Oblivious Transfer
In cryptography, an oblivious transfer (OT) protocol is a type of protocol in which a sender transfers one of potentially many pieces of information to a receiver, but remains oblivious as to what piece (if any) has been transferred. The first form of oblivious transfer was introduced in 1981 by Michael O. Rabin. In this form, the sender sends a message to the receiver with probability 1/2, while the sender remains oblivious as to whether or not the receiver received the message. Rabin's oblivious transfer scheme is based on the RSA cryptosystem. A more useful form of oblivious transfer called 1–2 oblivious transfer or "1 out of 2 oblivious transfer", was developed later by Shimon Even, Oded Goldreich, and Abraham Lempel, in order to build protocols for secure multiparty computation. It is generalized to "1 out of ''n'' oblivious transfer" where the user gets exactly one database element without the server getting to know which element was queried, and without the user know ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), adversarial behavior. More generally, cryptography is about constructing and analyzing Communication protocol, protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing, physics, and others. Core concepts related to information security (confidentiality, data confidentiality, data integrity, authentication, and non-repudiation) are also central to cryptography. Practical applications of cryptography include electronic commerce, Smart card#EMV, chip-based payment cards, digital currencies, password, computer passwords, and military communications. ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Rabin Encryption
The Rabin cryptosystem is a family of public-key encryption schemes based on a trapdoor function whose security, like that of RSA, is related to the difficulty of integer factorization. The Rabin trapdoor function has the advantage that inverting it has been mathematically proven to be as hard as factoring integers, while there is no such proof known for the RSA trapdoor function. It has the disadvantage that each output of the Rabin function can be generated by any of four possible inputs; if each output is a ciphertext, extra complexity is required on decryption to identify which of the four possible inputs was the true plaintext. Naive attempts to work around this often either enable a chosen-ciphertext attack to recover the secret key or, by encoding redundancy in the plaintext space, invalidate the proof of security relative to factoring. Public-key encryption schemes based on the Rabin trapdoor function are used mainly for examples in textbooks. In contrast, RSA is the bas ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Sven Laur
Sven is a Scandinavian masculine first name. In Old Norse the meaning was "young man" or "servant" and the original Old Norse spelling was ''sveinn''. Variants such as '' Svend'' are found in Danish and Norwegian. Another variant, ''Svein'' is used only in the Low Countries and German-speaking countries, and is cognate with the English surname ''Swain''. In medieval Swedish, ''sven'' or ''sven av vapen'' "sven of arms", is a term for squire. The female equivalent, Svenja, though seemingly Dutch and Scandinavian, is not common anywhere outside of German-speaking countries. Sven can also be spelled with a "w" - Swen - but is pronounced as Sven. The Icelandic version is ''Sveinn'' (); the Faroese version is Sveinur (). Entertainment and music * Sven Einar Englund (1916–1999), Finnish composer * Sven Epiney (born 1972), Swiss television, radio host and editor * Sven Grünberg (born 1956), Estonian synthesizer and progressive rock composer and musician * Sven August Körli ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Omer Reingold
Omer Reingold () is an Israeli computer scientist. He is the Rajeev Motwani professor of computer science in the Computer Science Department at Stanford University and the director of thSimons Collaboration on the Theory of Algorithmic Fairness He received a PhD in computer science at Weizmann in 1998 under Moni Naor. He received the 2005 Grace Murray Hopper Award for his work in finding a deterministic logarithmic-space algorithm for st-connectivity in undirected graphs. He, along with Avi Wigderson and Salil Vadhan, won the Gödel Prize (2009) for their work on the zig-zag product. He became a Fellow of the Association for Computing Machinery in 2014 ''"For contributions to the study of pseudorandomness, derandomization, and cryptography Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (crypto ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Yuval Ishai
Yuval (), also known as Kfar Yuval, is a moshav in northern Israel. Located in the Galilee Panhandle between Metula and the city of Kiryat Shmona, it is at the border with Lebanon and falls under the jurisdiction of Mevo'ot HaHermon Regional Council. In it had a population of . Archaeology Kfar Yuval was established on the land of the Palestinian depopulated village of al-Zūq al-Fauqānī During the Roman period, al-Zūq al-Fauqānī was called Golgol. The toponym ''Golgol'' is attested in a Late Roman boundary stone inscription discovered at Abil al-Qamḥ, and was preserved has in the Arabic ''Juneijil'' (جنيجل) near al-Zūq al-Fauqānī. Golgol has been previously misidentified with Tall al-ʿAjūl, near Abil al-Qamh, whose name is unrelated linguistically to the Roman toponym. Archaeological finds at al-Zūq al-Fauqānī point to active occupation during the Roman and Byzantine periods. Excavations have revealed a burial cave from the 2nd to 4th centuries CE, ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
William Aiello
William is a masculine given name of Germanic origin. It became popular in England after the Norman conquest in 1066,All Things William"Meaning & Origin of the Name"/ref> and remained so throughout the Middle Ages and into the modern era. It is sometimes abbreviated "Wm." Shortened familiar versions in English include Will or Wil, Wills, Willy, Willie, Bill, Billie, and Billy. A common Irish form is Liam. Scottish diminutives include Wull, Willie or Wullie (as in Oor Wullie). Female forms include Willa, Willemina, Wilma and Wilhelmina. Etymology William is related to the German given name ''Wilhelm''. Both ultimately descend from Proto-Germanic ''*Wiljahelmaz'', with a direct cognate also in the Old Norse name ''Vilhjalmr'' and a West Germanic borrowing into Medieval Latin ''Willelmus''. The Proto-Germanic name is a compound of *''wiljô'' "will, wish, desire" and *''helmaz'' "helm, helmet".Hanks, Hardcastle and Hodges, ''Oxford Dictionary of First Names'', Oxford Univers ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Benny Pinkas
Benny or Bennie is a given name or a shortened version of the given name Benjamin or, less commonly, Benedict, Bennett, Benito, Benson, Bernice, Ebenezer, Benansio/Benancio or Bernard. People Bennie Given name * Bennie M. Bunn (1907–1943), American Marine officer, Navy Cross recipient *Bennie Cunningham (1954–2018), American retired National Football League player *Bennie Daniels (born 1932), American former Major League Baseball pitcher * Bennie L. Davis (1928–2012), United States Air Force general and commander-in-chief of Strategic Air Command *Bennie Ellender (1925–2011), American college football player and head coach * Bennie Goods (born 1968), American retired Canadian Football League player *Bennie Green (1923–1977), American jazz trombonist and bandleader * Bennie Logan (born 1989), American National Football League player *Bennie Maupin (born 1940), American jazz musician *Bennie Muller (born 1938), Dutch former footballer * Bennie Purcell (1929–2016), ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Moni Naor
Moni Naor () is an Israeli computer scientist, currently a professor at the Weizmann Institute of Science. Naor received his Ph.D. in 1989 at the University of California, Berkeley. His advisor was Manuel Blum. He works in various fields of computer science, mainly the foundations of cryptography. He is notable for initiating research on public key systems secure against chosen ciphertext attack and creating non-malleable cryptography, visual cryptography (with Adi Shamir), and suggesting various methods for verifying that users of a computer system are human (leading to the notion of CAPTCHA). His research on Small-bias sample space, give a general framework for combining small k-wise independent spaces with small \epsilon-biased spaces to obtain \delta-almost k-wise independent spaces of small size. In 1994 he was the first, with Amos Fiat, to formally study the problem of practical broadcast encryption. Along with Benny Chor, Amos Fiat, and Benny Pinkas, he made a cont ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Rafail Ostrovsky
Rafail Ostrovsky is a distinguished professor of computer science and mathematics at University of California, Los Angeles, UCLA and a well-known researcher in algorithms and cryptography. Biography Rafail Ostrovsky received his Ph.D. from Massachusetts Institute of Technology, MIT in 1992. He is a member of the editorial board of Algorithmica Editorial Board of Journal of Cryptologand Editorial and Advisory Board of the International Journal of Information and Computer Securit Awards * 2022 W. Wallace McDowell Award "for visionary contributions to computer security theory and practice, including foreseeing new cloud vulnerabilities and then pioneering corresponding novel solutions" * 2021 AAAS Fellow * 2021 Fellow of the Association for Computing Machinery "for contributions to the foundations of cryptography" * 2019 Academia Europaea Foreign Member * 2018 RSA Award for Excellence in Mathematics "for contributions to the theory and to new variants of secure multi-party comput ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Eyal Kushilevitz
Eyal (; ''lit.'' strength) is a kibbutz in the Central District of Israel. Located close to the Green line, it falls under the jurisdiction of the Drom HaSharon Regional Council. In it had a population of . Geography Eyal is located in central Israel within the green line in the central Sharon region, and just to the east of Highway 6. It is approximately 6 km north-east of the city of Kfar Saba. Just to its north-east is the city of Kokhav Ya'ir, and west of the city of Tzur Yigal. To its north-west is the Israeli Arab city of Tira, and to its south is the Palestinian city of Qalqilyah. History Eyal was established in 1949 by Nahal volunteers. Israel sought to establish security settlements along its borders, and Eyal was established on what was then the Jordanian border. It is just north of the West Bank town of Qalqilyah. Attractions Keren Sahar Vintage Auto Museum houses a collection of vintage cars, featuring British automobiles from the 1930s and 1940s. Saslov ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Tal Malkin
Tal Geula Malkin (; born 1970) is an Israeli-American cryptographer who works as a professor of computer science at Columbia University, where she heads the Cryptography Lab and the Data Science Institute Cybersecurity Center. Education and career Malkin graduated summa cum laude from Bar-Ilan University in 1993, with a bachelor's degree in mathematics and computer science. She earned a master's degree in computer science from Weizmann Institute of Science in 1995, with the master's thesis ''Deductive Tableaux for Temporal Logic'' supervised by Amir Pnueli, and completed a Ph.D. in 2000 at the Massachusetts Institute of Technology with the dissertation ''A Study of Secure Database Access and General Two-Party Computation'' supervised by Shafi Goldwasser. As a doctoral student, she also worked as an intern for IBM Research at the Thomas J. Watson Research Center, and as a research scientist for AT&T Labs, continuing there through 2002. In 2003 she joined Columbia University as an ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |