Gilad Asharov
Gilad Asharov
Department of Computer Science, Bar-Ilan University
Verified email at biu.ac.il - Homepage
Title
Cited by
Cited by
Year
More efficient oblivious transfer and extensions for faster secure computation
G Asharov, Y Lindell, T Schneider, M Zohner
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3582013
Multiparty computation with low communication, computation and interaction via threshold FHE
G Asharov, A Jain, A López-Alt, E Tromer, V Vaikuntanathan, D Wichs
Annual International Conference on the Theory and Applications of …, 2012
3462012
A full proof of the BGW protocol for perfectly secure multiparty computation
G Asharov, Y Lindell
Journal of Cryptology 30 (1), 58-151, 2017
1362017
Utility dependence in correct and fair rational secret sharing
G Asharov, Y Lindell
Journal of Cryptology 24 (1), 157-202, 2011
1082011
Towards a game theoretic view of secure computation
G Asharov, R Canetti, C Hazay
Annual International Conference on the Theory and Applications of …, 2011
972011
More efficient oblivious transfer extensions with security for malicious adversaries
G Asharov, Y Lindell, T Schneider, M Zohner
Annual International Conference on the Theory and Applications of …, 2015
922015
Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations
G Asharov, M Naor, G Segev, I Shahaf
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
772016
Limits on the power of indistinguishability obfuscation and functional encryption
G Asharov, G Segev
SIAM Journal on Computing 45 (6), 2117-2176, 2016
652016
OptORAMa: Optimal Oblivious RAM
G Asharov, I Komargodski, W Lin, K Nayak, E Peserico, E Shi
Advances in Cryptology–EUROCRYPT 202039th Annual International Conference on …, 2020
622020
More efficient oblivious transfer extensions
G Asharov, Y Lindell, T Schneider, M Zohner
Journal of Cryptology 30 (3), 805-858, 2017
472017
Complete characterization of fairness in secure two-party computation of boolean functions
G Asharov, A Beimel, N Makriyannis, E Omri
Theory of Cryptography Conference, 199-228, 2015
422015
Towards characterizing complete fairness in secure two-party computation
G Asharov
Theory of Cryptography Conference, 291-316, 2014
422014
Privacy-Preserving Search of Similar Patients in Genomic Data.
G Asharov, S Halevi, Y Lindell, T Rabin
Proc. Priv. Enhancing Technol. 2018 (4), 104-124, 2018
412018
Calling out cheaters: Covert security with public verifiability
G Asharov, C Orlandi
International Conference on the Theory and Application of Cryptology and …, 2012
392012
Privacy-Preserving Interdomain Routing at Internet Scale.
G Asharov, D Demmler, M Schapira, T Schneider, G Segev, S Shenker, ...
Proc. Priv. Enhancing Technol. 2017 (3), 147, 2017
332017
Tight tradeoffs in searchable symmetric encryption
G Asharov, G Segev, I Shahaf
Journal of Cryptology 34 (2), 1-37, 2021
252021
A full characterization of functions that imply fair coin tossing and ramifications to fairness
G Asharov, Y Lindell, T Rabin
Theory of Cryptography Conference, 243-262, 2013
252013
Fair and efficient secure multiparty computation with reputation systems
G Asharov, Y Lindell, H Zarosim
International Conference on the Theory and Application of Cryptology and …, 2013
242013
On constructing one-way permutations from indistinguishability obfuscation
G Asharov, G Segev
Journal of Cryptology 31 (3), 698-736, 2018
232018
Perfectly-Secure Multiplication for Any t < n/3
G Asharov, Y Lindell, T Rabin
Annual Cryptology Conference, 240-258, 2011
152011
The system can't perform the operation now. Try again later.
Articles 1–20