20042023

Research activity per year

Search results

  • 2023

    Incompressiblity and Next-Block Pseudoentropy

    Haitner, I., Mazor, N. & Silbak, J., 1 Jan 2023, 14th Innovations in Theoretical Computer Science Conference, ITCS 2023. Kalai, Y. T. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 66. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 251).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    From Fairness to Full Security in Multiparty Computation

    Cohen, R., Haitner, I., Omri, E. & Rotem, L., Jan 2022, In: Journal of Cryptology. 35, 1, 4.

    Research output: Contribution to journalArticlepeer-review

    5 Scopus citations
  • Highly Efficient OT-Based Multiplication Protocols

    Haitner, I., Makriyannis, N., Ranellucci, S. & Tsfadia, E., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 180-209 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Lower Bound on SNARGs in the Random Oracle Model

    Haitner, I., Nukrai, D. & Yogev, E., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). Springer Science and Business Media Deutschland GmbH, p. 97-127 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13509 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On the complexity of fair coin flipping

    Haitner, I., Makriyannis, N. & Omri, E., 7 May 2022, In: Theoretical Computer Science. 914, p. 23-38 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • On the complexity of two-party differential privacy

    Haitner, I., Mazor, N., Silbak, J. & Tsfadia, E., 6 Sep 2022, STOC 2022 - Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing. Leonardi, S. & Gupta, A. (eds.). Association for Computing Machinery, p. 1392-1405 14 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    4 Scopus citations
  • On the Round Complexity of Randomized Byzantine Agreement

    Cohen, R., Haitner, I., Makriyannis, N., Orland, M. & Samorodnitsky, A., Apr 2022, In: Journal of Cryptology. 35, 2, 10.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • TIGHTER BOUNDS ON MULTIPARTY COIN FLIPPING VIA AUGMENTED WEAK MARTINGALES AND DIFFERENTIALLY PRIVATE SAMPLING

    Beimel, A., Haitner, I., Makriyannis, N. & Omri, E., 2022, In: SIAM Journal on Computing. 51, 4, p. 1126-1171 46 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    2 Scopus citations
  • 2020

    A tight lower bound on adaptively secure full-information coin flip

    Haitner, I. & Karidi-Heller, Y., Nov 2020, Proceedings - 2020 IEEE 61st Annual Symposium on Foundations of Computer Science, FOCS 2020. IEEE Computer Society, p. 1268-1276 9 p. 9317971. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2020-November).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    11 Scopus citations
  • A tight parallel repetition theorem for partially simulatable interactive arguments via smooth kl-divergence

    Berman, I., Haitner, I. & Tsfadia, E., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 544-573 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12172 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Computational two-party correlation: A dichotomy for key-agreement protocols

    Haitner, I., Nissim, K., Omri, E., Shaltiel, R. & Silbak, J., 2020, In: SIAM Journal on Computing. 49, 6, p. 1041-1082 42 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    2 Scopus citations
  • Inaccessible Entropy II: IE Functions and Universal One-Way Hashing

    Haitner, I., Holenstein, T., Reingold, O., Vadhan, S. & Wee, H., 2020, In: Theory of Computing. 16, p. 1-55 55 p., 8.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    1 Scopus citations
  • Lower bounds on the time/memory tradeoff of function inversion

    Chawin, D., Haitner, I. & Mazor, N., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 305-334 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12552 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • On the round complexity of the shuffle model

    Beimel, A., Haitner, I., Nissim, K. & Stemmer, U., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 683-712 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12551 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • 2019

    Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation

    Haitner, I., Mazor, N., Shaltiel, R. & Silbak, J., 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). Springer, p. 531-560 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11891 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Distributional collision resistance beyond one-way functions

    Bitansky, N., Haitner, I., Komargodski, I. & Yogev, E., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 667-695 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Hardness-Preserving Reductions via Cuckoo Hashing

    Berman, I., Haitner, I., Komargodski, I. & Naor, M., 15 Apr 2019, In: Journal of Cryptology. 32, 2, p. 361-392 32 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    6 Scopus citations
  • On the communication complexity of key-agreement protocols

    Haitner, I., Mazor, N., Oshman, R., Reingold, O. & Yehudayoff, A., 1 Jan 2019, 10th Innovations in Theoretical Computer Science, ITCS 2019. Blum, A. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 40. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 124).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • On the round complexity of randomized byzantine agreement

    Cohen, R., Haitner, I., Makriyannis, N., Orland, M. & Samorodnitsky, A., Oct 2019, 33rd International Symposium on Distributed Computing, DISC 2019. Suomela, J. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 17 p. 12. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 146).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • 2018

    Characterization of Secure Multiparty Computation Without Broadcast

    Cohen, R., Haitner, I., Omri, E. & Rotem, L., 1 Apr 2018, In: Journal of Cryptology. 31, 2, p. 587-609 23 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    8 Scopus citations
  • Coin Flipping of Any Constant Bias Implies One-Way Functions

    Berman, I., Haitner, I. & Tentes, A., 13 Mar 2018, In: Journal of the ACM. 65, 3, 14.

    Research output: Contribution to journalArticlepeer-review

    8 Scopus citations
  • Computational two-party correlation: A dichotomy for key-agreement protocols

    Haitner, I., Nissim, K., Omri, E., Shaltiel, R. & Silbak, J., 30 Nov 2018, Proceedings - 59th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2018. Thorup, M. (ed.). IEEE Computer Society, p. 136-147 12 p. 8555100. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2018-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    8 Scopus citations
  • From fairness to full security in multiparty computation

    Cohen, R., Haitner, I., Omri, E. & Rotem, L., 2018, Security and Cryptography for Networks - 11th International Conference, SCN 2018, Proceedings. Catalano, D. & De Prisco, R. (eds.). Springer Verlag, p. 216-234 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11035 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • On the complexity of fair coin flipping

    Haitner, I., Makriyannis, N. & Omri, E., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Beimel, A. & Dziembowski, S. (eds.). Springer Verlag, p. 539-562 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Tighter bounds on multi-party coin flipping via augmented weak martingales and differentially private sampling

    Beimel, A., Haitner, I., Makriyannis, N. & Omri, E., 30 Nov 2018, Proceedings - 59th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2018. Thorup, M. (ed.). IEEE Computer Society, p. 838-849 12 p. 8555162. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2018-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    16 Scopus citations
  • 2017

    An almost-optimally fair three-party coin-flipping protocol

    Haitner, I. & Tsfadia, E., 2017, In: SIAM Journal on Computing. 46, 2, p. 479-542 64 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    13 Scopus citations
  • Fair coin flipping: Tighter analysis and the many-party case

    Buchbinder, N., Haitner, I., Levi, N. & Tsfadia, E., 2017, 28th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2017. Klein, P. N. (ed.). Association for Computing Machinery, p. 2580-2600 21 p. (Proceedings of the Annual ACM-SIAM Symposium on Discrete Algorithms; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    22 Scopus citations
  • The many entropies in one-way functions

    Haitner, I. & Vadhan, S., 2017, Information Security and Cryptography. 9783319570471 ed. Springer International Publishing, p. 159-217 59 p. (Information Security and Cryptography; vol. 0, no. 9783319570471).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

    7 Scopus citations
  • 2016

    Characterization of secure multiparty computation without broadcast

    Cohen, R., Haitner, I., Omri, E. & Rotem, L., 2016, Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer Verlag, p. 596-616 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    11 Scopus citations
  • Limits on the Usefulness of Random Oracles

    Haitner, I., Omri, E. & Zarosim, H., 1 Apr 2016, In: Journal of Cryptology. 29, 2, p. 283-335 53 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    14 Scopus citations
  • 2015

    Finding collisions in interactive protocols - Tight lower bounds on the round and communication complexities of statistically hiding commitments

    Haitner, I., Hoch, J. J., Reingold, O. & Segev, G., 2015, In: SIAM Journal on Computing. 44, 1, p. 193-242 50 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    33 Scopus citations
  • From Non-adaptive to Adaptive Pseudorandom Functions

    Berman, I. & Haitner, I., Apr 2015, In: Journal of Cryptology. 28, 2, p. 297-311 15 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    4 Scopus citations
  • Parallel hashing via list recoverability

    Haitner, I., Ishai, Y., Omri, E. & Shaltiel, R., 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Proceedings. Robshaw, M. & Gennaro, R. (eds.). Springer Verlag, p. 173-190 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    18 Scopus citations
  • 2014

    An almost-optimally fair three-party coin-flipping protocol

    Haitner, I. & Tsfadia, E., 2014, STOC 2014 - Proceedings of the 2014 ACM Symposium on Theory of Computing. Association for Computing Machinery, p. 408-416 9 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    19 Scopus citations
  • A new interactive hashing theorem

    Haitner, I. & Reingold, O., Jan 2014, In: Journal of Cryptology. 27, 1, p. 109-138 30 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    2 Scopus citations
  • Coin flipping of any constant bias implies one-way functions

    Berman, I., Haitner, I. & Tentes, A., 2014, STOC 2014 - Proceedings of the 2014 ACM Symposium on Theory of Computing. Association for Computing Machinery, p. 398-407 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • Coin flipping with conStant bias implies one-way functions

    Haitner, I. & Omri, E., 2014, In: SIAM Journal on Computing. 43, 2, p. 389-409 21 p.

    Research output: Contribution to journalArticlepeer-review

    13 Scopus citations
  • 2013

    A parallel repetition theorem for any interactive argument

    Haitner, I., 2013, In: SIAM Journal on Computing. 42, 6, p. 2487-2501 15 p.

    Research output: Contribution to journalArticlepeer-review

    5 Scopus citations
  • Efficiency improvements in constructing pseudorandom generators from one-way functions

    Haitner, I., Reingold, O. & Vadhan, S., 2013, In: SIAM Journal on Computing. 42, 3, p. 1405-1430 26 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    30 Scopus citations
  • Hardness preserving reductions via cuckoo hashing

    Berman, I., Haitner, I., Komargodski, I. & Naor, M., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 40-59 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    12 Scopus citations
  • Limits on the usefulness of random oracles

    Haitner, I., Omri, E. & Zarosim, H., 2013, Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Proceedings. p. 437-456 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7785 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    10 Scopus citations
  • 2012

    From non-adaptive to adaptive pseudorandom functions

    Berman, I. & Haitner, I., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 357-368 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    11 Scopus citations
  • On the instantiability of hash-and-sign RSA signatures

    Dodis, Y., Haitner, I. & Tentes, A., 2012, Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Proceedings. p. 112-132 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7194 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    22 Scopus citations
  • 2011

    Black-box constructions of protocols for secure computation

    Haitner, I., Ishai, Y., Kushilevitz, E., Lindell, Y. & Petrank, E., 2011, In: SIAM Journal on Computing. 40, 2, p. 225-266 42 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    36 Scopus citations
  • Coin flipping with constant bias implies one-way functions

    Haitner, I. & Omri, E., 2011, Proceedings - 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, FOCS 2011. p. 110-119 10 p. 6108156. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • On the power of the randomized iterate

    Haitner, I., Harnik, D. & Reingold, O., 2011, In: SIAM Journal on Computing. 40, 6, p. 1486-1528 43 p.

    Research output: Contribution to journalArticlepeer-review

    20 Scopus citations
  • 2010

    A new sampling protocol and applications to basing cryptographic primitives on the hardness of NP

    Haitner, I., Mahmoody, M. & Xiao, D., 2010, Proceedings - 25th Annual IEEE Conference on Computational Complexity, CCC 2010. IEEE Computer Society, p. 76-87 12 p. 5497895. (Proceedings of the Annual IEEE Conference on Computational Complexity).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • Bounded key-dependent message security

    Barak, B., Haitner, I., Hofheinz, D. & Ishai, Y., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 423-444 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    99 Scopus citations
  • Efficiency improvements in constructing pseudorandom generators from one-way functions

    Haitner, I., Reingold, O. & Vadhan, S., 2010, STOC'10 - Proceedings of the 2010 ACM International Symposium on Theory of Computing. p. 437-446 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    48 Scopus citations
  • Universal one-way hash functions via inaccessible entropy

    Haitner, I., Holenstein, T., Reingold, O., Vadhan, S. & Wee, H., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 616-637 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    23 Scopus citations