Filter
Conference contribution

Search results

  • 2023

    How to Recover a Secret with O(n) Additions

    Applebaum, B., Nir, O. & Pinkas, B., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 236-262 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Tel Aviv University, Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure Statistical Analysis on Multiple Datasets: Join and Group-By

    Asharov, G., Hamada, K., Kikuchi, R., Nof, A., Pinkas, B. & Tomida, J., 15 Nov 2023, CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. p. 3298-3312 15 p. (CCS 2023 - Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters

    Asharov, G., Hamada, K., Ikarashi, D., Kikuchi, R., Nof, A., Pinkas, B., Takahashi, K. & Tomida, J., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. p. 125-138 14 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Bar-Ilan University, Technion - Israel Institute of Technology

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications

    Günther, D., Heymann, M., Pinkas, B. & Schneider, T., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. p. 1759-1776 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs

    Günther, D., Holz, M., Judkewitz, B., Möllering, H., Pinkas, B., Schneider, T. & Suresh, A., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. p. 3351-3353 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Fairness in the Eyes of the Data: Certifying Machine-Learning Models

    Segal, S., Adi, Y., Pinkas, B., Baum, C., Ganesh, C. & Keshet, J., 21 Jul 2021, AIES 2021 - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society. p. 926-935 10 p. (AIES 2021 - Proceedings of the 2021 AAAI/ACM Conference on AI, Ethics, and Society).

    The Hebrew University of Jerusalem

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Hashomer--Privacy-Preserving Bluetooth Based Contact Tracing Scheme for Hamagen

    Pinkas, B. & Ronen, E., 2021, Real World Crypto and NDSS Corona-Def Workshop. 7 p.

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Oblivious Key-Value Stores and Amplification for Private Set Intersection

    Garimella, G., Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 395-425 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure Graph Analysis at Scale

    Araki, T., Furukawa, J., Ohara, K., Pinkas, B., Rosemarin, H. & Tsuchida, H., 12 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. p. 610-629 20 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2020

    Blinder - Scalable, Robust Anonymous Committed Broadcast

    Abraham, I., Pinkas, B. & Yanai, A., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. p. 1233-1252 20 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Flaw Label: Exploiting IPv6 Flow Label

    Berger, J., Klein, A. & Pinkas, B., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 1259-1276 18 p. 9152759. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • PSI from PaXoS: Fast, Malicious Private Set Intersection

    Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). p. 739-767 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Towards scalable threshold cryptosystems

    Tomescu, A., Chen, R., Zheng, Y., Abraham, I., Pinkas, B., Gueta, G. G. & Devadas, S., May 2020, Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020. Institute of Electrical and Electronics Engineers Inc., p. 877-893 17 p. 9152696. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2020-May).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2019

    DNS Cache-Based User Tracking

    Klein, A. & Pinkas, B., 2019, 26th Annual Network and Distributed System Security Symposium, NDSS 2019. The Internet Society, (26th Annual Network and Distributed System Security Symposium, NDSS 2019).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Efficient circuit-based PSI with linear communication

    Pinkas, B., Schneider, T., Tkachenko, O. & Yanai, A., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Springer Verlag, p. 122-153 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • From IP ID to device ID and KASLR bypass

    Klein, A. & Pinkas, B., 2019, Proceedings of the 28th USENIX Security Symposium. p. 1063-1080 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior

    Naor, M., Pinkas, B. & Ronen, E., 6 Nov 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1369-1386 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Weizmann Institute Of Science, Tel Aviv University, Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Make some room for the zeros: Data sparsity in secure distributed machine learning

    Schoppmann, P., Raykova, M., Gascón, A. & Pinkas, B., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. p. 1335-1350 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • SBFT: A Scalable and Decentralized Trust Infrastructure

    Golan Gueta, G., Abraham, I., Grossman, S., Malkhi, D., Pinkas, B., Reiter, M., Seredinschi, D. A., Tamir, O. & Tomescu, A., Jun 2019, Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019. Institute of Electrical and Electronics Engineers Inc., p. 568-580 13 p. 8809541. (Proceedings - 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2019).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension

    Pinkas, B., Rosulek, M., Trieu, N. & Yanai, A., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer Verlag, p. 401-431 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    Committed MPC: Maliciously Secure Multiparty Computation from Homomorphic Commitments

    Frederiksen, T. K., Pinkas, B. & Yanai, A., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 587-619 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Distributed SSH key management with proactive RSA threshold signatures

    Harchol, Y., Abraham, I. & Pinkas, B., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Preneel, B. & Vercauteren, F. (eds.). Springer Verlag, p. 22-43 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient circuit-based psi via cuckoo hashing

    Pinkas, B., Schneider, T., Weinert, C. & Wieder, U., 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings. Nielsen, J. B. & Rijmen, V. (eds.). Springer Verlag, p. 125-157 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10822 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Efficient scalable multiparty private set-intersection via garbled bloom filters

    Inbar, R., Omri, E. & Pinkas, B., 2018, Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. Catalano, D. & De Prisco, R. (eds.). Springer Verlag, p. 235-252 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11035 LNCS).

    Bar-Ilan University, Ariel University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fast distributed rsa key generation for semi-honest and malicious adversaries

    Frederiksen, T. K., Lindell, Y., Osheter, V. & Pinkas, B., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 331-361 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10992 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • High-throughput secure AES computation

    Chida, K., Hamada, K., Ikarashi, D., Kikuchi, R. & Pinkas, B., 15 Oct 2018, WAHC 2018 - Proceedings of the 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, co-located with CCS 2018. p. 13-24 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Turning your weakness into a strength: Watermarking deep neural networks by backdooring

    Adi, Y., Baum, C., Cisse, M., Pinkas, B. & Keshet, J., 2018, Proceedings of the 27th USENIX Security Symposium. p. 1615-1631 17 p. (Proceedings of the 27th USENIX Security Symposium).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2017

    Asymptotically tight bounds for composing ORAM with PIR

    Abraham, I., Fletcher, C. W., Nayak, K., Pinkas, B. & Ren, L., 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Fehr, S. (ed.). Springer Verlag, p. 91-120 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10174 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Practical multi-party private set intersection from symmetric-key techniques

    Kolesnikov, V., Matania, N., Pinkas, B., Rosulek, M. & Trieu, N., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 1257-1272 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The circle game: Scalable private membership test using trusted hardware

    Tamrakar, S., Liu, J., Paverd, A., Ekberg, J. E., Pinkas, B. & Asokan, N., 2 Apr 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. p. 31-44 14 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2015

    Efficient constant round multi-party computation combining BMR and SPDZ

    Lindell, Y., Pinkas, B., Smart, N. P. & Yanai, A., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 319-338 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Fast garbling of circuits under standard assumptions

    Gueron, S., Lindell, Y., Nof, A. & Pinkasy, B., 12 Oct 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. p. 567-578 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    University of Haifa, Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Phasing: Private Set Intersection using Permutation-based Hashing

    Pinkas, B., Schneider, T., Segev, G. & Zohner, M., 2015, Proceedings of the 24th USENIX Security Symposium. p. 515-530 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Bar-Ilan University, The Hebrew University of Jerusalem

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure deduplication of encrypted data without additional independent servers

    Liu, J., Asokan, N. & Pinkas, B., 12 Oct 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. p. 874-885 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2014

    Faster private set intersection based on OT extension

    Pinkas, B., Schneider, T. & Zohner, M., 2014, Proceedings of the 23rd USENIX Security Symposium. p. 797-812 16 p. (Proceedings of the 23rd USENIX Security Symposium).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Non-interactive secure computation based on cut-and-choose

    Afshar, A., Mohassel, P., Pinkas, B. & Riva, B., 2014, Advances in Cryptology, EUROCRYPT 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Springer Verlag, p. 387-404 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8441 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2013

    Canon-MPC, a system for casual non-interactive secure multi-party computation using native client

    Jarrous, A. & Pinkas, B., 2013, WPES 2013 - Proceedings of the 2013 ACM Workshop on Privacy in the Electronic Society, Co-located with CCS 2013. p. 155-166 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2012

    Firm grip handshakes: A tool for bidirectional vouching

    Berkman, O., Pinkas, B. & Yung, M., 2012, Cryptology and Network Security - 11th International Conference, CANS 2012, Proceedings. p. 142-157 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7712 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2011

    Proofs of ownership in remote storage systems

    Halevi, S., Harnik, D., Pinkas, B. & Shulman-Peleg, A., 2011, CCS'11 - Proceedings of the 18th ACM Conference on Computer and Communications Security. p. 491-500 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Secure computation on the web: Computing without simultaneous interaction

    Halevi, S., Lindell, Y. & Pinkas, B., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 132-150 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Secure set intersection with untrusted hardware tokens

    Fischlin, M., Pinkas, B., Sadeghi, A. R., Schneider, T. & Visconti, I., 2011, Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, Proceedings. p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6558 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Secure two-party computation via cut-and-choose oblivious transfer

    Lindell, Y. & Pinkas, B., 2011, Theory of Cryptography - 8th Theory of Cryptography Conference, TCC 2011, Proceedings. Springer Verlag, p. 329-346 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6597 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • The IPS compiler: Optimizations, variants and concrete efficiency

    Lindell, Y., Oxman, E. & Pinkas, B., 2011, Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Proceedings. Springer Verlag, p. 259-276 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6841 LNCS).

    Bar-Ilan University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access