Calculated based on number of publications stored in Pure and citations from Scopus
1996 …2024

Research activity per year

Search results

  • Secure multi-party computation with identifiable abort

    Ishai, Y., Ostrovsky, R. & Zikas, V., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 2 ed. p. 369-386 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    45 Scopus citations
  • Secure multiparty computation with minimal interaction

    Ishai, Y., Kushilevitz, E. & Paskin, A., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 577-594 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    35 Scopus citations
  • Secure protocol transformations

    Ishai, Y., Kushilevitz, E., Prabhakaran, M., Sahai, A. & Yu, C. H., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). p. 430-458 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Selective private function evaluation with applications to private statistics

    Canetti, R., Ishai, Y., Kumar, R., Reiter, M. K., Rubinfeld, R. & Wright, R. N., 2001, p. 293-302. 10 p.

    Research output: Contribution to conferencePaperpeer-review

    61 Scopus citations
  • Semantic Security Under Related-Key Attacks and Applications

    Applebaum, B., Harnik, D. & Ishai, Y., 2010

    Research output: Other contribution

  • Separating two-round secure computation from oblivious transfer

    Applebaum, B., Brakerski, Z., Garg, S., Ishai, Y. & Srinivasan, A., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). 71. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Share conversion, pseudorandom secret-sharing and applications to secure computation

    Cramer, R., Damgård, I. & Ishai, Y., 2005, In: Lecture Notes in Computer Science. 3378, p. 342-362 21 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    151 Scopus citations
  • Share conversion and private information retrieval

    Beimel, A., Ishai, Y., Kushilevitz, E. & Orlov, I., 2012, Proceedings - 2012 IEEE 27th Conference on Computational Complexity, CCC 2012. p. 258-268 11 p. 6243402. (Proceedings of the Annual IEEE Conference on Computational Complexity).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • Single-use OT combiners with near-optimal resilience

    Ishai, Y., Maji, H. K., Sahai, A. & Wullschleger, J., 2014, 2014 IEEE International Symposium on Information Theory, ISIT 2014. p. 1544-1548 5 p. 6875092. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Special section on the fifty-fourth annual symposium on foundations of computer science (FOCS 2013)

    Hardt, M., Ishai, Y., Meka, R. & Williams, V. V., 2016, In: SIAM Journal on Computing. 45, 3, p. 881 1 p.

    Research output: Contribution to journalEditorial

    Open Access
  • Special section on the forty-fifth annual ACM symposium on the theory of computing (STOC 2013)

    Aspnes, J., Ishai, Y. & Miltersen, P. B., 2016, In: SIAM Journal on Computing. 45, 2, p. 459-460 2 p.

    Research output: Contribution to journalEditorial

    Open Access
  • Statistical randomized encodings: A complexity theoretic view

    Agrawal, S., Ishai, Y., Khurana, D. & Paskin-Cherniavsky, A., 2015, Automata, Languages, and Programming - 42nd International Colloquium, ICALP 2015, Proceedings. Halldorsson, M. M., Kobayashi, N., Speckmann, B. & Iwama, K. (eds.). p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9134).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Streaming and Unbalanced PSI from Function Secret Sharing

    Dittmer, S., Ishai, Y., Lu, S., Ostrovsky, R., Elsabagh, M., Kiourtis, N., Schulte, B. & Stavrou, A., 2022, Security and Cryptography for Networks - 13th International Conference, SCN 2022, Proceedings. Galdi, C. & Jarecki, S. (eds.). p. 564-587 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13409 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Sub-linear zero-knowledge argument for correctness of a shuffle

    Groth, J. & Ishai, Y., 2008, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 379-396 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4965 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    59 Scopus citations
  • Succinct Arguments for RAM Programs via Projection Codes

    Ishai, Y., Ostrovsky, R. & Shah, A., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings, Part II. Handschuh, H. & Lysyanskaya, A. (eds.). p. 159-192 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14082 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Succinct Computational Secret Sharing

    Applebaum, B., Beimel, A., Ishai, Y., Kushilevitz, E., Liu, T. & Vaikuntanathan, V., 2 Jun 2023, STOC 2023 - Proceedings of the 55th Annual ACM Symposium on Theory of Computing. Saha, B. & Servedio, R. A. (eds.). p. 1553-1566 14 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Succinct non-interactive arguments via linear interactive proofs

    Bitansky, N., Chiesa, A., Ishai, Y., Paneth, O. & Ostrovsky, R., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 315-333 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    161 Scopus citations
  • Sufficient conditions for collision-resistant hashing

    Ishai, Y., Kushilevitz, E. & Ostrovsky, R., 2005, In: Lecture Notes in Computer Science. 3378, p. 445-456 12 p.

    Research output: Contribution to journalConference articlepeer-review

    Open Access
    41 Scopus citations
  • The complexity of information theoretic secure computation

    Ishai, Y., 2012, 2012 IEEE Information Theory Workshop. p. 80-80 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The Price of Low Communication in Secure Multi-party Computation

    Garay, J., Ishai, Y., Ostrovsky, R. & Zikas, V., 2017, ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I. Shacham, H. & Katz, J. (eds.). Vol. 10401. p. 420-446 27 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    17 Scopus citations
  • The round complexity of verifiable secret sharing and secure multicast

    Gennaro, R., Ishai, Y., Kushilevitz, E. & Rabin, T., 2001, In: Conference Proceedings of the Annual ACM Symposium on Theory of Computing. p. 580-589 10 p.

    Research output: Contribution to journalConference articlepeer-review

    100 Scopus citations
  • Tight Bounds on the Randomness Complexity of Secure Multiparty Computation

    Goyal, V., Ishai, Y. & Song, Y., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 483-513 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13510 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Trapdoor Hash Functions and Their Applications

    Dottling, N., Garg, S., Ishai, Y., Malavolta, G., Mour, T., Ostrovsky, R. & Döttling, N., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 3-32 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    39 Scopus citations
  • Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions

    Badrinarayanan, S., Garg, S., Ishai, Y., Sahai, A. & Wadia, A., 2017, ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III. Takagi, T. & Peyrin, T. (eds.). Vol. 10626. p. 275-303 29 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    25 Scopus citations
  • Two-round MPC: Information-theoretic and black-box

    Garg, S., Ishai, Y. & Srinivasan, A., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). p. 123-151 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • Unconditionally Secure Computation Against Low-Complexity Leakage

    Bogdanov, A., Ishai, Y. & Srinivasan, A., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II. Boldyreva, A. & Micciancio, D. (eds.). Vol. 11693. p. 387-416 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    7 Scopus citations
  • Universal service-providers for database private information retrieval

    Di-Crescenzo, G., Ishai, Y. & Ostrovsky, R., 1998, p. 91-100. 10 p.

    Research output: Contribution to conferencePaperpeer-review

    39 Scopus citations
  • Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs

    Gentry, C., Groth, J., Ishai, Y., Peikert, C., Sahai, A. & Smith, A., 30 Oct 2015, In: Journal of Cryptology. 28, 4, p. 820-843 24 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    49 Scopus citations
  • Valid generalisation from approximate interpolation

    Anthony, M., Bartlett, P., Ishai, Y. & Shawe-Taylor, J., 1996, In: Combinatorics Probability and Computing. 5, 3, p. 191-214 24 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    5 Scopus citations
  • Zero-knowledge from secure multiparty computation

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2007, STOC'07: Proceedings of the 39th Annual ACM Symposium on Theory of Computing. p. 21-30 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    270 Scopus citations
  • Zero knowledge LTCs and their applications

    Ishai, Y., Sahai, A., Viderman, M. & Weiss, M., 2013, Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques - 16th International Workshop, APPROX 2013 and 17th International Workshop, RANDOM 2013, Proceedings. p. 607-622 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8096 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Zero-knowledge proofs from secure multiparty computation

    Ishai, Y., Kushilevitz, E., Ostrovsky, R. & Sahai, A., 2009, In: SIAM Journal on Computing. 39, 3, p. 1121-1152 32 p.

    Research output: Contribution to journalArticlepeer-review

    86 Scopus citations
  • Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 2019, ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT III. Micciancio, D. & Boldyreva, A. (eds.). Vol. 11694. p. 67-97 31 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    36 Scopus citations