round) Efficient Verifiable Secret Sharing2015-09-30Paper
Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World2015-09-30Paper
Locally Decodable Codes for Edit Distance2015-09-24Paper
Weighted sampling without replacement from data streams2015-09-15Paper
Optimal and efficient clock synchronization under drifting clocks2015-09-11Paper
How to withstand mobile virus attacks, revisited2015-09-03Paper
Fast and unconditionally secure anonymous channel2015-09-03Paper
Garbled RAM From One-Way Functions2015-08-21Paper
Privacy amplification with asymptotically optimal entropy loss2015-08-14Paper
Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way2015-07-06Paper
Non-committing Encryption from Φ-hiding2015-07-06Paper
Black-box non-black-box zero knowledge2015-06-26Paper
How to withstand mobile virus attacks (extended abstract)2015-06-19Paper
Local correctability of expander codes2015-06-09Paper
Efficient Error-Correcting Codes for Sliding Windows2015-01-13Paper
Authenticated adversarial routing2015-01-07Paper
Position-based cryptography2014-11-14Paper
On Selective-Opening Attacks against Encryption Schemes2014-10-14Paper
Communication-Efficient MPC for General Adversary Structures2014-10-14Paper
How to catch \(L_2\)-heavy-hitters on sliding windows2014-10-06Paper
On linear-size pseudorandom generators and hardcore functions2014-10-06Paper
Cryptography in the multi-string model2014-09-25Paper
Privacy amplification with asymptotically optimal entropy loss2014-08-13Paper
Zero-one frequency laws2014-08-13Paper
Measuring independence of datasets2014-08-13Paper
Maliciously Circuit-Private FHE2014-08-07Paper
Secure Multi-Party Computation with Identifiable Abort2014-08-07Paper
Extracting Correlations2014-07-25Paper
On Input Indistinguishable Proof Systems2014-07-01Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2014-06-04Paper
Garbled RAM Revisited2014-05-27Paper
Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing2014-03-25Paper
Cross-Domain Secure Computation2014-03-25Paper
Statistical Concurrent Non-malleable Zero Knowledge2014-02-18Paper
4-Round Resettably-Sound Zero Knowledge2014-02-18Paper
Locally Updatable and Locally Decodable Codes2014-02-18Paper
The effectiveness of lloyd-type methods for the k-means problem2014-02-17Paper
New Techniques for Noninteractive Zero-Knowledge2014-02-17Paper
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model2013-12-10Paper
Building Lossy Trapdoor Functions from Lossy Encryption2013-12-10Paper
Approximating Large Frequency Moments with Pick-and-Drop Sampling2013-10-04Paper
Generalizing the Layering Method of Indyk and Woodruff: Recursive Sketches for Frequency-Based Vectors on Streams2013-10-04Paper
Optimal Coding for Streaming Authentication and Interactive Communication2013-09-17Paper
Nearly Simultaneously Resettable Black-Box Zero Knowledge2013-08-12Paper
Local Correctability of Expander Codes2013-08-06Paper
Robust Pseudorandom Generators2013-08-06Paper
How Hard Is Counting Triangles in the Streaming Model?2013-08-06Paper
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles2013-06-27Paper
How to Catch L 2-Heavy-Hitters on Sliding Windows2013-06-11Paper
On Linear-Size Pseudorandom Generators and Hardcore Functions2013-06-11Paper
How to Garble RAM Programs?2013-05-31Paper
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions2013-05-31Paper
Cryptography Using Captcha Puzzles2013-04-19Paper
Distributed Oblivious RAM for Secure Two-Party Computation2013-03-18Paper
Concurrent Zero Knowledge in the Bounded Player Model2013-03-18Paper
Succinct Non-interactive Arguments via Linear Interactive Proofs2013-03-18Paper
Revisiting Lower and Upper Bounds for Selective Decommitments2013-03-18Paper
Edge Fault Tolerance on Sparse Networks2012-11-01Paper
Multiparty Proximity Testing with Dishonest Majority from Equality Testing2012-11-01Paper
Near-optimal radio use for wireless network synchronization2012-10-11Paper
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority2012-09-25Paper
5PM: Secure Pattern Matching2012-09-25Paper
Impossibility Results for Static Input Secure Computation2012-09-25Paper
Extended-DDH and Lossy Trapdoor Functions2012-07-20Paper
On Homomorphic Encryption and Chosen-Ciphertext Security2012-07-20Paper
Correlated Product Security from Any One-Way Function2012-07-20Paper
Unconditionally-Secure Robust Secret Sharing with Compact Shares2012-06-29Paper
Resettable Statistical Zero Knowledge2012-06-15Paper
Simultaneously Resettable Arguments of Knowledge2012-06-15Paper
Identifying Cheaters without an Honest Majority2012-06-15Paper
Optimal sampling from sliding windows2012-05-11Paper
https://portal.mardi4nfdi.de/entity/Q31137422012-01-23Paper
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security2011-12-02Paper
Deterministic and Energy-Optimal Wireless Synchronization2011-10-28Paper
Public Key Locally Decodable Codes with Short Keys2011-08-17Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2011-08-12Paper
Constant-Rate Oblivious Transfer from Noisy Channels2011-08-12Paper
Secure Message Transmission by Public Discussion: A Brief Survey2011-06-08Paper
Efficient Non-interactive Secure Computation2011-05-27Paper
Visual cryptography on graphs2011-02-18Paper
Effective Computations on Sliding Windows2011-01-17Paper
Public-Key Encryption with Efficient Amortized Updates2010-09-10Paper
Improved Fault Tolerance and Secure Computation on Sparse Networks2010-09-07Paper
Asynchronous Throughput-Optimal Routing in Malicious Networks2010-09-07Paper
Password-Authenticated Session-Key Generation on the Internet in the Plain Model2010-08-24Paper
Equivalence of Uniform Key Agreement and Composition Insecurity2010-08-24Paper
Low distortion embeddings for edit distance2010-08-16Paper
Batch codes and their applications2010-08-15Paper
Universally composable two-party and multi-party secure computation2010-08-05Paper
Zero-Knowledge Proofs from Secure Multiparty Computation2010-07-07Paper
Secure Message Transmission with Small Public Discussion2010-06-01Paper
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge2010-02-24Paper
On Complete Primitives for Fairness2010-02-24Paper
Near-Optimal Radio Use for Wireless Network Synchronization2010-01-05Paper
Position Based Cryptography2009-10-20Paper
Public Key Encryption That Allows PIR Queries2009-03-10Paper
Cryptography in the Multi-string Model2009-03-10Paper
Simulation-Based Concurrent Non-malleable Commitments and Decommitments2009-03-03Paper
Authenticated Adversarial Routing2009-03-03Paper
Public-Key Locally-Decodable Codes2009-02-10Paper
Circular-Secure Encryption from Decision Diffie-Hellman2009-02-10Paper
Communication Complexity in Algebraic Two-Party Protocols2009-02-10Paper
https://portal.mardi4nfdi.de/entity/Q35497282009-01-05Paper
https://portal.mardi4nfdi.de/entity/Q35495932009-01-05Paper
Low distortion embeddings for edit distance2008-12-21Paper
Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model2008-08-19Paper
Visual Cryptography on Graphs2008-07-10Paper
Approximation Algorithms for the Job Interval Selection Problem and Related Scheduling Problems2008-05-27Paper
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions2008-05-15Paper
Almost-Everywhere Secure Computation2008-04-15Paper
Private Searching on Streaming Data2008-03-17Paper
Private searching on streaming data2007-12-06Paper
Private Locally Decodable Codes2007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Perfect Non-interactive Zero Knowledge for NP2007-09-24Paper
Sequential Aggregate Signatures and Multisignatures Without Random Oracles2007-09-24Paper
Non-interactive Zaps and New Techniques for NIZK2007-09-04Paper
A Survey of Single-Database Private Information Retrieval: Techniques and Applications2007-09-04Paper
Security in Communication Networks2006-10-10Paper
https://portal.mardi4nfdi.de/entity/Q33749032006-03-01Paper
https://portal.mardi4nfdi.de/entity/Q33749042006-03-01Paper
Theory of Cryptography2005-12-07Paper
https://portal.mardi4nfdi.de/entity/Q56927002005-09-28Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Minimal complete primitives for secure multi-party computation2005-05-13Paper
Subquadratic approximation algorithms for clustering problems in high dimensional spaces2005-01-19Paper
https://portal.mardi4nfdi.de/entity/Q44713712004-07-28Paper
Stability preserving transformations: Packet routing networks with edge capacities and speeds2004-01-14Paper
Amortizing Randomness in Private Multiparty Computations2004-01-08Paper
https://portal.mardi4nfdi.de/entity/Q44142662003-07-24Paper
https://portal.mardi4nfdi.de/entity/Q47854982003-07-10Paper
https://portal.mardi4nfdi.de/entity/Q47837452002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q31496752002-09-30Paper
Self-Stabilizing Symmetry Breaking in Constant Space2002-09-29Paper
https://portal.mardi4nfdi.de/entity/Q45425542002-09-17Paper
https://portal.mardi4nfdi.de/entity/Q45425312002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q45425842002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q27788392002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27788422002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27541652001-12-09Paper
The Las-Vegas Processor Identity Problem (How and When to Be Unique)2001-07-16Paper
Perfect zero-knowledge arguments for NP using any one-way permutation2001-05-20Paper
Universal service-providers for private information retrieval2001-05-13Paper
https://portal.mardi4nfdi.de/entity/Q45270322001-03-01Paper
https://portal.mardi4nfdi.de/entity/Q45269942001-02-28Paper
Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces2000-10-18Paper
https://portal.mardi4nfdi.de/entity/Q49418752000-08-27Paper
Adaptive packet routing for bursty adversarial traffic2000-08-27Paper
Randomness versus fault-tolerance2000-05-08Paper
Reducibility and Completeness in Private Computations2000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q49347112000-01-31Paper
The linear-array conjecture in communication complexity is false1999-12-08Paper
https://portal.mardi4nfdi.de/entity/Q42285091999-10-04Paper
Characterizing linear size circuits in terms of privacy1999-09-22Paper
https://portal.mardi4nfdi.de/entity/Q43186941999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q43186961999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q42341051999-06-29Paper
https://portal.mardi4nfdi.de/entity/Q42493261999-06-17Paper
Conditional Oblivious Transfer and Timed-Release Encryption1999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42284481999-05-18Paper
Log-Space Polynomial End-to-End Communication1998-09-21Paper
Computational Complexity and Knowledge Complexity1998-09-20Paper
Software protection and simulation on oblivious RAMs1998-01-21Paper
https://portal.mardi4nfdi.de/entity/Q43645441997-11-17Paper
https://portal.mardi4nfdi.de/entity/Q31289321997-04-23Paper
https://portal.mardi4nfdi.de/entity/Q43645661997-01-01Paper
https://portal.mardi4nfdi.de/entity/Q48752311996-10-07Paper
https://portal.mardi4nfdi.de/entity/Q48584571996-05-21Paper
https://portal.mardi4nfdi.de/entity/Q43140421995-01-26Paper
https://portal.mardi4nfdi.de/entity/Q42873621994-04-12Paper
https://portal.mardi4nfdi.de/entity/Q32101441991-01-01Paper

Research outcomes over time

This page was built for person: Rafail Ostrovsky