Yuval Ishai

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Designated-verifier SNARGs with one group element2026-02-06Paper
A unified framework for succinct garbling from homomorphic secret sharing2026-02-04Paper
Fully anonymous secret sharing2026-02-04Paper
Information-theoretic single-server PIR in the shuffle model2026-02-03Paper
Peeking into the future: MPC resilient to super-rushing adversaries2025-12-02Paper
Zero-knowledge RAM: doubly efficient and black-box2025-12-02Paper
Query-reusable proof systems2025-12-02Paper
Correlated pseudorandom functions from variable-density LPN2025-08-12Paper
Proximity gaps for Reed-Solomon codes2025-08-12Paper
Bounded-communication leakage resilience via parity-resilient circuits2025-08-06Paper
Bounded simultaneous messages2025-07-28Paper
Proximity gaps for Reed-Solomon codes
Journal of the ACM
2025-02-05Paper
Compressing unit-vector correlations via sparse pseudorandom generators2024-12-13Paper
PIR with client-side preprocessing: information-theoretic constructions and lower bounds2024-12-13Paper
Leakage-tolerant circuits2024-11-13Paper
Constant-round simulation-secure coin tossing extension with guaranteed output2024-11-13Paper
On low-end obfuscation and learning2024-09-25Paper
Combinatorially homomorphic encryption2024-08-02Paper
Cryptography from planted graphs: security with logarithmic-size messages2024-08-01Paper
Limits of preprocessing
Computational Complexity
2024-08-01Paper
Refuting the dream XOR lemma via ideal obfuscation and resettable MPC2024-06-25Paper
Information-theoretic distributed point functions2024-06-25Paper
Hard languages in NP \(\cap\) coNP and NIZK proofs from unstructured hardness2024-05-08Paper
Succinct computational secret sharing2024-05-08Paper
scientific article; zbMATH DE number 7829258 (Why is no real title available?)2024-04-09Paper
scientific article; zbMATH DE number 7829259 (Why is no real title available?)
(available as arXiv preprint)
2024-04-09Paper
scientific article; zbMATH DE number 7829303 (Why is no real title available?)
(available as arXiv preprint)
2024-04-09Paper
Computational wiretap coding from indistinguishability obfuscation
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Succinct arguments for RAM programs via projection codes
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Arithmetic sketching
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Additive randomized encodings and their applications
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Perfect MPC over layered graphs
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Round-optimal black-box MPC in the plain model
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
One-message secure reductions: on the cost of converting correlations
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Oblivious transfer with constant computational overhead
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Black-box reusable NISC with random oracles
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation
Journal of Cryptology
2023-11-21Paper
Ligero: lightweight sublinear arguments without a trusted setup
Designs, Codes and Cryptography
2023-11-07Paper
Round-optimal black-box secure computation from two-round malicious OT
Theory of Cryptography
2023-08-14Paper
Fully-secure MPC with minimal trust
Theory of Cryptography
2023-08-14Paper
Actively secure garbled circuits with constant communication overhead in the plain model
Journal of Cryptology
2023-07-26Paper
Streaming and unbalanced PSI from function secret sharing
Lecture Notes in Computer Science
2023-07-25Paper
Tight bounds on the randomness complexity of secure multiparty computation
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Authenticated garbling from simple correlations
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Programmable distributed point functions
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Quadratic multiparty randomized encodings beyond honest majority and their applications
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
scientific article; zbMATH DE number 7706037 (Why is no real title available?)2023-07-03Paper
Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Correlated pseudorandomness from expand-accumulate codes
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation2023-04-13Paper
Efficient fully secure computation via distributed zero-knowledge proofs2023-03-29Paper
Cryptography from one-way communication: on completeness of finite channels2023-03-29Paper
scientific article; zbMATH DE number 7650430 (Why is no real title available?)2023-02-03Paper
scientific article; zbMATH DE number 7650419 (Why is no real title available?)2023-02-03Paper
scientific article; zbMATH DE number 7650434 (Why is no real title available?)2023-02-03Paper
Efficient pseudorandom correlation generators from ring-LPN2022-11-09Paper
On succinct arguments and witness encryption from groups2022-11-09Paper
Round-optimal black-box protocol compilers2022-08-30Paper
Secure multiparty computation with sublinear preprocessing2022-08-30Paper
Asymptotically quasi-optimal cryptography2022-08-30Paper
Private circuits with quasilinear randomness2022-08-30Paper
scientific article; zbMATH DE number 7561745 (Why is no real title available?)2022-07-21Paper
Low-complexity weak pseudorandom functions in \(\mathtt{AC}0[\mathtt{MOD}2]\)2022-05-18Paper
Succinct non-interactive arguments via linear interactive proofs
Journal of Cryptology
2022-05-10Paper
On the round complexity of black-box secure MPC2022-04-22Paper
Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration2022-04-22Paper
Sublinear GMW-style compiler for MPC with preprocessing2022-04-22Paper
On pseudorandom encodings2022-03-23Paper
Correction to: ``Unconditionally secure computation against low-complexity leakage''
Journal of Cryptology
2022-03-03Paper
A geometric approach to homomorphic secret sharing2021-12-21Paper
Function secret sharing for mixed-mode and fixed-point secure computation2021-12-08Paper
On computational shortcuts for information-theoretic PIR2021-12-01Paper
Correction to: ``Unconditionally secure computation against low-complexity leakage''
Journal of Cryptology
2021-11-24Paper
Unconditionally secure computation against low-complexity leakage
Journal of Cryptology
2021-09-10Paper
On the local leakage resilience of linear secret sharing schemes
Journal of Cryptology
2021-06-28Paper
Foundations of homomorphic secret sharing2021-06-15Paper
Limits of practical sublinear secure computation2020-06-30Paper
Private circuits: a modular approach2020-06-30Paper
On fully secure MPC with solitary output2020-04-30Paper
Secure computation with preprocessing via function secret sharing2020-04-30Paper
Unconditionally secure computation against low-complexity leakage
Advances in Cryptology – CRYPTO 2019
2020-03-09Paper
Reusable non-interactive secure computation2020-03-09Paper
Trapdoor hash functions and their applications2020-03-09Paper
Zero-knowledge proofs on secret-shared data via fully linear PCPs2020-03-09Paper
Efficient pseudorandom correlation generators: silent OT extension and more2020-03-09Paper
Cryptographic sensing2020-03-09Paper
Two-round MPC: information-theoretic and black-box2018-12-11Paper
Best possible information-theoretic MPC2018-12-06Paper
Exploring crypto dark matter: new simple PRF candidates and their applications2018-12-06Paper
On the local leakage resilience of linear secret sharing schemes
Lecture Notes in Computer Science
2018-09-12Paper
Quasi-optimal SNARGs via linear multi-prover interactive proofs2018-07-17Paper
On the message complexity of secure multiparty computation2018-05-16Paper
Low-complexity cryptographic hash functions2018-05-03Paper
Minimizing locality of one-way functions via semi-private randomized encodings
Journal of Cryptology
2018-04-26Paper
Non-interactive multiparty computation without correlated randomness2018-02-23Paper
Two-message witness indistinguishability and secure computation in the plain model from new assumptions2018-02-23Paper
Actively secure garbled circuits with constant communication overhead in the plain model2018-01-19Paper
How to construct a leakage-resilient (stateless) trusted party2018-01-19Paper
Near-optimal secret sharing and error correcting codes in \(\mathsf{AC}^0\)2018-01-19Paper
Can we access a database both locally and privately?2018-01-19Paper
The price of low communication in secure multi-party computation2017-11-03Paper
Lattice-based SNARGs and their application to more efficient obfuscation
Lecture Notes in Computer Science
2017-06-23Paper
Ad hoc PSM protocols: secure computation without coordination
Lecture Notes in Computer Science
2017-06-23Paper
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
Lecture Notes in Computer Science
2017-06-13Paper
Linear-time encodable codes meeting the gilbert-varshamov bound and their cryptographic applications
Proceedings of the 5th conference on Innovations in theoretical computer science
2017-05-19Paper
Lossy chains and fractional secret sharing2017-01-30Paper
Encoding functions with constant online rate, or how to compress garbled circuit keys
SIAM Journal on Computing
2017-01-13Paper
Binary AMD circuits from secure multiparty computation
Theory of Cryptography
2016-12-21Paper
Breaking the circuit size barrier for secure computation under DDH
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Bounded indistinguishability and the complexity of recovering secrets
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Secure protocol transformations
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
From randomizing polynomials to parallel algorithms
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
2016-10-07Paper
Improved upper bounds on information-theoretic private information retrieval (extended abstract)
Proceedings of the thirty-first annual ACM symposium on Theory of Computing
2016-09-29Paper
One-way functions are essential for single-server private information retrieval
Proceedings of the thirty-first annual ACM symposium on Theory of Computing
2016-09-29Paper
Secure multiparty computation with general interaction patterns
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
Distribution design
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
On public key encryption from noisy codewords
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Private large-scale databases with distributed searchable symmetric encryption
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Making the best of a leaky situation: zero-knowledge PCPs from leakage-resilient circuits
Theory of Cryptography
2016-04-08Paper
Selective private function evaluation with applications to private statistics
Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
2016-03-04Paper
Universal service-providers for database private information retrieval (extended abstract)
Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing - PODC '98
2016-03-02Paper
Secure computation with minimal interaction, revisited
Lecture Notes in Computer Science
2015-12-10Paper
Secure computation from leaky correlated randomness
Lecture Notes in Computer Science
2015-12-10Paper
Efficient multi-party computation: from passive to active security via secure SIMD circuits
Lecture Notes in Computer Science
2015-12-10Paper
Cryptography with One-Way Communication
Lecture Notes in Computer Science
2015-12-10Paper
Parallel Hashing via List Recoverability
Lecture Notes in Computer Science
2015-12-10Paper
Statistical randomized encodings: a complexity theoretic view
Automata, Languages, and Programming
2015-10-27Paper
Function secret sharing
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Secure multiparty computation of approximations
ACM Transactions on Algorithms
2015-09-02Paper
Public-coin differing-inputs obfuscation and its applications
Theory of Cryptography
2015-07-06Paper
Circuits resilient to additive attacks with applications to secure computation
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
The round complexity of verifiable secret sharing and secure multicast
Proceedings of the thirty-third annual ACM symposium on Theory of computing
2015-02-27Paper
On the randomness complexity of efficient sampling
Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing
2014-11-25Paper
Black-box constructions for secure computation
Proceedings of the thirty-eighth annual ACM symposium on Theory of Computing
2014-11-25Paper
On linear-size pseudorandom generators and hardcore functions
Theoretical Computer Science
2014-10-06Paper
Non-interactive secure multiparty computation
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Secure multi-party computation with identifiable abort
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
How to Garble Arithmetic Circuits
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
2014-07-30Paper
How to garble arithmetic circuits
SIAM Journal on Computing
2014-07-30Paper
Extracting correlations
2009 50th Annual IEEE Symposium on Foundations of Computer Science
2014-07-25Paper
Partial garbling schemes and their applications
Automata, Languages, and Programming
2014-07-01Paper
Distributed Point Functions and Their Applications
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
On the complexity of UC commitments
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
On the Cryptographic Complexity of the Worst Functions
Theory of Cryptography
2014-02-18Paper
Probabilistically checkable proofs of proximity with zero-knowledge
Theory of Cryptography
2014-02-18Paper
Zero knowledge LTCs and their applications
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
2013-10-04Paper
Encoding functions with constant online rate or how to compress garbled circuits keys
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Efficient multiparty protocols via log-depth threshold formulae. (Extended abstract)
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Robust pseudorandom generators
Automata, Languages, and Programming
2013-08-06Paper
On linear-size pseudorandom generators and hardcore functions
Lecture Notes in Computer Science
2013-06-11Paper
Succinct non-interactive arguments via linear interactive proofs
Theory of Cryptography
2013-03-18Paper
On the power of correlated randomness in secure computation
Theory of Cryptography
2013-03-18Paper
Identifying cheaters without an honest majority
Theory of Cryptography
2012-06-15Paper
On Efficient Zero-Knowledge PCPs
Theory of Cryptography
2012-06-15Paper
Constant-rate oblivious transfer from noisy channels
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Black-box constructions of protocols for secure computation
SIAM Journal on Computing
2011-07-29Paper
Efficient non-interactive secure computation
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Correlation Extractors and Their Applications
Lecture Notes in Computer Science
2011-05-19Paper
On achieving the ``best of both worlds'' in secure multiparty computation
SIAM Journal on Computing
2011-05-17Paper
On Invertible Sampling and Adaptive Security
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
On \(d\)-multiplicative secret sharing
Journal of Cryptology
2010-11-12Paper
On locally decodable codes, self-correctable codes, and \(t\)-private PIR
Algorithmica
2010-11-08Paper
From secrecy to soundness: efficient verification via secure computation (extended abstract)
Automata, Languages and Programming
2010-09-07Paper
Secure multiparty computation with minimal interaction
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Interactive locking, zero-knowledge PCPs, and unconditional cryptography
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Batch codes and their applications
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing
2010-08-15Paper
Zero-knowledge proofs from secure multiparty computation
SIAM Journal on Computing
2010-07-07Paper
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Bounded key-dependent message security
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Founding Cryptography on Tamper-Proof Hardware Tokens
Theory of Cryptography
2010-02-24Paper
On complete primitives for fairness
Theory of Cryptography
2010-02-24Paper
Cryptography with constant input locality
Journal of Cryptology
2009-11-13Paper
Private multiparty sampling and approximation of vector combinations
Theoretical Computer Science
2009-04-29Paper
Cryptography with Constant Input Locality
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
How Many Oblivious Transfers Are Needed for Secure Multiparty Computation?
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Secure Arithmetic Computation with No Honest Majority
Theory of Cryptography
2009-03-03Paper
On Locally Decodable Codes, Self-correctable Codes, and t-Private PIR
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
2009-02-17Paper
Founding Cryptography on Oblivious Transfer – Efficiently
Lecture Notes in Computer Science
2009-02-10Paper
Cryptography with constant computational overhead2009-01-05Paper
scientific article; zbMATH DE number 5485433 (Why is no real title available?)2009-01-05Paper
scientific article; zbMATH DE number 5485580 (Why is no real title available?)2009-01-05Paper
On pseudorandom generators with linear stretch in \(\mathrm{NC}^{0}\)
Computational Complexity
2008-08-20Paper
Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
OT-Combiners via Secure Computation
Theory of Cryptography
2008-03-05Paper
Basing Weak Public-Key Cryptography on Strong One-Way Functions
Theory of Cryptography
2008-03-05Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Private Multiparty Sampling and Approximation of Vector Combinations
Automata, Languages and Programming
2007-11-28Paper
Computationally private randomizing polynomials and their applications
Computational Complexity
2007-11-05Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Private Circuits II: Keeping Secrets in Tamperable Circuits
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Cryptography in $NC^0$
SIAM Journal on Computing
2007-09-07Paper
Scalable Secure Multiparty Computation
Lecture Notes in Computer Science
2007-09-04Paper
On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation
Lecture Notes in Computer Science
2007-09-04Paper
Evaluating Branching Programs on Encrypted Data
Theory of Cryptography
2007-08-30Paper
On Pseudorandom Generators with Linear Stretch in NC0
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
2007-08-28Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
On the Power of Nonlinear Secret-Sharing
SIAM Journal on Discrete Mathematics
2005-09-16Paper
General constructions for information-theoretic private information retrieval
Journal of Computer and System Sciences
2005-08-03Paper
Adaptive versus non-adaptive security of multi-party protocols
Journal of Cryptology
2004-10-01Paper
Reducing the servers' computation in private information retrieval: PIR with preprocessing
Journal of Cryptology
2004-09-27Paper
scientific article; zbMATH DE number 2086626 (Why is no real title available?)2004-08-11Paper
Private computation using a PEZ dispenser.
Theoretical Computer Science
2004-03-14Paper
scientific article; zbMATH DE number 2009982 (Why is no real title available?)2003-11-26Paper
scientific article; zbMATH DE number 1942420 (Why is no real title available?)2003-06-30Paper
On privacy and partition arguments
Information and Computation
2003-01-14Paper
scientific article; zbMATH DE number 1775399 (Why is no real title available?)2002-09-17Paper
scientific article; zbMATH DE number 1775398 (Why is no real title available?)2002-08-01Paper
scientific article; zbMATH DE number 1759771 (Why is no real title available?)2002-07-28Paper
scientific article; zbMATH DE number 1754645 (Why is no real title available?)2002-06-12Paper
scientific article; zbMATH DE number 1754644 (Why is no real title available?)2002-06-12Paper
scientific article; zbMATH DE number 1722674 (Why is no real title available?)2002-03-21Paper
scientific article; zbMATH DE number 1722683 (Why is no real title available?)2002-03-21Paper
Universal service-providers for private information retrieval
Journal of Cryptology
2001-05-13Paper
Protecting data privacy in private information retrieval schemes
Journal of Computer and System Sciences
2000-08-27Paper
scientific article; zbMATH DE number 1418319 (Why is no real title available?)2000-07-19Paper
Valid Generalisation from Approximate Interpolation
Combinatorics, Probability and Computing
1997-07-07Paper


Research outcomes over time


This page was built for person: Yuval Ishai