1997 …2023

Research activity per year

Search results

  • 2023

    Arithmetic Sketching

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 1 Jan 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 171-202 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Characterization and Detection of Cross-Router Covert Channels

    Shvartzman, O., Ovadya, A., Zvi, K., Shwartz, O., Ogen, R., Mallah, Y., Gilboa, N. & Oren, Y., 1 Apr 2023, In: Computers and Security. 127, 103125.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • Oblivious Transfer with Constant Computational Overhead

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N. & Scholl, P., 1 Jan 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 271-302 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14004 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Correlated Pseudorandomness from Expand-Accumulate Codes

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Resch, N. & Scholl, P., 1 Jan 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 603-633 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13508 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    8 Scopus citations
  • Information-Theoretic Distributed Point Functions

    Boyle, E., Gilboa, N., Ishai, Y. & Kolobov, V. I., 1 Jul 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 17. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Locality-Preserving Hashing for Shifts with Connections to Cryptography

    Boyle, E., Dinur, I., Gilboa, N., Ishai, Y., Keller, N. & Klein, O., 25 Jan 2022, 13th Innovations in Theoretical Computer Science Conference, ITCS 2022. Braverman, M. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 27:1-27:24 (Leibniz International Proceedings in Informatics, LIPIcs; vol. 215).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Programmable Distributed Point Functions

    Boyle, E., Gilboa, N., Ishai, Y. & Kolobov, V. I., 1 Jan 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 121-151 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13510 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Secure Multiparty Computation with Sublinear Preprocessing

    Boyle, E., Gilboa, N., Ishai, Y. & Nof, A., 1 Jan 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 427-457 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2021

    Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation

    Boyle, E., Chandran, N., Gilboa, N., Gupta, D., Ishai, Y., Kumar, N. & Rathee, M., 1 Jan 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F.-X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 871-900 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12697 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation

    Benhamouda, F., Boyle, E., Gilboa, N., Halevi, S., Ishai, Y. & Nof, A., 1 Jan 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer Science and Business Media Deutschland GmbH, p. 129-161 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13043 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Lightweight techniques for private heavy hitters

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 1 May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Institute of Electrical and Electronics Engineers, p. 762-776 15 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2021-May).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    43 Scopus citations
  • Low-Complexity Weak Pseudorandom Functions in AC0 [ MOD2 ]

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 1 Jan 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 487-516 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12828 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Sublinear GMW-Style Compiler for MPC with Preprocessing

    Boyle, E., Gilboa, N., Ishai, Y. & Nof, A., 1 Jan 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 457-485 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • 2020

    Correlated pseudorandom functions from variable-density lpn

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 1 Nov 2020, Proceedings - 2020 IEEE 61st Annual Symposium on Foundations of Computer Science, FOCS 2020. Institute of Electrical and Electronics Engineers, p. 1069-1080 12 p. 9317926. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    25 Scopus citations
  • Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs

    Boyle, E., Gilboa, N., Ishai, Y. & Nof, A., 1 Jan 2020, Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, 2020, Proceedings. Moriai, S. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 244-276 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12493 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Efficient pseudorandom correlation generators from ring-lpn

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 1 Jan 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 387-416 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12171 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    30 Scopus citations
  • Method and system for performing broadcast encryption with revocation capability

    Dolev, S. (Inventor), Gilboa, N. (Inventor) & Brownstein, D. (Inventor), 11 Jun 2020, IPC No. H04N 21/ 2347 A I, Patent No. US2020186347, Priority date 10 May 2018, Priority No. US201816611032

    Research output: Patent

  • 2019
    Open Access
    12 Scopus citations
  • Cross-router covert channels

    Ovadya, A., Ogen, R., Mallah, Y., Gilboa, N. & Oren, Y., 1 Jan 2019.

    Research output: Contribution to conferencePaperpeer-review

    7 Scopus citations
  • Efficient Pseudorandom Correlation Generators: Silent OT Extension and More

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L. & Scholl, P., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 489-518 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    78 Scopus citations
  • Efficient two-round OT extension and silent non-interactive secure computation

    Boyle, E., Ishai, Y., Couteau, G., Kohl, L., Scholl, P., Gilboa, N. & Rindal, P., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 291-308 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    89 Scopus citations
  • How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs.

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 2019, In: IACR Cryptology ePrint Archive. 2019, p. 188 1 p.

    Research output: Contribution to journalArticle

  • Perennial secure multi-party computation of universal Turing machine

    Dolev, S., Garay, J. A., Gilboa, N., Kolesnikov, V. & Kumaramangalam, M. V., 17 May 2019, In: Theoretical Computer Science. 769, p. 43-62 20 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    3 Scopus citations
  • Practical fully secure three-party computation via sublinear distributed zero-knowledge proofs

    Boyle, E., Ishai, Y., Gilboa, N. & Nof, A., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 869-886 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Scopus citations
  • Secure Computation with Preprocessing via Function Secret Sharing

    Boyle, E., Gilboa, N. & Ishai, Y., 1 Jan 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). Springer, p. 341-371 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11891 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    33 Scopus citations
  • Spectre without shared memory

    Amos, B., Gilboa, N. & Levy, A., 1 Jan 2019, Proceedings of the ACM Symposium on Applied Computing. Association for Computing Machinery, p. 1944-1951 8 p. (Proceedings of the ACM Symposium on Applied Computing; vol. Part F147772).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs

    Boneh, D., Boyle, E., Corrigan-Gibbs, H., Gilboa, N. & Ishai, Y., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 67-97 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Scopus citations
  • 2018

    Compressing vector OLE

    Boyle, E., Couteau, G., Gilboa, N. & Ishai, Y., 15 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 896-912 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    96 Scopus citations
  • Foundations of homomorphic secret sharing

    Boyle, E., Gilboa, N., Ishai, Y., Lin, H. & Tessaro, S., 1 Jan 2018, 9th Innovations in Theoretical Computer Science, ITCS 2018. Karlin, A. R. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 21. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 94).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    31 Scopus citations
  • Method and system for performing broadcast encryption with revocation capability

    Dolev, S. (Inventor), Gilboa, N. (Inventor) & Brownstein, D. (Inventor), 15 Nov 2018, IPC No. H04N 21/ 266 A I, Patent No. WO2018207187, Priority date 14 Aug 2017, Priority No. US201762544936P

    Research output: Patent

  • MIKELANGELO: MIcro KErneL virtualizAtioN for hiGh pErfOrmance cLOud and HPC Systems

    Struckmann, N., Sandoval, Y., Har’El, N., Chen, F., Fan, S., Činkelj, J., Berginc, G., Chronz, P., Gilboa, N., Scalosub, G., Meth, K. & Kennedy, J., 1 Jan 2018, Advances in Service-Oriented and Cloud Computing - Workshops of ESOCC 2017, Revised Selected Papers. Mann, Z. A. & Stolz, V. (eds.). Springer Verlag, p. 175-180 6 p. (Communications in Computer and Information Science; vol. 824).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2017

    Broadcast encryption with both temporary and permanent revocation

    Brownstein, D., Dolev, S. & Gilboa, N., 1 Jan 2017, Stabilization, Safety, and Security of Distributed Systems - 19th International Symposium, SSS 2017, Proceedings. Tsigas, P. & Spirakis, P. (eds.). Springer Verlag, p. 469-483 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10616 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Functional encryption for cascade automata

    Brownstein, D., Dolev, S. & Gilboa, N., 1 Aug 2017, In: Information and Computation. 255, p. 384-407 24 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Group-based secure computation: Optimizing rounds, communication, and computation

    Boyle, E., Gilboa, N. & Ishai, Y., 1 Jan 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J.-S. & Nielsen, J. B. (eds.). Springer Verlag, p. 163-193 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10211 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • Homomorphic secret sharing: Optimizations and applications

    Boyle, E., Couteau, G., Gilboa, N., Ishai, Y. & Orrù, M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2105-2122 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    53 Scopus citations
  • 2016

    Accumulating automata and cascaded equations automata for non interactive and perennial secure multy-party computation

    Dolev, S. (Inventor), Li, X. (Inventor), Gilboa, N. (Inventor) & Li, X. (Inventor), 26 May 2016, IPC No. H04L 12/ 58 A I, Patent No. US2016149866, Priority date 23 Apr 2014, Priority No. WO2014IL50372

    Research output: Patent

  • Accumulating automata and cascaded equations automata for non interactive and perennial secure multy-party computation

    Dolev, S. (Inventor), Gilboa, N. (Inventor), Li, X. (Inventor) & Li, X. (Inventor), 2 Mar 2016, IPC No. H04L 29/ 06 A I, Patent No. EP2989584, Priority date 23 Apr 2014, Priority No. WO2014IL50372

    Research output: Patent

  • Breaking the circuit size barrier for secure computation under DDH

    Boyle, E., Gilboa, N. & Ishai, Y., 1 Jan 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 509-539 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    80 Scopus citations
  • Digital arbitration for trusted communication

    Brownstein, D., Dolev, S., Gilboa, N. & Hermoni, O., 2016, In: Journal of Trust Management. 3, 1, p. 1-12 12 p.

    Research output: Contribution to journalArticlepeer-review

  • Function secret sharing: Improvements and extensions

    Boyle, E., Gilboa, N. & Ishai, Y., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1292-1303 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    148 Scopus citations
  • SSSDB: Database with private information search

    Avni, H., Dolev, S., Gilboa, N. & Li, X., 1 Jan 2016, Algorithmic Aspects of Cloud Computing - 1st International Workshop, ALGOCLOUD 2015, Revised Selected Papers. Triantafillou, P., Karydis, I., Sioutas, S. & Tsoumakos, D. (eds.). Springer Verlag, p. 49-61 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9511).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2015

    Accumulating automata and cascaded equations automata: For communicationless information theoretically secure multi-party computation

    Dolev, S., Gilboa, N. & Li, X., 14 Apr 2015, SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015. Association for Computing Machinery, Inc, p. 21-29 9 p. (SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Functional encryption for cascade automata (Extended abstract)

    Brownstein, D., Dolev, S. & Gilboa, N., 1 Jan 2015, Stabilization, Safety and Security of Distributed Systems - 17th International Symposium, SSS 2015, Proceedings. Pelc, A. & Schwarzmann, A. A. (eds.). Springer Verlag, p. 94-108 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9212).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Function secret sharing

    Boyle, E., Gilboa, N. & Ishai, Y., 1 Jan 2015, Advances in Cryptology - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 337-367 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9057).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    154 Scopus citations
  • Rendezvous tunnel for anonymous publishing

    Hermoni, O., Gilboa, N., Felstaine, E. & Dolev, S., 1 May 2015, In: Peer-to-Peer Networking and Applications. 8, 3, p. 352-366 15 p.

    Research output: Contribution to journalArticlepeer-review

    7 Scopus citations
  • Towards efficient private distributed computation on unbounded input streams

    Dolev, S., Garay, J., Gilboa, N., Kolesnikov, V. & Yuditsky, Y., 1 Jun 2015, In: Journal of Mathematical Cryptology. 9, 2, p. 79-94 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    6 Scopus citations
  • 2014

    Accumulating automata and cascaded equations automata for non interactive and perennial secure multy-party computation

    Dolev, S. (Inventor), Gilboa, N. (Inventor) & Li, X. (Inventor), 30 Oct 2014, IPC No. H04L 9/ 14 A I, Patent No. CA2909858, Priority date 23 Apr 2014, Priority No. WO2014IL50372

    Research output: Patent

  • Accumulating automata and cascaded equations automata for non interactive and perennial secure multy-party computation

    Dolev, S. (Inventor), Gilboa, N. (Inventor) & Li, X. (Inventor), 30 Oct 2014, IPC No. H04L 9/ 14 A I, Patent No. WO2014174516, Priority date 28 Aug 2013, Priority No. US201361870838P

    Research output: Patent

  • A Method for attribute based broadcast encryption with permanent revocation

    Gilboa, N. (Inventor), Kopeetsky, M. (Inventor), Dolev, S. (Inventor) & Kopeetsky, M. (Inventor), 14 Aug 2014, IPC No. H04L 9/ 08 A I, Patent No. US2014226816, Priority date 22 Aug 2012, Priority No. US201214239580

    Research output: Patent

  • Digital arbitration

    Hermoni, O. (Inventor), Gilboa, N. (Inventor) & Dolev, S. (Inventor), 10 Apr 2014, IPC No. H04L 9/ 32 A I, Patent No. US2014101440, Priority date 10 Oct 2012, Priority No. US201213648787

    Research output: Patent