# Oded Goldreich

Weizmann Institute of Science

Author pages are created from data sourced from our academic publisher partnerships and public sources.

- Publications
- Influence

Private information retrieval

- B. Chor, Oded Goldreich, E. Kushilevitz, M. Sudan
- Computer Science
- Proceedings of IEEE 36th Annual Foundations of…
- 23 October 1995

We describe schemes that enable a user to access k replicated copies of a database (k/spl ges/2) and privately retrieve information stored in the database. This means that each individual database… Expand

How to play ANY mental game

- Oded Goldreich, S. Micali, A. Wigderson
- Computer Science
- STOC '87
- 1987

We present a polynomial-time algorithm that, given as a input the description of a game with incomplete information and any number of players, produces a protocol for playing the game that leaks no… Expand

A hard-core predicate for all one-way functions

- Oded Goldreich, L. Levin
- Mathematics, Computer Science
- STOC '89
- 1 February 1989

A central tool in constructing pseudorandom generators, secure encryption functions, and in other areas are “hard-core” predicates <italic>b</italic> of functions (permutations) ƒ, discovered in… Expand

How to construct random functions

- Oded Goldreich, S. Goldwasser, S. Micali
- Mathematics, Computer Science
- JACM
- 10 August 1986

A constructive theory of randomness for functions, based on computational complexity, is developed, and a pseudorandom function generator is presented. This generator is a deterministic… Expand

Private information retrieval

- B. Chor, E. Kushilevitz, Oded Goldreich, M. Sudan
- Computer Science
- JACM
- 1 November 1998

Publicly accessible databases are an indispensable resource for retrieving up-to-date information. But they also pose a significant risk to the privacy of the user, since a curious database operator… Expand

The Foundations of Cryptography - Volume 2: Basic Applications

- Oded Goldreich
- Computer Science, Materials Science
- 2001

An electric heating device is provided for internally cooking and/or heating a meat product and an associated bakery product. The device is insertable into the center of the meat product so that the… Expand

Property testing and its connection to learning and approximation

- Oded Goldreich, S. Goldwasser, D. Ron
- Mathematics, Computer Science
- JACM
- 1 July 1998

In this paper, we consider the question of determining whether a function <italic>f</italic> has property P or is ε-far from any function with property P. A <italic>property testing</italic>… Expand

On the (Im)possibility of Obfuscating Programs

- B. Barak, Oded Goldreich, +4 authors K. Yang
- Computer Science
- CRYPTO
- 19 August 2001

Informally, an obfuscator O is an (efficient, probabilistic) "compiler" that takes as input a program (or circuit) P and produces a new program O(P) that has the same functionality as P yet is… Expand

Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems

- Oded Goldreich, S. Micali, A. Wigderson
- Computer Science, Mathematics
- JACM
- 1 July 1991

In this paper the generality and wide applicability of Zero-knowledge proofs, a notion introduced by Goldwasser, Micali, and Rackoff is demonstrated. These are probabilistic and interactive proofs… Expand

How to play any mental game, or a completeness theorem for protocols with honest majority

- Oded Goldreich, S. Micali, A. Wigderson
- Mathematics, Computer Science
- Providing Sound Foundations for Cryptography
- 2019

Permission to copy without fee all or part of this material is granted provided that the copies are not made or Idistributed for direct commercial advantage, the ACM copyright notice and the title of… Expand