Carmit Hazay

From MaRDI portal
Person:244215

Available identifiers

zbMath Open hazay.carmitMaRDI QIDQ244215

List of research outcomes

PublicationDate of PublicationType
Best of both worlds. Revisiting the spymasters double agent problem2024-02-02Paper
Private polynomial commitments and applications to MPC2023-11-16Paper
Ligero: lightweight sublinear arguments without a trusted setup2023-11-07Paper
Putting the online phase on a diet: covert security from short MACs2023-10-04Paper
SCALES. MPC with small clients and larger ephemeral servers2023-08-14Paper
On black-box constructions of time and space efficient sublinear arguments from symmetric-key primitives2023-08-14Paper
Financially backed covert security2023-08-10Paper
Actively secure garbled circuits with constant communication overhead in the plain model2023-07-26Paper
https://portal.mardi4nfdi.de/entity/Q61072552023-07-03Paper
Multi-clients verifiable computation via conditional disclosure of secrets2022-12-16Paper
Gradual GRAM and secure computation for RAM programs2022-12-16Paper
Asymptotically quasi-optimal cryptography2022-08-30Paper
ZK-PCPs from leakage-resilient secret sharing2022-08-01Paper
TinyKeys: a new approach to efficient multi-party computation2022-04-11Paper
The price of active security in cryptographic protocols2022-03-23Paper
Generic compiler for publicly verifiable covert multi-party computation2021-12-08Paper
Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions?2021-12-01Paper
Going beyond dual execution: MPC for functions with efficient verification2021-12-01Paper
Round-optimal secure multi-party computation2021-07-30Paper
Low cost constant round MPC combining BMR and oblivious transfer2020-11-06Paper
TinyKeys: a new approach to efficient multi-party computation2020-06-30Paper
On the power of secure two-party computation2020-03-03Paper
Constant-round maliciously secure two-party computation in the RAM model2019-11-27Paper
What security can we achieve within 4 rounds?2019-11-27Paper
On black-box complexity of universally composable security in the CRS model2019-08-13Paper
Efficient RSA key generation and threshold Paillier in the two-party setting2019-06-20Paper
Concretely efficient large-scale MPC with active security (or tinykeys for tinyot)2019-01-23Paper
Round-optimal fully black-box zero-knowledge arguments from one-way permutations2018-12-11Paper
Two-Dimensional Parameterized Matching2018-10-30Paper
Round-optimal secure multi-party computation2018-09-26Paper
Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs2018-05-28Paper
Low cost constant round MPC combining BMR and oblivious transfer2018-04-06Paper
Actively secure garbled circuits with constant communication overhead in the plain model2018-01-19Paper
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model2017-06-13Paper
Scalable Multi-party Private Set-Intersection2017-06-13Paper
On Compression of Data Encrypted With Block Ciphers2017-06-08Paper
Efficient one-sided adaptively secure computation2017-03-02Paper
Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity2016-12-21Paper
Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions2016-12-21Paper
Constant-Round Maliciously Secure Two-Party Computation in the RAM Model2016-12-21Paper
On the Power of Secure Two-Party Computation2016-10-27Paper
The Feasibility of Outsourced Database Search in the Plain Model2016-10-21Paper
What Security Can We Achieve Within 4 Rounds?2016-10-21Paper
Toward a game theoretic view of secure computation2016-10-13Paper
Leakage-resilient cryptography from minimal assumptions2016-09-21Paper
Selective Opening Security for Receivers2016-06-10Paper
Automata evaluation and text search protocols with simulation-based security2016-06-01Paper
Signature schemes secure against hard-to-invert leakage2016-06-01Paper
Efficient set intersection with simulation-based security2016-04-07Paper
On Black-Box Complexity of Universally Composable Security in the CRS Model2016-03-23Paper
Adaptively Secure Computation with Partial Erasures2016-03-23Paper
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs2015-07-06Paper
Distributed public key schemes secure against continual leakage2014-12-05Paper
Computationally secure pattern matching in the presence of malicious adversaries2014-09-25Paper
One-Sided Adaptively Secure Two-Party Computation2014-02-18Paper
Complete Fairness in Secure Two-Party Computation2014-02-17Paper
Outsourced Pattern Matching2013-08-07Paper
Leakage-Resilient Cryptography from Minimal Assumptions2013-05-31Paper
Signature Schemes Secure against Hard-to-Invert Leakage2013-03-19Paper
Efficient set operations in the presence of malicious adversaries2012-07-10Paper
Secure Two-Party Computation with Low Communication2012-06-15Paper
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting2012-06-08Paper
Towards a Game Theoretic View of Secure Computation2011-05-27Paper
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries2010-12-07Paper
Efficient protocols for set intersection and pattern matching with security against malicious and covert adversaries2010-09-21Paper
Approximate parameterized matching2010-08-14Paper
Efficient secure two-party protocols. Techniques and constructions2010-08-03Paper
Efficient Set Operations in the Presence of Malicious Adversaries2010-05-28Paper
Text Search Protocols with Simulation Based Security2010-05-28Paper
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries2008-03-05Paper
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions2007-08-30Paper
Combinatorial Pattern Matching2005-12-14Paper
Algorithms – ESA 20042005-08-18Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Carmit Hazay