Yuval Ishai's Publications

  • Omer Barkol and Yuval Ishai. Secure Computation of Constant Depth Circuits with Applications to Database Search Problems. Proc. of Crypto 2005.

  • Ivan Damgård and Yuval Ishai. Constant-Round Multiparty Computation Using a Black-Box Psuedorandom Generator. Proc. of Crypto 2005.

  • Benny Applebaum, Yuval Ishai, and Eyal Kushilevitz. Computationally Private Randomizing Polynomials and their Applications. Proc. of IEEE Conference on Computational Complexity (CCC) 2005. Full version.

  • Yuval Ishai, Eyal Kushilevitz, and Rafail Ostrovsky. Sufficient Conditions for Collision-Resistant Hashing. Proc. of TCC 2005.

  • Michael J. Freedman, Yuval Ishai, Benny Pinkas, and Omer Reingold. Keyword Search and Oblivious Pseudorandom Functions. Proc. of TCC 2005.

  • Ronald Cramer, Ivan Damgård, and Yuval Ishai. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. Proc. of TCC 2005.

  • Benny Applebaum, Yuval Ishai, and Eyal Kushilevitz. Cryptography in NC0. Proc. of FOCS 2004. Full version to appear in SICOMP Special Issue on Randomness in Computation.

  • Prahladh Harsha, Yuval Ishai, Joe Kilian, Kobbi Nissim, and Srinivasan Venkatesh. Communication vs. Computation. Proc. of ICALP 2004. Full version.

  • Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, and Amit Sahai. Batch Codes and Their Applications. Proc. of STOC 2004.

  • Yuval Ishai and Eyal Kushilevitz. On the Hardness of Information-Theoretic Multiparty Computation. Proc. of EUROCRYPT 2004.

  • Yuval Ishai, Joe Kilian, Kobbi Nissim, and Erez Petrank. Extending Oblivious Transfers Efficiently. Proc. of CRYPTO 2003.

  • Yuval Ishai, Amit Sahai, and David Wagner. Private Circuits: Protecting Hardware against Probing Attacks. (Revised version.) Proc. of CRYPTO 2003.

  • Ronald Cramer, Serge Fehr, Yuval Ishai, and Eyal Kushilevitz. Efficient Multi-party Computation over Rings. Proc. of EUROCRYPT 2003. A fuller version is available from the Cryptology ePrint Archives.

  • Jozsef Balogh, Janos Csirik, Yuval Ishai, and Eyal Kushilevitz. Private computation using a PEZ dispenser. Theoretical Computer Science 306(1-3): 69-84, 2003.

  • Amos Beimel, Yuval Ishai, Eyal Kushilevitz, and Jean-Francois Raymond. Breaking the O(n^{1/(2k-1)}) Barrier for Information-Theoretic Private Information Retrieval. Proc. of FOCS '02.

  • Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, and Tal Rabin. On Two-Round Secure Multiparty Computation. Proc. of the 22th Annual IACR Crypto conference (CRYPTO '02).

  • Yuval Ishai and Eyal Kushilevitz. Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials. Proc. of ICALP '02.

  • Ran Canetti, Yuval Ishai, Ravi Kumar, Mike Reiter, Ronitt Rubinfeld, and Rebecca Wright. Selective Private Function Evaluation with Applications to Private Statistics. Proc. of PODC '01.

  • Amos Beimel and Yuval Ishai. Information-Theoretic Private Information Retrieval: A Unified Construction. Proc. of ICALP '01. Full version available in General Constructions for Information-Theoretic Private Information Retrieval, Journal of Computer and System Sciences (JCSS), 71(2):213-247, 2005.

  • Joan Feigenbaum, Yuval Ishai, Tal Malkin, Kobbi Nissim, Martin Strauss, and Rebecca Wright. Secure Multiparty Computation of Approximations. Proc. of the 28th International Colloquium on Automata, Languages and Programming (ICALP '01). A fuller version is available from the Cryptology ePrint Archives.

  • Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, and Tal Rabin. The Round Complexity of Verifiable Secret-Sharing and Secure Multicast. Proc. of the 33rd ACM Symp. on the Theory of Computing (STOC '01).

  • Amos Beimel and Yuval Ishai. On the Power of Nonlinear Secret-Sharing. SIAM Journal on Discrete Mathematics 19(1):258-280, 2005. An earlier version appeared in Proc. of the Computational Complexity Conference (CCC), 2001.

  • William Aiello, Yuval Ishai, and Omer Reingold. Priced Oblivious Transfer: How to Sell Digital Goods. Proc. of the 19th Annual IACR Eurocrypt conference (EUROCRYPT '01). Fuller version.

  • Ran Canetti, Ivan Damgård, Stefan Dziembowski, Yuval Ishai, and Tal Malkin. On Adaptive vs. Non-Adaptive Security of Multiparty Protocols. Proc. of the 19th Annual IACR Eurocrypt conference (EUROCRYPT '01).

  • Yuval Ishai and Eyal Kushilevitz. Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation. Proc. of the 41st Annu. IEEE Symp. on Foundations of Computer Science (FOCS '00).

  • Amos Beimel, Yuval Ishai, and Tal Malkin. Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing. Journal of Cryptology 17(2), 2004, pages 125-151. An extended abstract appeared in Crypto '00.

  • Niv Gilboa and Yuval Ishai. Compressing Cryptographic Resources. Proc. of the 19th Annual IACR Crypto conference (CRYPTO '99).

  • Yuval Ishai and Eyal Kushilevitz. Improved Upper Bounds on Information Theoretic Private Information Retrieval. Proc. of the 31st ACM Symp. on the Theory of Computing (STOC '99). Full version available in General Constructions for Information-Theoretic Private Information Retrieval, Journal of Computer and System Sciences (JCSS), 71(2): 213-247, 2005.

  • Amos Beimel, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. One-Way Functions are Essential for Single-Server Private Information Retrieval. Proc. of the 31st ACM Symp. on the Theory of Computing (STOC '99).

  • Giovanni Di Crescenzo, Yuval Ishai, and Rafail Ostrovsky. Universal Service-Providers for Private Information Retrieval. Journal of Cryptology vol. 14(1), pp. 37-74. An extended abstract has appeared in Proc. of the 17th ACM Symp. on Principles of Distributed Computing (PODC '98).

  • Giovanni Di Crescenzo, Yuval Ishai, and Rafail Ostrovsky. Non-Interactive and Non-Malleable Commitment. Proc. of the 30th ACM Symp. on the Theory of Computing (STOC '98).

  • Yael Gertner, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. Protecting Data Privacy in Private Information Retrieval Schemes. Journal of Computer and System Sciences (JCSS) vol. 60(3) pp. 592-629. An extended abstract appeared in Proc. of the 30th ACM Symp. on the Theory of Computing (STOC '98).

  • Yuval Ishai and Eyal Kushilevitz. Private Simultaneous Messages Protocols with Applications. Proc. of the 5th Israel Symposium on Theory of Computing and Systems (ISTCS '97).

  • Benny Chor and Yuval Ishai. On Privacy and Partition Arguments. Information and Computation vol. 167(3), pp. 2-9. An extended abstract appeared in Proc. of the 4th Israel Symposium on Theory of Computing and Systems (ISTCS '96).

  • Martin Anthony, Peter Bartlett, Yuval Ishai, and John Shawe-Taylor. Valid Generalization from Approximate Interpolation. Combinatorics, Probability and Computing, vol. 5, pp. 191-214, 1996.

  • Yuval Ishai. Private Computation and Correlated Randomness. Ph.D. Thesis, Technion, Israel, 1999.

  • Yuval Ishai. Characterizing Perfect Privacy. M.Sc. Thesis, Technion, Israel, 1997.