#### Filter Results:

- Full text PDF available (39)

#### Publication Year

2004

2017

- This year (2)
- Last 5 years (13)
- Last 10 years (33)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev
- 48th Annual IEEE Symposium on Foundations of…
- 2007

We study the round complexity of various cryptographic protocols. Our main result is a tight lower bound on the round complexity of any fully-black-box construction of a statistically-hiding commitment scheme from oneway permutations, and even front trapdoor permutations. This lower bound matches the round complexity of the statistically-hiding commitment… (More)

- Boaz Barak, Iftach Haitner, Dennis Hofheinz, Yuval Ishai
- EUROCRYPT
- 2009

We construct the rst public-key encryption scheme that is proven secure (in the standard model, under standard assumptions) even when the attacker gets access to encryptions of arbitrary ecient functions of the secret key. Specically, under either the DDH or LWE assumption , and for arbitrary but xed polynomials L and N , we obtain a public-key encryption… (More)

- Iftach Haitner, Omer Reingold
- IACR Cryptology ePrint Archive
- 2006

We give a construction of statistically-hiding commitment schemes (ones where the hiding propertyholds information theoretically), based on the minimal cryptographic assumption that one-way functions exist. Our construction employs two-phase commitment schemes, recently constructed by Nguyen, Ong and Vadhan (FOCS '06), and universal one-way hash functions… (More)

- Itay Berman, Iftach Haitner, Ilan Komargodski, Moni Naor
- Electronic Colloquium on Computational Complexity
- 2012

A common method for increasing the usability and uplifting the security of pseudorandom function families (PRFs) is to " hash " the inputs into a smaller domain before applying the PRF. This approach, known as " Levin's trick " , is used to achieve " PRF domain extension " (using a short, e.g., fixed, input length PRF to get a variable-length PRF), and more… (More)

- Iftach Haitner, Danny Harnik, Omer Reingold
- SIAM J. Comput.
- 2005

We consider two of the most fundamental theorems in Cryptography. The first, due to Håstad et al. [HILL99], is that pseudorandom generators can be constructed from any one-way function. The second due to Yao [Yao82] states that the existence of weak one-way functions (i.e. functions on which every efficient algorithm fails to invert with some noticeable… (More)

- Iftach Haitner, Minh-Huyen Nguyen, Shien Jin Ong, Omer Reingold, Salil P. Vadhan
- SIAM J. Comput.
- 2009

We give a construction of statistically hiding commitment schemes (those in which the hiding property holds against even computationally unbounded adversaries) under the minimal complexity assumption that one-way functions exist. Consequently, one-way functions suffice to give statistical zero-knowledge arguments for any NP statement (whereby even a… (More)

- Iftach Haitner, Eran Omri, Hila Zarosim
- Journal of Cryptology
- 2013

In their seminal work, Impagliazzo and Rudich (STOC’89) showed that no key-agreement protocol exists in the random-oracle model, yielding that key agreement cannot be black-box reduced to one-way functions. In this work, we generalize their result, showing that, to a large extent, no-private-input, semi-honest, two-party functionalities that can be securely… (More)

- Iftach Haitner, Jonathan J. Hoch, Gil Segev
- TCC
- 2007

We study the communication complexity of single-server Private Information Retrieval (PIR) protocols that are based on fundamental cryptographic primitives in a black-box manner. In this setting, we establish a tight lower bound on the number of bits communicated by the server in any polynomially-preserving construction that relies on trapdoor permutations.… (More)

- Iftach Haitner, Eliad Tsfadia
- STOC
- 2014

In a multiparty <i>fair</i> coin-flipping protocol, the parties output a common (close to) unbiased bit, even when some corrupted parties try to bias the output. Cleve [STOC 1986] has shown that in the case of dishonest majority (i.e., at least half of the parties can be corrupted), in <i>any m</i>-round coin-flipping protocol, the corrupted parties can… (More)

- Iftach Haitner, Thomas Holenstein
- IACR Cryptology ePrint Archive
- 2008

We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following separation results that hold both in the private and in the public key settings: – Let H be the family of poly(n)-wise independent hash-functions. There exists no fully-black-box… (More)