Benny Applebaum

From MaRDI portal
Person:301520

Available identifiers

zbMath Open applebaum.bennyMaRDI QIDQ301520

List of research outcomes





PublicationDate of PublicationType
Stochastic secret sharing with 1-bit shares and applications to MPC2024-12-13Paper
Conflict checkable and decodable codes and their applications2024-11-28Paper
The round complexity of statistical MPC with optimal resiliency2024-05-08Paper
Succinct computational secret sharing2024-05-08Paper
https://portal.mardi4nfdi.de/entity/Q61262302024-04-09Paper
How to recover a secret with \(O(n)\) additions2024-02-02Paper
Sampling Graphs without Forbidden Subgraphs and Unbalanced Expanders with Negligible Error2023-12-15Paper
Actively secure arithmetic computation and VOLE with constant computational overhead2023-12-08Paper
Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)2023-08-14Paper
Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)2023-07-07Paper
Quadratic multiparty randomized encodings beyond honest majority and their applications2023-07-07Paper
https://portal.mardi4nfdi.de/entity/Q61072532023-07-03Paper
Correction to: ``Locally computable UOWHF with linear shrinkage2023-04-13Paper
On actively-secure elementary MPC reductions2023-03-31Paper
https://portal.mardi4nfdi.de/entity/Q58757782023-02-03Paper
https://portal.mardi4nfdi.de/entity/Q50903742022-07-18Paper
Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)2022-04-22Paper
The resiliency of MPC with low interaction: the benefit of making errors (extended abstract)2022-03-23Paper
On the Power of Amortization in Secret Sharing2022-03-07Paper
Garbled Circuits as Randomized Encodings of Functions: a Primer2022-01-12Paper
Obfuscating circuits via composite-order graded encoding2021-07-02Paper
Placing conditional disclosure of secrets in the communication complexity universe2021-06-28Paper
Perfect Secure Computation in Two Rounds2021-02-08Paper
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations2021-02-08Paper
Better secret sharing via robust conditional disclosure of secrets2021-01-19Paper
The communication complexity of private simultaneous messages, revisited2020-06-15Paper
Degree 2 is complete for the round-complexity of malicious MPC2020-02-06Paper
Secret-sharing schemes for general and uniform access structures2020-02-04Paper
On the relationship between statistical zero-knowledge and statistical randomized encodings2019-12-19Paper
Perfect secure computation in two rounds2018-12-11Paper
On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate2018-12-11Paper
The communication complexity of private simultaneous messages, revisited2018-07-09Paper
https://portal.mardi4nfdi.de/entity/Q45681102018-06-15Paper
Arithmetic Cryptography2018-05-17Paper
https://portal.mardi4nfdi.de/entity/Q46380562018-05-03Paper
Minimizing locality of one-way functions via semi-private randomized encodings2018-04-26Paper
From private simultaneous messages to zero-information Arthur-Merlin protocols and back2018-02-15Paper
https://portal.mardi4nfdi.de/entity/Q46018482018-01-24Paper
Algebraic Attacks against Random Local Functions and Their Countermeasures2018-01-12Paper
Clique Here: On the Distributed Complexity in Fully-Connected Networks2017-12-15Paper
Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations2017-11-03Paper
Locally computable UOWHF with linear shrinkage2017-10-12Paper
Algebraic attacks against random local functions and their countermeasures2017-09-29Paper
Arithmetic Cryptography2017-05-19Paper
Deterministic Rateless Codes for BSC2017-05-19Paper
Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys2017-01-13Paper
Fast Pseudorandom Functions Based on Expander Graphs2016-12-21Paper
On the Relationship Between Statistical Zero-Knowledge and Statistical Randomized Encodings2016-11-09Paper
Cryptographic hardness of random local functions. Survey2016-10-28Paper
Garbling XOR gates ``for free in the standard model2016-09-21Paper
A dichotomy for local small-bias generators2016-09-21Paper
Incompressible functions, relative-error extractors, and the power of nondeterministic reductions2016-06-30Paper
From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back2016-04-08Paper
Obfuscating Circuits via Composite-Order Graded Encoding2015-07-06Paper
Bootstrapping Obfuscators via Fast Pseudorandom Functions2015-01-06Paper
Key-dependent message security: generic amplification and completeness2014-09-25Paper
Public-key cryptography from different assumptions2014-08-13Paper
How to Garble Arithmetic Circuits2014-07-30Paper
How to Garble Arithmetic Circuits2014-07-30Paper
Pseudorandom generators with long stretch and low locality from random local one-way functions2014-05-13Paper
Pseudorandom Generators with Long Stretch and Low Locality from Random Local One-Way Functions2014-02-04Paper
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys2013-09-17Paper
Locally Computable UOWHF with Linear Shrinkage2013-05-31Paper
Cryptographic Hardness of Random Local Functions–Survey2013-03-18Paper
Garbling XOR Gates “For Free” in the Standard Model2013-03-18Paper
A Dichotomy for Local Small-Bias Generators2012-06-15Paper
Key-Dependent Message Security: Generic Amplification and Completeness2011-05-27Paper
Randomly Encoding Functions: A New Cryptographic Paradigm2011-05-19Paper
Cryptography in constant parallel time2011-02-14Paper
From Secrecy to Soundness: Efficient Verification via Secure Computation2010-09-07Paper
Cryptography with constant input locality2009-11-13Paper
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems2009-10-20Paper
Cryptography with Constant Input Locality2009-03-10Paper
On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\)2008-08-20Paper
Computationally private randomizing polynomials and their applications2007-11-05Paper
Cryptography in $NC^0$2007-09-07Paper
On Pseudorandom Generators with Linear Stretch in NC02007-08-28Paper

Research outcomes over time

This page was built for person: Benny Applebaum