Swarming secrets

Shlomi Dolev , Niv Gilboa , Juan Garay , Vladimir Kolesnikov
allerton conference on communication, control, and computing 1438 -1445

16
2009
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs.

Yuval Ishai , Dan Boneh , Henry Corrigan-Gibbs , Niv Gilboa
IACR Cryptology ePrint Archive 2019 188

1
2019
Private Information Retrieval by Keywords.

Moni Naor , Niv Gilboa , Benny Chor
IACR Cryptology ePrint Archive 1998 3

280
1998
Foundations of Homomorphic Secret Sharing.

Yuval Ishai , Niv Gilboa , Stefano Tessaro , Huijia Lin
IACR Cryptology ePrint Archive 2017 1248

1
2017
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation.

Yuval Ishai , Niv Gilboa , Elette Boyle
IACR Cryptology ePrint Archive 2017 150

2017
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation.

Yuval Ishai , Niv Gilboa , Peter Scholl , Geoffroy Couteau
IACR Cryptology ePrint Archive 2019 1159

114
2019
Secure Computation with Preprocessing via Function Secret Sharing.

Yuval Ishai , Niv Gilboa , Elette Boyle
IACR Cryptology ePrint Archive 2019 1095

47
2019
Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs.

Yuval Ishai , Niv Gilboa , Ariel Nof , Elette Boyle
IACR Cryptology ePrint Archive 2020 1451

26
2020
Correlated Pseudorandom Functions from Variable-Density LPN

Yuval Ishai , Niv Gilboa , Peter Scholl , Geoffroy Couteau
foundations of computer science 1069 -1080

33
2020
Lightweight Techniques for Private Heavy Hitters

Yuval Ishai , Dan Boneh , Henry Corrigan-Gibbs , Niv Gilboa
ieee symposium on security and privacy 2021 17

2021
Spectre without shared memory

Ben Amos , Niv Gilboa , Arbel Levy
acm symposium on applied computing 1944 -1951

2019
Function Secret Sharing

Elette Boyle , Niv Gilboa , Yuval Ishai
theory and application of cryptographic techniques 337 -367

102
2015
Homomorphic Secret Sharing: Optimizations and Applications

Elette Boyle , Geoffroy Couteau , Niv Gilboa , Yuval Ishai
computer and communications security 2105 -2122

33
2017
Distributed Point Functions and their Applications

Niv Gilboa , Yuval Ishai
theory and application of cryptographic techniques 640 -658

57
2014
Broadcast Encryption with Both Temporary and Permanent Revocation

Dan Brownstein , Shlomi Dolev , Niv Gilboa
international symposium on stabilization safety and security of distributed systems 469 -483

2017
Compressing Vector OLE

Elette Boyle , Geoffroy Couteau , Niv Gilboa , Yuval Ishai
computer and communications security 896 -912

20
2018
Deniability — an alibi for users in P2P networks

Ofer Hermoni , Niv Gilboa , Eyal Felstaine , Sharon Shitrit
communication system software and middleware 310 -317

6
2008
Function Secret Sharing: Improvements and Extensions

Elette Boyle , Niv Gilboa , Yuval Ishai
computer and communications security 1292 -1303

62
2016
Two Party RSA Key Generation

Niv Gilboa
international cryptology conference 116 -129

121
1999
Brief announcement: swarming secrets

Shlomi Dolev , Juan Garay , Niv Gilboa , Vladimir Kolesnikov
principles of distributed computing 231 -232

4
2010