Rafail Ostrovsky

From MaRDI portal
Person:166365

Available identifiers

zbMath Open ostrovsky.rafailWikidataQ4339024 ScholiaQ4339024MaRDI QIDQ166365

List of research outcomes

PublicationDate of PublicationType
Tri-state circuits. A circuit model that captures RAM2024-02-06Paper
Succinct arguments for RAM programs via projection codes2024-02-02Paper
List oblivious transfer and applications to round-optimal black-box multiparty coin tossing2024-02-02Paper
https://portal.mardi4nfdi.de/entity/Q60908882023-11-20Paper
Prio+: privacy preserving aggregate statistics via Boolean shares2023-07-25Paper
Streaming and unbalanced PSI from function secret sharing2023-07-25Paper
Authenticated garbling from simple correlations2023-07-07Paper
https://portal.mardi4nfdi.de/entity/Q61072542023-07-03Paper
How to build a trapdoor function from an encryption scheme2023-05-12Paper
Oblivious transfer from trapdoor permutations in minimal rounds2023-04-13Paper
Communication-efficient (proactive) secure computation for dynamic general adversary structures and dynamic groups2022-12-16Paper
Efficient 3-party distributed ORAM2022-12-16Paper
On succinct arguments and witness encryption from groups2022-11-09Paper
\textsc{EpiGRAM}: practical garbled RAM2022-08-30Paper
Garbled circuits with sublinear evaluator2022-08-30Paper
Adaptively secure computation for RAM programs2022-08-30Paper
Secure commitment against a powerful adversary2022-08-18Paper
CNF-FSS and Its Applications2022-07-08Paper
Succinct non-interactive arguments via linear interactive proofs2022-05-10Paper
ATLAS: efficient and scalable MPC in the honest majority setting2022-04-22Paper
A refined approximation for Euclidean \(k\)-means2022-04-07Paper
Round optimal secure multiparty computation from minimal assumptions2022-03-23Paper
Threshold garbled circuits and ad hoc secure computation2021-12-08Paper
Efficient range-trapdoor functions and applications: rate-1 OT and more2021-12-01Paper
https://portal.mardi4nfdi.de/entity/Q50027752021-07-28Paper
Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND2021-03-30Paper
Adaptive garbled RAM from laconic oblivious transfer2020-06-30Paper
Continuously non-malleable codes in the split-state model from minimal assumptions2020-06-30Paper
Oblivious sampling with applications to two-party \(k\)-means clustering2020-06-15Paper
UC-secure multiparty computation from one-way functions using stateless tokens2020-05-05Paper
Lower and upper bounds on the randomness complexity of private computations of AND2020-04-30Paper
Efficient Error-Correcting Codes for Sliding Windows2020-03-26Paper
Trapdoor hash functions and their applications2020-03-09Paper
Universally composable secure computation with corrupted tokens2020-03-09Paper
Reusable non-interactive secure computation2020-03-09Paper
Cryptographic sensing2020-03-09Paper
Private anonymous data access2020-02-06Paper
A stable marriage requires communication2019-12-12Paper
Population Stability2019-09-19Paper
https://portal.mardi4nfdi.de/entity/Q57433852019-05-10Paper
Non-interactive secure computation from one-way functions2019-01-23Paper
Round optimal black-box ``commit-and-prove2018-12-11Paper
Information-theoretic broadcast with dishonest majority for long messages2018-12-11Paper
Improved algorithms for optimal embeddings2018-11-05Paper
Proactive secure multiparty computation with a dishonest majority2018-10-17Paper
Matrix Balancing in Lp Norms: Bounding the Convergence Rate of Osborne's Iteration2018-07-16Paper
Coding for Interactive Communication Correcting Insertions and Deletions2018-06-27Paper
On the message complexity of secure multiparty computation2018-05-16Paper
Space-time tradeoffs for distributed verification2018-04-12Paper
Efficient robust secret sharing from expander graphs2018-01-29Paper
Round-optimal secure two-party computation from trapdoor permutations2018-01-19Paper
Delayed-input non-malleable zero knowledge and multi-party coin tossing in four rounds2018-01-19Paper
Resettably-sound resettable zero knowledge in constant rounds2018-01-19Paper
https://portal.mardi4nfdi.de/entity/Q45981682017-12-19Paper
https://portal.mardi4nfdi.de/entity/Q45982002017-12-19Paper
Black-box parallel garbled RAM2017-11-15Paper
Four-round concurrent non-malleable commitments from one-way functions2017-11-15Paper
https://portal.mardi4nfdi.de/entity/Q45913702017-11-14Paper
The price of low communication in secure multi-party computation2017-11-03Paper
Brief Announcement2017-10-11Paper
A Stable Marriage Requires Communication2017-10-05Paper
Memory-efficient and self-stabilizing network RESET (extended abstract)2017-09-29Paper
Faster computation on directed networks of automata2017-09-29Paper
Randomness vs. fault-tolerance2017-09-29Paper
Brief Announcement2017-09-29Paper
https://portal.mardi4nfdi.de/entity/Q53650192017-09-29Paper
Space-time tradeoffs for distributed verification2017-09-29Paper
https://portal.mardi4nfdi.de/entity/Q53519232017-08-31Paper
https://portal.mardi4nfdi.de/entity/Q53519342017-08-31Paper
Error-Correcting Codes for Automatic Control2017-08-08Paper
Circuit-Private Multi-key FHE2017-06-13Paper
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs2017-06-13Paper
The Hidden Graph Model2017-05-19Paper
Secure Message Transmission With Small Public Discussion2017-05-16Paper
Optimal Coding for Streaming Authentication and Interactive Communication2017-04-28Paper
Adaptively Secure Garbled Circuits from One-Way Functions2016-11-09Paper
Concurrent Non-Malleable Commitments (and More) in 3 Rounds2016-11-09Paper
High-Precision Secure Computation of Satellite Collision Probabilities2016-10-21Paper
Proactive Secret Sharing with a Dishonest Majority2016-10-21Paper
Subquadratic approximation algorithms for clustering problems in high dimensional spaces2016-09-29Paper
Secure computation with honest-looking parties (extended abstract)2016-09-29Paper
Lower bounds for high dimensional nearest neighbor search and related problems2016-09-29Paper
Simple and efficient leader election in the full information model2016-09-01Paper
Computational complexity and knowledge complexity (extended abstract)2016-09-01Paper
Unconditionally Secure Computation with Reduced Interaction2016-07-15Paper
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption2016-04-08Paper
Adaptive Security with Quasi-Optimal Rate2016-03-23Paper
Fast Distributed Almost Stable Matchings2016-03-23Paper
Communication-Optimal Proactive Secret Sharing for Dynamic Groups2016-03-10Paper
Amortizing randomness in private multiparty computations2016-03-02Paper
Universal service-providers for database private information retrieval (extended abstract)2016-03-02Paper
On the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party Protocols2016-02-19Paper
Almost-everywhere secure computation with edge corruptions2016-01-11Paper
Impossibility of Black-Box Simulation Against Leakage Attacks2015-12-10Paper
Cryptography with One-Way Communication2015-12-10Paper
Round-Optimal Black-Box Two-Party Computation2015-12-10Paper
Incoercible Multi-party Computation and Universally Composable Receipt-Free Voting2015-12-10Paper
Efficient and secure authenticated key exchange using weak passwords2015-12-07Paper
Polynomial-time approximation schemes for geometric min-sum median clustering2015-10-30Paper
Broadcast (and Round) Efficient Verifiable Secret Sharing2015-09-30Paper
Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World2015-09-30Paper
Locally Decodable Codes for Edit Distance2015-09-24Paper
Weighted sampling without replacement from data streams2015-09-15Paper
Optimal and efficient clock synchronization under drifting clocks2015-09-11Paper
Fast and unconditionally secure anonymous channel2015-09-03Paper
How to withstand mobile virus attacks, revisited2015-09-03Paper
Garbled RAM From One-Way Functions2015-08-21Paper
Privacy amplification with asymptotically optimal entropy loss2015-08-14Paper
Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way2015-07-06Paper
Non-committing Encryption from Φ-hiding2015-07-06Paper
Black-box non-black-box zero knowledge2015-06-26Paper
How to withstand mobile virus attacks (extended abstract)2015-06-19Paper
Local correctability of expander codes2015-06-09Paper
Efficient Error-Correcting Codes for Sliding Windows2015-01-13Paper
Authenticated adversarial routing2015-01-07Paper
Position-Based Cryptography2014-11-14Paper
Communication-Efficient MPC for General Adversary Structures2014-10-14Paper
On Selective-Opening Attacks against Encryption Schemes2014-10-14Paper
On linear-size pseudorandom generators and hardcore functions2014-10-06Paper
How to catch \(L_2\)-heavy-hitters on sliding windows2014-10-06Paper
Cryptography in the multi-string model2014-09-25Paper
Measuring independence of datasets2014-08-13Paper
Zero-one frequency laws2014-08-13Paper
Privacy amplification with asymptotically optimal entropy loss2014-08-13Paper
Maliciously Circuit-Private FHE2014-08-07Paper
Secure Multi-Party Computation with Identifiable Abort2014-08-07Paper
Extracting Correlations2014-07-25Paper
On Input Indistinguishable Proof Systems2014-07-01Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2014-06-04Paper
Garbled RAM Revisited2014-05-27Paper
Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing2014-03-25Paper
Cross-Domain Secure Computation2014-03-25Paper
Statistical Concurrent Non-malleable Zero Knowledge2014-02-18Paper
4-Round Resettably-Sound Zero Knowledge2014-02-18Paper
Locally Updatable and Locally Decodable Codes2014-02-18Paper
New Techniques for Noninteractive Zero-Knowledge2014-02-17Paper
The effectiveness of lloyd-type methods for the k-means problem2014-02-17Paper
Building Lossy Trapdoor Functions from Lossy Encryption2013-12-10Paper
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model2013-12-10Paper
Approximating Large Frequency Moments with Pick-and-Drop Sampling2013-10-04Paper
Generalizing the Layering Method of Indyk and Woodruff: Recursive Sketches for Frequency-Based Vectors on Streams2013-10-04Paper
Optimal Coding for Streaming Authentication and Interactive Communication2013-09-17Paper
Nearly Simultaneously Resettable Black-Box Zero Knowledge2013-08-12Paper
How Hard Is Counting Triangles in the Streaming Model?2013-08-06Paper
Local Correctability of Expander Codes2013-08-06Paper
Robust Pseudorandom Generators2013-08-06Paper
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles2013-06-27Paper
On Linear-Size Pseudorandom Generators and Hardcore Functions2013-06-11Paper
How to Catch L 2-Heavy-Hitters on Sliding Windows2013-06-11Paper
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions2013-05-31Paper
How to Garble RAM Programs?2013-05-31Paper
Cryptography Using Captcha Puzzles2013-04-19Paper
Concurrent Zero Knowledge in the Bounded Player Model2013-03-18Paper
Succinct Non-interactive Arguments via Linear Interactive Proofs2013-03-18Paper
Distributed Oblivious RAM for Secure Two-Party Computation2013-03-18Paper
Revisiting Lower and Upper Bounds for Selective Decommitments2013-03-18Paper
Edge Fault Tolerance on Sparse Networks2012-11-01Paper
Multiparty Proximity Testing with Dishonest Majority from Equality Testing2012-11-01Paper
Near-optimal radio use for wireless network synchronization2012-10-11Paper
5PM: Secure Pattern Matching2012-09-25Paper
Impossibility Results for Static Input Secure Computation2012-09-25Paper
Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority2012-09-25Paper
On Homomorphic Encryption and Chosen-Ciphertext Security2012-07-20Paper
Correlated Product Security from Any One-Way Function2012-07-20Paper
Extended-DDH and Lossy Trapdoor Functions2012-07-20Paper
Unconditionally-Secure Robust Secret Sharing with Compact Shares2012-06-29Paper
Identifying Cheaters without an Honest Majority2012-06-15Paper
Resettable Statistical Zero Knowledge2012-06-15Paper
Simultaneously Resettable Arguments of Knowledge2012-06-15Paper
Optimal sampling from sliding windows2012-05-11Paper
https://portal.mardi4nfdi.de/entity/Q31137422012-01-23Paper
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security2011-12-02Paper
Deterministic and Energy-Optimal Wireless Synchronization2011-10-28Paper
Public Key Locally Decodable Codes with Short Keys2011-08-17Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2011-08-12Paper
Constant-Rate Oblivious Transfer from Noisy Channels2011-08-12Paper
Secure Message Transmission by Public Discussion: A Brief Survey2011-06-08Paper
Efficient Non-interactive Secure Computation2011-05-27Paper
Visual cryptography on graphs2011-02-18Paper
Effective Computations on Sliding Windows2011-01-17Paper
Public-Key Encryption with Efficient Amortized Updates2010-09-10Paper
Asynchronous Throughput-Optimal Routing in Malicious Networks2010-09-07Paper
Improved Fault Tolerance and Secure Computation on Sparse Networks2010-09-07Paper
Password-Authenticated Session-Key Generation on the Internet in the Plain Model2010-08-24Paper
Equivalence of Uniform Key Agreement and Composition Insecurity2010-08-24Paper
Low distortion embeddings for edit distance2010-08-16Paper
Batch codes and their applications2010-08-15Paper
Universally composable two-party and multi-party secure computation2010-08-05Paper
Zero-Knowledge Proofs from Secure Multiparty Computation2010-07-07Paper
Secure Message Transmission with Small Public Discussion2010-06-01Paper
On Complete Primitives for Fairness2010-02-24Paper
Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge2010-02-24Paper
Near-Optimal Radio Use for Wireless Network Synchronization2010-01-05Paper
Position Based Cryptography2009-10-20Paper
Public Key Encryption That Allows PIR Queries2009-03-10Paper
Cryptography in the Multi-string Model2009-03-10Paper
Simulation-Based Concurrent Non-malleable Commitments and Decommitments2009-03-03Paper
Authenticated Adversarial Routing2009-03-03Paper
Circular-Secure Encryption from Decision Diffie-Hellman2009-02-10Paper
Public-Key Locally-Decodable Codes2009-02-10Paper
Communication Complexity in Algebraic Two-Party Protocols2009-02-10Paper
https://portal.mardi4nfdi.de/entity/Q35495932009-01-05Paper
https://portal.mardi4nfdi.de/entity/Q35497282009-01-05Paper
Low distortion embeddings for edit distance2008-12-21Paper
Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model2008-08-19Paper
Visual Cryptography on Graphs2008-07-10Paper
Approximation Algorithms for the Job Interval Selection Problem and Related Scheduling Problems2008-05-27Paper
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions2008-05-15Paper
Almost-Everywhere Secure Computation2008-04-15Paper
Private Searching on Streaming Data2008-03-17Paper
Private searching on streaming data2007-12-06Paper
Private Locally Decodable Codes2007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Perfect Non-interactive Zero Knowledge for NP2007-09-24Paper
Sequential Aggregate Signatures and Multisignatures Without Random Oracles2007-09-24Paper
A Survey of Single-Database Private Information Retrieval: Techniques and Applications2007-09-04Paper
Non-interactive Zaps and New Techniques for NIZK2007-09-04Paper
Security in Communication Networks2006-10-10Paper
https://portal.mardi4nfdi.de/entity/Q33749032006-03-01Paper
https://portal.mardi4nfdi.de/entity/Q33749042006-03-01Paper
Theory of Cryptography2005-12-07Paper
https://portal.mardi4nfdi.de/entity/Q56927002005-09-28Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Minimal complete primitives for secure multi-party computation2005-05-13Paper
Subquadratic approximation algorithms for clustering problems in high dimensional spaces2005-01-19Paper
https://portal.mardi4nfdi.de/entity/Q44713712004-07-28Paper
https://portal.mardi4nfdi.de/entity/Q27683542004-01-14Paper
Amortizing Randomness in Private Multiparty Computations2004-01-08Paper
https://portal.mardi4nfdi.de/entity/Q44142662003-07-24Paper
https://portal.mardi4nfdi.de/entity/Q47854982003-07-10Paper
https://portal.mardi4nfdi.de/entity/Q47837452002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q31496752002-09-30Paper
Self-Stabilizing Symmetry Breaking in Constant Space2002-09-29Paper
https://portal.mardi4nfdi.de/entity/Q45425542002-09-17Paper
https://portal.mardi4nfdi.de/entity/Q45425312002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q45425842002-08-01Paper
https://portal.mardi4nfdi.de/entity/Q27788422002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q27541652001-12-09Paper
The Las-Vegas Processor Identity Problem (How and When to Be Unique)2001-07-16Paper
Perfect zero-knowledge arguments for NP using any one-way permutation2001-05-20Paper
Universal service-providers for private information retrieval2001-05-13Paper
https://portal.mardi4nfdi.de/entity/Q45270322001-03-01Paper
https://portal.mardi4nfdi.de/entity/Q45269942001-02-28Paper
Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces2000-10-18Paper
https://portal.mardi4nfdi.de/entity/Q49418752000-08-27Paper
Adaptive packet routing for bursty adversarial traffic2000-08-27Paper
Randomness versus fault-tolerance2000-05-08Paper
Reducibility and Completeness in Private Computations2000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q49347112000-01-31Paper
The linear-array conjecture in communication complexity is false1999-12-08Paper
https://portal.mardi4nfdi.de/entity/Q42285091999-10-04Paper
Characterizing linear size circuits in terms of privacy1999-09-22Paper
https://portal.mardi4nfdi.de/entity/Q43186941999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q43186961999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q42341051999-06-29Paper
https://portal.mardi4nfdi.de/entity/Q42493261999-06-17Paper
Conditional Oblivious Transfer and Timed-Release Encryption1999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42284481999-05-18Paper
Log-Space Polynomial End-to-End Communication1998-09-21Paper
Computational Complexity and Knowledge Complexity1998-09-20Paper
Software protection and simulation on oblivious RAMs1998-01-21Paper
https://portal.mardi4nfdi.de/entity/Q43645441997-11-17Paper
https://portal.mardi4nfdi.de/entity/Q31289321997-04-23Paper
https://portal.mardi4nfdi.de/entity/Q43645661997-01-01Paper
https://portal.mardi4nfdi.de/entity/Q48752311996-10-07Paper
https://portal.mardi4nfdi.de/entity/Q48584571996-05-21Paper
https://portal.mardi4nfdi.de/entity/Q43140421995-01-26Paper
https://portal.mardi4nfdi.de/entity/Q42873621994-04-12Paper
https://portal.mardi4nfdi.de/entity/Q32101441991-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Rafail Ostrovsky