Benny Applebaum

From MaRDI portal
Person:301520

Available identifiers

zbMath Open applebaum.bennyMaRDI QIDQ301520

List of research outcomes





PublicationDate of PublicationType
Stochastic secret sharing with 1-bit shares and applications to MPC2024-12-13Paper
Conflict checkable and decodable codes and their applications2024-11-28Paper
The round complexity of statistical MPC with optimal resiliency2024-05-08Paper
Succinct computational secret sharing2024-05-08Paper
https://portal.mardi4nfdi.de/entity/Q61262302024-04-09Paper
How to recover a secret with \(O(n)\) additions2024-02-02Paper
Sampling Graphs without Forbidden Subgraphs and Unbalanced Expanders with Negligible Error2023-12-15Paper
Actively secure arithmetic computation and VOLE with constant computational overhead2023-12-08Paper
Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)2023-08-14Paper
Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)2023-07-07Paper
Quadratic multiparty randomized encodings beyond honest majority and their applications2023-07-07Paper
https://portal.mardi4nfdi.de/entity/Q61072532023-07-03Paper
Correction to: ``Locally computable UOWHF with linear shrinkage2023-04-13Paper
On actively-secure elementary MPC reductions2023-03-31Paper
https://portal.mardi4nfdi.de/entity/Q58757782023-02-03Paper
https://portal.mardi4nfdi.de/entity/Q50903742022-07-18Paper
Upslices, downslices, and secret-sharing with complexity of \(1.5^n\)2022-04-22Paper
The resiliency of MPC with low interaction: the benefit of making errors (extended abstract)2022-03-23Paper
On the Power of Amortization in Secret Sharing2022-03-07Paper
Garbled circuits as randomized encodings of functions: a primer2022-01-12Paper
Obfuscating circuits via composite-order graded encoding2021-07-02Paper
Placing conditional disclosure of secrets in the communication complexity universe2021-06-28Paper
Perfect secure computation in two rounds2021-02-08Paper
Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations2021-02-08Paper
Better secret sharing via robust conditional disclosure of secrets2021-01-19Paper
The communication complexity of private simultaneous messages, revisited2020-06-15Paper
Degree 2 is complete for the round-complexity of malicious MPC2020-02-06Paper
Secret-sharing schemes for general and uniform access structures2020-02-04Paper
On the relationship between statistical zero-knowledge and statistical randomized encodings2019-12-19Paper
Perfect secure computation in two rounds2018-12-11Paper
On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate2018-12-11Paper
The communication complexity of private simultaneous messages, revisited2018-07-09Paper
Explicit rateless codes for memoryless binary-input output-symmetric channels2018-06-15Paper
Arithmetic cryptography2018-05-17Paper
Low-complexity cryptographic hash functions2018-05-03Paper
Minimizing locality of one-way functions via semi-private randomized encodings2018-04-26Paper
From private simultaneous messages to zero-information Arthur-Merlin protocols and back2018-02-15Paper
Incompressible functions, relative-error extractors, and the power of nondeterministic reductions (extended abstract)2018-01-24Paper
Algebraic attacks against random local functions and their countermeasures2018-01-12Paper
Clique here: on the distributed complexity in fully-connected networks2017-12-15Paper
Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations2017-11-03Paper
Locally computable UOWHF with linear shrinkage2017-10-12Paper
Algebraic attacks against random local functions and their countermeasures2017-09-29Paper
Arithmetic cryptography (extended abstract)2017-05-19Paper
Deterministic rateless codes for BSC2017-05-19Paper
Encoding functions with constant online rate, or how to compress garbled circuit keys2017-01-13Paper
Fast pseudorandom functions based on expander graphs2016-12-21Paper
On the relationship between statistical zero-knowledge and statistical randomized encodings2016-11-09Paper
Cryptographic hardness of random local functions. Survey2016-10-28Paper
Garbling XOR gates ``for free in the standard model2016-09-21Paper
A dichotomy for local small-bias generators2016-09-21Paper
Incompressible functions, relative-error extractors, and the power of nondeterministic reductions2016-06-30Paper
From private simultaneous messages to zero-information Arthur-Merlin protocols and back2016-04-08Paper
Obfuscating circuits via composite-order graded encoding2015-07-06Paper
Bootstrapping Obfuscators via Fast Pseudorandom Functions2015-01-06Paper
Key-dependent message security: generic amplification and completeness2014-09-25Paper
Public-key cryptography from different assumptions2014-08-13Paper
How to Garble Arithmetic Circuits2014-07-30Paper
How to garble arithmetic circuits2014-07-30Paper
Pseudorandom generators with long stretch and low locality from random local one-way functions2014-05-13Paper
Pseudorandom generators with long stretch and low locality from random local one-way functions2014-02-04Paper
Encoding functions with constant online rate or how to compress garbled circuits keys2013-09-17Paper
Locally computable UOWHF with linear shrinkage2013-05-31Paper
Cryptographic hardness of random local functions -- survey2013-03-18Paper
Garbling XOR gates ``for free in the standard model2013-03-18Paper
A dichotomy for local small-bias generators2012-06-15Paper
Key-dependent message security: generic amplification and completeness2011-05-27Paper
Randomly encoding functions: a new cryptographic paradigm. (Invited talk)2011-05-19Paper
Cryptography in constant parallel time2011-02-14Paper
From secrecy to soundness: efficient verification via secure computation (extended abstract)2010-09-07Paper
Cryptography with constant input locality2009-11-13Paper
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems2009-10-20Paper
Cryptography with Constant Input Locality2009-03-10Paper
On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\)2008-08-20Paper
Computationally private randomizing polynomials and their applications2007-11-05Paper
Cryptography in $NC^0$2007-09-07Paper
On Pseudorandom Generators with Linear Stretch in NC02007-08-28Paper

Research outcomes over time

This page was built for person: Benny Applebaum