Search results

  • 2020

    On the Power of Secure Two-Party Computation

    Hazay, C. & Venkitasubramaniam, M., 1 Jan 2020, In: Journal of Cryptology. 33, 1, p. 271-318 48 p.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • The Price of Active Security in Cryptographic Protocols

    Hazay, C., Venkitasubramaniam, M. & Weiss, M., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 184-215 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions?

    Hazay, C., Pass, R. & Venkitasubramaniam, M., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 599-619 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2019

    Constant-Round Maliciously Secure Two-Party Computation in the RAM Model

    Hazay, C. & Yanai, A., 1 Oct 2019, In: Journal of Cryptology. 32, 4, p. 1144-1199 56 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    2 Scopus citations
  • Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    Hazay, C., Mikkelsen, G. L., Rabin, T., Toft, T. & Nicolosi, A. A., 15 Apr 2019, In: Journal of Cryptology. 32, 2, p. 265-323 59 p.

    Research output: Contribution to journalArticlepeer-review

    57 Scopus citations
  • Fast actively secure five-party computation with security beyond abort

    Byali, M., Patra, A., Hazay, C. & Singla, S., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1573-1590 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    10 Scopus citations
  • Fast Actively Secure Five-Party Computation with Security Beyond Abort

    Hazay, C., Byali, M., Patra, P. & Singla, S., 2019, Proceedings of the ACM Conference on Computer and Communications Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Leviosa: Lightweight secure arithmetic computation

    Hazay, C., Marcedone, A., Ishai, Y. & Venkitasubramaniam, M., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 327-344 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    32 Scopus citations
  • On Black-Box Complexity of Universally Composable Security in the CRS Model

    Hazay, C. & Venkitasubramaniam, M., 15 Jul 2019, In: Journal of Cryptology. 32, 3, p. 635-689 55 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    1 Scopus citations
  • What Security Can We Achieve Within 4 Rounds?

    Hazay, C. & Venkitasubramaniam, M., 1 Oct 2019, In: Journal of Cryptology. 32, 4, p. 1200-1262 63 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • 2018

    Concretely efficient large-scale MPC with active security (or, tinykeys for TinyOT)

    Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E., 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 86-117 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)

    Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E., 2018, ASIACRYPT.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs

    Hazay, C., 1 Apr 2018, In: Journal of Cryptology. 31, 2, p. 537-586 50 p.

    Research output: Contribution to journalArticlepeer-review

    27 Scopus citations
  • Outsourced pattern matching

    Faust, S., Hazay, C. & Venturi, D., 1 Jun 2018, In: International Journal of Information Security. 17, 3, p. 327-346 20 p.

    Research output: Contribution to journalArticlepeer-review

    6 Scopus citations
  • Round-optimal fully black-box zero-knowledge arguments from one-way permutations

    Hazay, C. & Venkitasubramaniam, M., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Verlag, p. 263-285 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations,

    Hazay, C. & Venkitasubramaniam, M., 2018, TCC.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Round-optimal secure multi-party computation

    Halevi, S., Hazay, C., Polychroniadou, A. & Venkitasubramaniam, M., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 488-520 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10992 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    23 Scopus citations
  • TinyKeys: A new approach to efficient multi-party computation

    Hazay, C., Orsini, E., Scholl, P. & Soria-Vazquez, E., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Shacham, H. & Boldyreva, A. (eds.). Springer Verlag, p. 3-33 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10993 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    23 Scopus citations
  • 2017

    Actively secure garbled circuits with constant communication overhead in the plain model

    Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer Verlag, p. 3-39 37 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    17 Scopus citations
  • Constant round adaptively secure protocols in the tamper-proof hardware model

    Hazay, C., Polychroniadou, A. & Venkitasubramaniam, M., 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Fehr, S. (ed.). Springer Verlag, p. 428-460 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10175 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Efficient One-Sided Adaptively Secure Computation

    Hazay, C. & Patra, A., 1 Jan 2017, In: Journal of Cryptology. 30, 1, p. 321-371 51 p.

    Research output: Contribution to journalArticlepeer-review

    3 Scopus citations
  • Ligero: Lightweight sublinear arguments without a trusted setup

    Ames, S., Hazay, C., Ishai, Y. & Venkitasubramaniam, M., 30 Oct 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2087-2104 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    263 Scopus citations
  • Ligero: Lightweight Sublinear Arguments Without a Trusted Setup

    Hazay, C., Ames, S., Ishai, Y. & Venkitasubramaniam, M., 2017, CCS.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Low cost constant round MPC combining BMR and oblivious transfer

    Hazay, C., Scholl, P. & Soria-Vazquez, E., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Takagi, T. & Peyrin, T. (eds.). Springer Verlag, p. 598-628 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10624 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    57 Scopus citations
  • Scalable multi-party private set-intersection

    Hazay, C. & Venkitasubramaniam, M., 2017, Public-Key Cryptography – PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. Fehr, S. (ed.). Springer Verlag, p. 175-203 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    85 Scopus citations
  • 2016

    Automata Evaluation and Text Search Protocols with Simulation-Based Security

    Gennaro, R., Hazay, C. & Sorensen, J. S., 1 Apr 2016, In: Journal of Cryptology. 29, 2, p. 243-282 40 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    3 Scopus citations
  • Composable adaptive secure protocols without setup under polytime assumptions

    Hazay, C. & Venkitasubramaniam, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 400-432 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Composable security in the tamper-proof hardware model under minimal complexity

    Hazay, C., Polychroniadou, A. & Venkitasubramaniam, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 367-399 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Constant-round maliciously secure two-party computation in the RAM model

    Hazay, C. & Yanai, A., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 521-553 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Efficient Set Intersection with Simulation-Based Security

    Freedman, M. J., Hazay, C., Nissim, K. & Pinkas, B., 1 Jan 2016, In: Journal of Cryptology. 29, 1, p. 115-155 41 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    104 Scopus citations
  • Leakage-Resilient Cryptography from Minimal Assumptions

    Hazay, C., López-Alt, A., Wee, H. & Wichs, D., 1 Jul 2016, In: Journal of Cryptology. 29, 3, p. 514-551 38 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    19 Scopus citations
  • On the power of secure two-party computation

    Hazay, C. & Venkitasubramaniam, M., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 397-429 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    21 Scopus citations
  • Signature Schemes Secure Against Hard-to-Invert Leakage

    Faust, S., Hazay, C., Nielsen, J. B., Nordholt, P. S. & Zottarel, A., 1 Apr 2016, In: Journal of Cryptology. 29, 2, p. 422-455 34 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    7 Scopus citations
  • The feasibility of outsourced database search in the plain model

    Hazay, C. & Zarosim, H., 2016, Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. De Prisco, R. & Zikas, V. (eds.). Springer Verlag, p. 313-332 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • Toward a Game Theoretic View of Secure Computation

    Asharov, G., Canetti, R. & Hazay, C., 1 Oct 2016, In: Journal of Cryptology. 29, 4, p. 879-926 48 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    6 Scopus citations
  • What security can we achieve within 4 rounds?

    Hazay, C. & Venkitasubramaniam, M., 2016, Security and Cryptography for Networks - 10th International Conference, SCN 2016, Proceedings. De Prisco, R. & Zikas, V. (eds.). Springer Verlag, p. 486-505 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2015

    Adaptively secure computation with partial erasures

    Hazay, C., Lindell, Y. & Patra, A., 21 Jul 2015, PODC 2015 - Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery, p. 291-300 10 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing; vol. 2015-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Adaptively Secure Computation with Partial Erasures

    Patra, A., Hazay, C. & Lindell, Y., 2015.

    Research output: Contribution to conferencePaperpeer-review

  • Oblivious polynomial evaluation and secure set-intersection from algebraic PRFs

    Hazay, C., 2015, Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Proceedings. Dodis, Y. & Nielsen, J. B. (eds.). Springer Verlag, p. 90-120 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    30 Scopus citations
  • On black-box complexity of universally composable security in the CRS model

    Hazay, C. & Venkitasubramaniam, M., 2015, Advances in Cryptology – ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Iwata, T. & Cheon, J. H. (eds.). Springer Verlag, p. 183-209 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • On Black-Box Complexity of Universally Composable Security in the CRS model

    Hazay, C. & Venkitasubramaniam, M., 2015, ASIACRYPT. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Selective opening security for receivers

    Hazay, C., Patra, A. & Warinschi, B., 2015, Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, 2015, Proceedings. Cheon, J. H. & Iwata, T. (eds.). Springer Verlag, p. 443-469 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9452).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    28 Scopus citations
  • 2014

    Computationally secure pattern matching in the presence of malicious adversaries

    Hazay, C. & Toft, T., Apr 2014, In: Journal of Cryptology. 27, 2, p. 358-395 38 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    31 Scopus citations
  • One-sided adaptively secure two-party computation

    Hazay, C. & Patra, A., 2014, Theory of Cryptography - 11th Theory of Cryptography Conference, TCC 2014, Proceedings. Springer Verlag, p. 368-393 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8349 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • One-Sided Adaptively Secure Two-Party Computation

    Hazay, C. & Patra, A., 2014, TCC. Springer Berlin Heidelberg

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Two-dimensional parameterized matching

    Cole, R., Hazay, C., Lewenstein, M. & Tsur, D., 30 Oct 2014, In: ACM Transactions on Algorithms. 11, 2, p. 1-30 30 p.

    Research output: Contribution to journalArticlepeer-review

    7 Scopus citations
  • 2013

    Leakage-resilient cryptography from minimal assumptions

    Hazay, C., López-Alt, A., Wee, H. & Wichs, D., 2013, Advances in Cryptology, EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 160-176 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7881 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    39 Scopus citations
  • Outsourced pattern matching

    Faust, S., Hazay, C. & Venturi, D., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Proceedings. PART 2 ed. p. 545-556 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7966 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    24 Scopus citations
  • Outsourced Pattern Matching

    Faust, S., Hazay, C. & Venturi, D., 2013, ICALP.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    Distributed public key schemes secure against continual leakage

    Akavia, A., Goldwasser, S. & Hazay, C., 2012, PODC'12 - Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing. p. 155-164 10 p. (Proceedings of the Annual ACM Symposium on Principles of Distributed Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.