Skip to main content

Showing 1–7 of 7 results for author: Ishai, Y

.
  1. arXiv:2310.00334  [pdf, ps, other

    cs.CC cs.CR

    Bounded Simultaneous Messages

    Authors: Andrej Bogdanov, Krishnamoorthy Dinesh, Yuval Filmus, Yuval Ishai, Avi Kaplan, Sruthi Sekar

    Abstract: We consider the following question of bounded simultaneous messages (BSM) protocols: Can computationally unbounded Alice and Bob evaluate a function $f(x,y)$ of their inputs by sending polynomial-size messages to a computationally bounded Carol? The special case where $f$ is the mod-2 inner-product function and Carol is bounded to AC$^0$ has been studied in previous works. The general question can… ▽ More

    Submitted 21 December, 2023; v1 submitted 30 September, 2023; originally announced October 2023.

    Comments: This version has a modified variant of the succinct subset sum candidate from the original version of this paper

  2. arXiv:2201.03041  [pdf, ps, other

    cs.DS cs.CR

    Locality-Preserving Hashing for Shifts with Connections to Cryptography

    Authors: Elette Boyle, Itai Dinur, Niv Gilboa, Yuval Ishai, Nathan Keller, Ohad Klein

    Abstract: Can we sense our location in an unfamiliar environment by taking a sublinear-size sample of our surroundings? Can we efficiently encrypt a message that only someone physically close to us can decrypt? To solve this kind of problems, we introduce and study a new type of hash functions for finding shifts in sublinear time. A function $h:\{0,1\}^n\to \mathbb{Z}_n$ is a $(d,δ)$ {\em locality-preservin… ▽ More

    Submitted 9 January, 2022; originally announced January 2022.

    Journal ref: ITCS 2022

  3. arXiv:2111.10126  [pdf, ps, other

    cs.IT cs.CR

    On the Download Rate of Homomorphic Secret Sharing

    Authors: Ingerid Fosli, Yuval Ishai, Victor I. Kolobov, Mary Wootters

    Abstract: A homomorphic secret sharing (HSS) scheme is a secret sharing scheme that supports evaluating functions on shared secrets by means of a local map** from input shares to output shares. We initiate the study of the download rate of HSS, namely, the achievable ratio between the length of the output shares and the output length when amortized over $\ell$ function evaluations. We obtain the following… ▽ More

    Submitted 30 May, 2022; v1 submitted 19 November, 2021; originally announced November 2021.

  4. arXiv:2012.14884  [pdf, other

    cs.CR

    Lightweight Techniques for Private Heavy Hitters

    Authors: Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai

    Abstract: This paper presents Poplar, a new system for solving the private heavy-hitters problem. In this problem, there are many clients and a small set of data-collection servers. Each client holds a private bitstring. The servers want to recover the set of all popular strings, without learning anything else about any client's string. A web-browser vendor, for instance, can use Poplar to figure out which… ▽ More

    Submitted 23 March, 2023; v1 submitted 29 December, 2020; originally announced December 2020.

    Comments: Appeared at IEEE Security & Privacy 2021

  5. arXiv:2012.13053  [pdf, other

    cs.CR

    Function Secret Sharing for PSI-CA:With Applications to Private Contact Tracing

    Authors: Samuel Dittmer, Yuval Ishai, Steve Lu, Rafail Ostrovsky, Mohamed Elsabagh, Nikolaos Kiourtis, Brian Schulte, Angelos Stavrou

    Abstract: In this work we describe a token-based solution to Contact Tracing via Distributed Point Functions (DPF) and, more generally, Function Secret Sharing (FSS). The key idea behind the solution is that FSS natively supports secure keyword search on raw sets of keywords without a need for processing the keyword sets via a data structure for set membership. Furthermore, the FSS functionality enables add… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

  6. arXiv:1812.01372  [pdf, other

    cs.CR

    Outsourcing Private Machine Learning via Lightweight Secure Arithmetic Computation

    Authors: Siddharth Garg, Zahra Ghodsi, Carmit Hazay, Yuval Ishai, Antonio Marcedone, Muthuramakrishnan Venkitasubramaniam

    Abstract: In several settings of practical interest, two parties seek to collaboratively perform inference on their private data using a public machine learning model. For instance, several hospitals might wish to share patient medical records for enhanced diagnostics and disease prediction, but may not be able to share data in the clear because of privacy concerns. In this work, we propose an actively secu… ▽ More

    Submitted 4 December, 2018; originally announced December 2018.

  7. arXiv:0811.0475  [pdf, ps, other

    cs.CR cs.CC

    Secure Arithmetic Computation with No Honest Majority

    Authors: Yuval Ishai, Manoj Prabhakaran, Amit Sahai

    Abstract: We study the complexity of securely evaluating arithmetic circuits over finite rings. This question is motivated by natural secure computation tasks. Focusing mainly on the case of two-party protocols with security against malicious parties, our main goals are to: (1) only make black-box calls to the ring operations and standard cryptographic primitives, and (2) minimize the number of such black… ▽ More

    Submitted 8 November, 2008; v1 submitted 4 November, 2008; originally announced November 2008.

    Comments: minor editorial changes