Follow
S. Dov Gordon
S. Dov Gordon
Verified email at gmu.edu - Homepage
Title
Cited by
Cited by
Year
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
4402014
A group signature scheme from lattice assumptions
SD Gordon, J Katz, V Vaikuntanathan
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
2982010
Rational secret sharing, revisited
SD Gordon, J Katz
Security and Cryptography for Networks: 5th International Conference, SCN …, 2006
2672006
Secure two-party computation in sublinear (amortized) time
SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2062012
Complete fairness in secure two-party computation
SD Gordon, C Hazay, J Katz, Y Lindell
Journal of the ACM (JACM) 58 (6), 1-37, 2011
2062011
Partial fairness in secure two-party computation
SD Gordon, J Katz
Journal of cryptology 25 (1), 14-40, 2012
1322012
Constant-round MPC with fairness and guarantee of output delivery
S Dov Gordon, FH Liu, E Shi
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
1022015
Secure computation with differentially private access patterns
S Mazloom, SD Gordon
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
682018
Multi-client verifiable computation with stronger security guarantees
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
682015
Complete fairness in multi-party computation without an honest majority
SD Gordon, J Katz
Theory of Cryptography Conference, 19-35, 2009
582009
On complete primitives for fairness
D Gordon, Y Ishai, T Moran, R Ostrovsky, A Sahai
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
562010
Multi-input functional encryption
SD Gordon, J Katz, FH Liu, E Shi, HS Zhou
Cryptology ePrint Archive, 2013
542013
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
J Alwen, M Barbosa, P Farshim, R Gennaro, SD Gordon, S Tessaro, ...
Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013
492013
Two-party private set intersection with an untrusted third party
PH Le, S Ranellucci, SD Gordon
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
452019
Secure computation with low communication from cross-checking
SD Gordon, S Ranellucci, X Wang
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
442018
Simple and efficient two-server ORAM
SD Gordon, J Katz, X Wang
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
40*2018
Secure computation of MIPS machine code
X Wang, SD Gordon, A McIntosh, J Katz
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
372016
Multi-party computation of polynomials and branching programs without simultaneous interaction
SD Gordon, T Malkin, M Rosulek, H Wee
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
372013
Compressed oblivious encoding for homomorphically encrypted search
SG Choi, D Dachman-Soled, SD Gordon, L Liu, A Yerukhimovich
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
242021
Secure parallel computation on national scale volumes of data
S Mazloom, PH Le, S Ranellucci, SD Gordon
29th USENIX Security Symposium (USENIX Security 20), 2487-2504, 2020
242020
The system can't perform the operation now. Try again later.
Articles 1–20