Niv Gilboa
Department of Computer Science
Ben-Gurion
University of the Negev
Alon Building for High-Tech (Building 37),
Room 225 P.O.B. 653 Beer-Sheva 84105 Israel Phone:
+972-8-6428116 Fax: +972-8-6477650
Selected publications
- E. Boyle, N. Chandran, N. Gilboa, D. Gupta, Y. Ishai, N. Kumar, M. Rathee, "Function Secret Sharing for Mixed Mode and Fixed-Point Secure Computation", Eurocrypt'21, pp. 871-900, full version pdf.
- D. Boneh, E. Boyle, H. Corrigan-Gibbs, N. Gilboa, Y. Ishai, "Lightweight Techniques for Private Heavy Hitters", Security and Privacy'21, full version pdf.
- E. Boyle, G. Couteau, N. Gilboa, Y. Ishai, L. Kohl, P. Scholl, "Correlated Pseudorandom Functions from Variable-Density LPN", FOCS'20, pp. 1069-1080, full version pdf.
- E. Boyle, N. Gilboa, Y. Ishai, "Secure Computation with Preprocessing via Function Secret Sharing", Theory of Cryptography Conference (TCC'19), pp. 341-371, full version pdf.
- E. Boyle, N. Gilboa, Y. Ishai, A. Nof, "Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs", ACM-CCS'19, pp. 869-886, full version pdf.
- E. Boyle, G. Couteau, N. Gilboa, Y. Ishai, L. Kohl, P. Rindal, P. Scholl, "Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation", ACM-CCS'19, pp. 291-308, full version pdf.
- A. Ovadya, R. Ogen, Y. Mallah, N. Gilboa and Y. Oren, "Cross-Router Covert Channels", In 13th {USENIX} Workshop on Offensive Technologies ({WOOT} 19) 2019, pdf.
- E. Boyle, G. Couteau, N. Gilboa, Y. Ishai, L. Kohl, P. Scholl, "Efficient Pseudorandom Correlation Generators: Silent OT Extension and More", Crypto'19, pp. 489-518, full version pdf.
- D. Boneh, E. Boyle, H. Corrigan-Gibbs, N. Gilboa, Y. Ishai, "Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs", Crypto'19, pp. 67-97, full version pdf.
- B. Amos, N. Gilboa, A. Levy, "Spectre without Shared Memory", ACM Symposium on Applied Computing (SAC) 2019, pp. 1944-1951, pdf.
- E. Boyle, G. Couteau, N. Gilboa, Y. Ishai, "Compressing Vector OLE", ACM-CCS'18, pp. 896-912, pdf.
- E. Boyle, N. Gilboa, Y. Ishai, H. Lin, S. Tessaro "Foundations of Homomorphic Secret Sharing", ITCS'18, pdf.
- N. Struckmann, Y. Sandoval, N. Har’el, F. Chen, S. Fan, J. Cinkelj, G. Berginc, P. Chronz, N. Gilboa, G. Scalosub, K. Meth and J. Kennedy, “MIKELANGELO: MIcro KErneL virtualizAtioN for hiGh pErfOrmance cLOud and HPC Systems”, European Conference on Service-Oriented and Cloud Computing, pp. 175-180, 2017, Publisher link.
- D. Brownstein, S. Dolev, N. Gilboa, "Broadcast Encryption with Both Temporary and Permanent Revocation", Stabilization, Safety, and Security of Distributed Systems (SSS'17), pp. 469-483 , pdf.
- E. Boyle, G. Couteau, N. Gilboa, Y. Ishai, M. Orru, "Homomorphic Secret Sharing: Optimizations and Applications", ACM-CCS'17, pp. 2105-2122, pdf.
- E. Boyle, N. Gilboa, Y. Ishai, "Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation", Eurocrypt'17, pp. 163-193, full version pdf.
- E. Boyle, N. Gilboa, Y. Ishai, "Function Secret Sharing - Improvements and Extensions", ACM-CCS'16, pp. 1292-1303, full version pdf.
- E. Boyle, N. Gilboa, Y. Ishai, "Breaking the Circuit Size Barrier for Secure Computation under DDH", Crypto'15, pp. 509-539, pdf.
- E. Boyle, N. Gilboa, Y. Ishai, "Function Secret Sharing", Eurocrypt'15, pp. 337-367, pdf.
- N. Gilboa, Y. Ishai, "Distributed Point Functions and Their Applications", Eurocrypt'14, pp. 640-658, pdf.
- S. Dolev, J. Garay, N. Gilboa, V. Kolesnikov, Y. Yuditsky, "Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract)", ACNS 2013, pp. 69-83, pdf.
- S. Dolev, J. Garay, N. Gilboa, V. Kolesnikov, "Secret Sharing Krohn-Rhodes: Private and Perennial Distributed Computation", Second Annual ACM Innovations in Computer Science 2011, pp. 32-44, 2011, pdf.
- O. Hermoni, N. Gilboa, E .Felstaine, S. Shitrit "Deniability - an Alibi for Users in P2P Networks", COMSWARE'08, pp. 310-317, pdf.
- N. Gilboa "Two Party RSA Key Generation", Crypto'99 pp. 116-129, pdf.
- B. Chor, N. Gilboa "Computationally Private Information Retrieval", PROC. Of 29th STOC (1997) pp. 303-313, pdf.
|