Rafail Ostrovsky

From MaRDI portal
Person:166365

Available identifiers

zbMath Open ostrovsky.rafailDBLPo/RafailOstrovskyWikidataQ4339024 ScholiaQ4339024MaRDI QIDQ166365

List of research outcomes





PublicationDate of PublicationType
Asymmetric multi-party computation2024-11-22Paper
Anonymous permutation routing2024-08-02Paper
Tri-state circuits. A circuit model that captures RAM2024-02-06Paper
Succinct arguments for RAM programs via projection codes2024-02-02Paper
List oblivious transfer and applications to round-optimal black-box multiparty coin tossing2024-02-02Paper
https://portal.mardi4nfdi.de/entity/Q60908882023-11-20Paper
Streaming and unbalanced PSI from function secret sharing2023-07-25Paper
Prio+: privacy preserving aggregate statistics via Boolean shares2023-07-25Paper
Authenticated garbling from simple correlations2023-07-07Paper
https://portal.mardi4nfdi.de/entity/Q61072542023-07-03Paper
How to build a trapdoor function from an encryption scheme2023-05-12Paper
Oblivious transfer from trapdoor permutations in minimal rounds2023-04-13Paper
A Combinatorial Characterization of Self-stabilizing Population Protocols2023-03-21Paper
Efficient 3-party distributed ORAM2022-12-16Paper
Communication-efficient (proactive) secure computation for dynamic general adversary structures and dynamic groups2022-12-16Paper
On succinct arguments and witness encryption from groups2022-11-09Paper
\textsc{EpiGRAM}: practical garbled RAM2022-08-30Paper
Garbled circuits with sublinear evaluator2022-08-30Paper
Adaptively secure computation for RAM programs2022-08-30Paper
Secure commitment against a powerful adversary2022-08-18Paper
CNF-FSS and its applications2022-07-08Paper
Succinct non-interactive arguments via linear interactive proofs2022-05-10Paper
ATLAS: efficient and scalable MPC in the honest majority setting2022-04-22Paper
A refined approximation for Euclidean \(k\)-means2022-04-07Paper
Round optimal secure multiparty computation from minimal assumptions2022-03-23Paper
Threshold garbled circuits and ad hoc secure computation2021-12-08Paper
Efficient range-trapdoor functions and applications: rate-1 OT and more2021-12-01Paper
https://portal.mardi4nfdi.de/entity/Q50027752021-07-28Paper
Lower and upper bounds on the randomness complexity of private computations of AND2021-03-30Paper
Adaptive garbled RAM from laconic oblivious transfer2020-06-30Paper
Continuously non-malleable codes in the split-state model from minimal assumptions2020-06-30Paper
Oblivious sampling with applications to two-party \(k\)-means clustering2020-06-15Paper
UC-secure multiparty computation from one-way functions using stateless tokens2020-05-05Paper
Lower and upper bounds on the randomness complexity of private computations of AND2020-04-30Paper
Efficient error-correcting codes for sliding windows2020-03-26Paper
Universally composable secure computation with corrupted tokens2020-03-09Paper
Cryptographic sensing2020-03-09Paper
Reusable non-interactive secure computation2020-03-09Paper
Trapdoor hash functions and their applications2020-03-09Paper
Private anonymous data access2020-02-06Paper
A stable marriage requires communication2019-12-12Paper
Population stability. Regulating size in the presence of an adversary2019-09-19Paper
On the (in)security of hash-based oblivious RAM and a new balancing scheme2019-05-10Paper
Non-interactive secure computation from one-way functions2019-01-23Paper
Round optimal black-box ``commit-and-prove2018-12-11Paper
Information-theoretic broadcast with dishonest majority for long messages2018-12-11Paper
Improved algorithms for optimal embeddings2018-11-05Paper
Proactive secure multiparty computation with a dishonest majority2018-10-17Paper
Matrix balancing in \(L_p\) norms: bounding the convergence rate of Osborne's iteration2018-07-16Paper
Coding for Interactive Communication Correcting Insertions and Deletions2018-06-27Paper
On the message complexity of secure multiparty computation2018-05-16Paper
Space-time tradeoffs for distributed verification2018-04-12Paper
Efficient robust secret sharing from expander graphs2018-01-29Paper
Round-optimal secure two-party computation from trapdoor permutations2018-01-19Paper
Delayed-input non-malleable zero knowledge and multi-party coin tossing in four rounds2018-01-19Paper
Resettably-sound resettable zero knowledge in constant rounds2018-01-19Paper
Coding for interactive communication correcting insertions and deletions2017-12-19Paper
Provably Secure Virus Detection: Using The Observer Effect Against Malware.2017-12-19Paper
Four-round concurrent non-malleable commitments from one-way functions2017-11-15Paper
Black-box parallel garbled RAM2017-11-15Paper
A randomized online quantile summary in \(O((1/\varepsilon) \log(1/\varepsilon))\) words2017-11-14Paper
The price of low communication in secure multi-party computation2017-11-03Paper
Brief announcement: Secure self-stabilizing computation2017-10-11Paper
A Stable Marriage Requires Communication2017-10-05Paper
Brief announcement: Space-time tradeoffs for distributed verification2017-09-29Paper
Randomness vs. fault-tolerance2017-09-29Paper
Streaming \(k\)-means on well-clusterable data2017-09-29Paper
Brief announcement: Proactive secret sharing with a dishonest majority2017-09-29Paper
Memory-efficient and self-stabilizing network RESET (extended abstract)2017-09-29Paper
Faster computation on directed networks of automata2017-09-29Paper
Zero-one laws for sliding windows and universal sketches2017-08-31Paper
A randomized online quantile summary in \(O(\frac 1\varepsilon\log\frac 1\varepsilon)\) words2017-08-31Paper
Error-Correcting Codes for Automatic Control2017-08-08Paper
Unconditional UC-secure computation with (stronger-malicious) PUFs2017-06-13Paper
Circuit-private multi-key FHE2017-06-13Paper
The hidden graph model: communication locality and optimal resiliency with adaptive faults2017-05-19Paper
Secure Message Transmission With Small Public Discussion2017-05-16Paper
Optimal Coding for Streaming Authentication and Interactive Communication2017-04-28Paper
Adaptively secure garbled circuits from one-way functions2016-11-09Paper
Concurrent non-malleable commitments (and more) in 3 rounds2016-11-09Paper
High-precision secure computation of satellite collision probabilities2016-10-21Paper
Proactive Secret Sharing with a Dishonest Majority2016-10-21Paper
Subquadratic approximation algorithms for clustering problems in high dimensional spaces2016-09-29Paper
Secure computation with honest-looking parties: what if nobody is truly honest? (extended abstract)2016-09-29Paper
Lower bounds for high dimensional nearest neighbor search and related problems2016-09-29Paper
Simple and efficient leader election in the full information model2016-09-01Paper
Computational complexity and knowledge complexity (extended abstract)2016-09-01Paper
Unconditionally secure computation with reduced interaction2016-07-15Paper
Private large-scale databases with distributed searchable symmetric encryption2016-04-08Paper
Adaptive security with quasi-optimal rate2016-03-23Paper
Fast distributed almost stable matchings2016-03-23Paper
Communication-optimal proactive secret sharing for dynamic groups2016-03-10Paper
Amortizing randomness in private multiparty computations2016-03-02Paper
Universal service-providers for database private information retrieval (extended abstract)2016-03-02Paper
On the black-box use of somewhat homomorphic encryption in noninteractive two-party protocols2016-02-19Paper
Almost-everywhere secure computation with edge corruptions2016-01-11Paper
Incoercible multi-party computation and universally composable receipt-free voting2015-12-10Paper
Round-optimal black-box two-party computation2015-12-10Paper
Cryptography with One-Way Communication2015-12-10Paper
Impossibility of black-box simulation against leakage attacks2015-12-10Paper
Efficient and secure authenticated key exchange using weak passwords2015-12-07Paper
Polynomial-time approximation schemes for geometric min-sum median clustering2015-10-30Paper
Executable proofs, input-size hiding secure computation and a new ideal world2015-09-30Paper
Broadcast (and round) efficient verifiable secret sharing2015-09-30Paper
Locally decodable codes for edit distance2015-09-24Paper
Weighted sampling without replacement from data streams2015-09-15Paper
Optimal and efficient clock synchronization under drifting clocks2015-09-11Paper
Fast and unconditionally secure anonymous channel2015-09-03Paper
How to withstand mobile virus attacks, revisited2015-09-03Paper
Garbled RAM from one-way functions2015-08-21Paper
Privacy amplification with asymptotically optimal entropy loss2015-08-14Paper
Resettably sound zero-knowledge arguments from OWFs -- the (semi) black-box way2015-07-06Paper
Non-committing encryption from \(\Phi\)-hiding2015-07-06Paper
Black-box non-black-box zero knowledge2015-06-26Paper
How to withstand mobile virus attacks (extended abstract)2015-06-19Paper
Local correctability of expander codes2015-06-09Paper
Efficient Error-Correcting Codes for Sliding Windows2015-01-13Paper
Authenticated adversarial routing2015-01-07Paper
Position-based cryptography2014-11-14Paper
Communication-efficient MPC for general adversary structures2014-10-14Paper
On selective-opening attacks against encryption schemes2014-10-14Paper
How to catch \(L_2\)-heavy-hitters on sliding windows2014-10-06Paper
On linear-size pseudorandom generators and hardcore functions2014-10-06Paper
Cryptography in the multi-string model2014-09-25Paper
Privacy amplification with asymptotically optimal entropy loss2014-08-13Paper
Zero-one frequency laws2014-08-13Paper
Measuring independence of datasets2014-08-13Paper
Maliciously circuit-private FHE2014-08-07Paper
Secure multi-party computation with identifiable abort2014-08-07Paper
Extracting correlations2014-07-25Paper
On Input Indistinguishable Proof Systems2014-07-01Paper
Position-based quantum cryptography: impossibility and constructions2014-06-04Paper
Garbled RAM revisited2014-05-27Paper
Cross-domain secure computation2014-03-25Paper
Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing2014-03-25Paper
Statistical concurrent non-malleable zero knowledge2014-02-18Paper
4-round resettably-sound zero knowledge2014-02-18Paper
Locally updatable and locally decodable codes2014-02-18Paper
The effectiveness of Lloyd-type methods for the \(k\)-means problem2014-02-17Paper
New techniques for noninteractive zero-knowledge2014-02-17Paper
Constant-round concurrent zero knowledge in the bounded player model2013-12-10Paper
Building lossy trapdoor functions from lossy encryption2013-12-10Paper
Approximating Large Frequency Moments with Pick-and-Drop Sampling2013-10-04Paper
Generalizing the layering method of Indyk and Woodruff: recursive sketches for frequency-based vectors on streams2013-10-04Paper
Optimal coding for streaming authentication and interactive communication2013-09-17Paper
Nearly simultaneously resettable black-box zero knowledge2013-08-12Paper
Local correctability of expander codes2013-08-06Paper
Robust pseudorandom generators2013-08-06Paper
How hard is counting triangles in the streaming model?2013-08-06Paper
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles2013-06-27Paper
On linear-size pseudorandom generators and hardcore functions2013-06-11Paper
How to catch \(L _{2}\)-heavy-hitters on sliding windows2013-06-11Paper
How to garble RAM programs?2013-05-31Paper
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions2013-05-31Paper
Cryptography using \texttt{CAPTCHA} puzzles2013-04-19Paper
Revisiting lower and upper bounds for selective decommitments2013-03-18Paper
Distributed Oblivious RAM for Secure Two-Party Computation2013-03-18Paper
Concurrent zero knowledge in the bounded player model2013-03-18Paper
Succinct non-interactive arguments via linear interactive proofs2013-03-18Paper
Multiparty proximity testing with dishonest majority from equality testing2012-11-01Paper
Edge Fault Tolerance on Sparse Networks2012-11-01Paper
Near-optimal radio use for wireless network synchronization2012-10-11Paper
Impossibility results for static input secure computation2012-09-25Paper
Near-linear unconditionally-secure multiparty computation with a dishonest minority2012-09-25Paper
5PM: secure pattern matching2012-09-25Paper
Correlated product security from any one-way function2012-07-20Paper
Extended-DDH and lossy trapdoor functions2012-07-20Paper
On homomorphic encryption and chosen-ciphertext security2012-07-20Paper
Unconditionally-secure robust secret sharing with compact shares2012-06-29Paper
Resettable statistical zero knowledge2012-06-15Paper
Simultaneously resettable arguments of knowledge2012-06-15Paper
Identifying cheaters without an honest majority2012-06-15Paper
Optimal sampling from sliding windows2012-05-11Paper
AMS without 4-wise independence on product domains2012-01-23Paper
Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security2011-12-02Paper
Deterministic and energy-optimal wireless synchronization2011-10-28Paper
Public key locally decodable codes with short keys2011-08-17Paper
Position-based quantum cryptography: impossibility and constructions2011-08-12Paper
Constant-rate oblivious transfer from noisy channels2011-08-12Paper
Secure message transmission by public discussion: a brief survey2011-06-08Paper
Efficient non-interactive secure computation2011-05-27Paper
Visual cryptography on graphs2011-02-18Paper
Effective computations on sliding windows2011-01-17Paper
Public-Key Encryption with Efficient Amortized Updates2010-09-10Paper
Improved fault tolerance and secure computation on sparse networks2010-09-07Paper
Asynchronous throughput-optimal routing in malicious networks2010-09-07Paper
Equivalence of uniform key agreement and composition insecurity2010-08-24Paper
Password-authenticated session-key generation on the internet in the plain model2010-08-24Paper
Low distortion embeddings for edit distance2010-08-16Paper
Batch codes and their applications2010-08-15Paper
Universally composable two-party and multi-party secure computation2010-08-05Paper
Zero-knowledge proofs from secure multiparty computation2010-07-07Paper
Secure message transmission with small public discussion2010-06-01Paper
Efficiency preserving transformations for concurrent non-malleable zero knowledge2010-02-24Paper
On complete primitives for fairness2010-02-24Paper
Near-Optimal Radio Use for Wireless Network Synchronization2010-01-05Paper
Position Based Cryptography2009-10-20Paper
Public Key Encryption That Allows PIR Queries2009-03-10Paper
Cryptography in the Multi-string Model2009-03-10Paper
Authenticated Adversarial Routing2009-03-03Paper
Simulation-Based Concurrent Non-malleable Commitments and Decommitments2009-03-03Paper
Public-Key Locally-Decodable Codes2009-02-10Paper
Circular-Secure Encryption from Decision Diffie-Hellman2009-02-10Paper
Communication Complexity in Algebraic Two-Party Protocols2009-02-10Paper
Cryptography with constant computational overhead2009-01-05Paper
https://portal.mardi4nfdi.de/entity/Q35495932009-01-05Paper
Low distortion embeddings for edit distance2008-12-21Paper
Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model2008-08-19Paper
Visual Cryptography on Graphs2008-07-10Paper
Approximation Algorithms for the Job Interval Selection Problem and Related Scheduling Problems2008-05-27Paper
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions2008-05-15Paper
Almost-Everywhere Secure Computation2008-04-15Paper
Private Searching on Streaming Data2008-03-17Paper
Private searching on streaming data2007-12-06Paper
Private Locally Decodable Codes2007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Perfect Non-interactive Zero Knowledge for NP2007-09-24Paper
Sequential Aggregate Signatures and Multisignatures Without Random Oracles2007-09-24Paper
Non-interactive Zaps and New Techniques for NIZK2007-09-04Paper
A Survey of Single-Database Private Information Retrieval: Techniques and Applications2007-09-04Paper
Security in Communication Networks2006-10-10Paper
https://portal.mardi4nfdi.de/entity/Q33749032006-03-01Paper
https://portal.mardi4nfdi.de/entity/Q33749042006-03-01Paper
Theory of Cryptography2005-12-07Paper
https://portal.mardi4nfdi.de/entity/Q56927002005-09-28Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Minimal complete primitives for secure multi-party computation2005-05-13Paper
Subquadratic approximation algorithms for clustering problems in high dimensional spaces2005-01-19Paper
https://portal.mardi4nfdi.de/entity/Q44713712004-07-28Paper
Stability preserving transformations: Packet routing networks with edge capacities and speeds2004-01-14Paper
Amortizing Randomness in Private Multiparty Computations2004-01-08Paper
https://portal.mardi4nfdi.de/entity/Q44142662003-07-24Paper
https://portal.mardi4nfdi.de/entity/Q47854982003-07-10Paper
https://portal.mardi4nfdi.de/entity/Q47837452002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q31496752002-09-30Paper
Self-Stabilizing Symmetry Breaking in Constant Space2002-09-29Paper
https://portal.mardi4nfdi.de/entity/Q45425542002-09-17Paper
https://portal.mardi4nfdi.de/entity/Q45425312002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q45425842002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q27788422002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27788392002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27541652001-12-09Paper
The Las-Vegas Processor Identity Problem (How and When to Be Unique)2001-07-16Paper
Perfect zero-knowledge arguments for NP using any one-way permutation2001-05-20Paper
Universal service-providers for private information retrieval2001-05-13Paper
https://portal.mardi4nfdi.de/entity/Q45270322001-03-01Paper
https://portal.mardi4nfdi.de/entity/Q45269942001-02-28Paper
Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces2000-10-18Paper
https://portal.mardi4nfdi.de/entity/Q49418752000-08-27Paper
Adaptive packet routing for bursty adversarial traffic2000-08-27Paper
Randomness versus fault-tolerance2000-05-08Paper
Reducibility and Completeness in Private Computations2000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q49347112000-01-31Paper
The linear-array conjecture in communication complexity is false1999-12-08Paper
https://portal.mardi4nfdi.de/entity/Q42285091999-10-04Paper
Characterizing linear size circuits in terms of privacy1999-09-22Paper
https://portal.mardi4nfdi.de/entity/Q43186941999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q43186961999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q42341051999-06-29Paper
https://portal.mardi4nfdi.de/entity/Q42493261999-06-17Paper
Conditional Oblivious Transfer and Timed-Release Encryption1999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42284481999-05-18Paper
Log-Space Polynomial End-to-End Communication1998-09-21Paper
Computational Complexity and Knowledge Complexity1998-09-20Paper
Software protection and simulation on oblivious RAMs1998-01-21Paper
https://portal.mardi4nfdi.de/entity/Q43645441997-11-17Paper
https://portal.mardi4nfdi.de/entity/Q31289321997-04-23Paper
https://portal.mardi4nfdi.de/entity/Q43645661997-01-01Paper
https://portal.mardi4nfdi.de/entity/Q48752311996-10-07Paper
https://portal.mardi4nfdi.de/entity/Q48584571996-05-21Paper
https://portal.mardi4nfdi.de/entity/Q43140421995-01-26Paper
https://portal.mardi4nfdi.de/entity/Q42873621994-04-12Paper
https://portal.mardi4nfdi.de/entity/Q32101441991-01-01Paper

Research outcomes over time

This page was built for person: Rafail Ostrovsky