scispace - formally typeset
B

Benny Pinkas

Researcher at Bar-Ilan University

Publications -  156
Citations -  23468

Benny Pinkas is an academic researcher from Bar-Ilan University. The author has contributed to research in topics: Secure multi-party computation & Secure two-party computation. The author has an hindex of 64, co-authored 156 publications receiving 21122 citations. Previous affiliations of Benny Pinkas include Hebrew University of Jerusalem & VMware.

Papers
More filters
Book ChapterDOI

Efficient Private Matching and Set Intersection

TL;DR: In this paper, the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain, was considered and protocols based on the use of homomorphic encryption and balanced hashing were proposed.

Efficient private matching and set intersection

TL;DR: This work considers the problem of computing the intersection of private datasets of two parties, where the datasets contain lists of elements taken from a large domain, and presents protocols, based on the use of homomorphic encryption and balanced hashing, for both semi-honest and malicious environments.
Book ChapterDOI

Privacy Preserving Data Mining

TL;DR: In this paper, the authors introduce the concept of privacy preserving data mining, where two parties owning confidential databases wish to run a data mining algorithm on the union of their databases, without revealing any unnecessary information.
Proceedings Article

Fairplay—a secure two-party computation system

TL;DR: Fairplay is introduced, a full-fledged system that implements generic secure function evaluation (SFE) and provides a test-bed of ideas and enhancements concerning SFE, whether by replacing parts of it, or by integrating with it.
Proceedings ArticleDOI

Multicast security: a taxonomy and some efficient constructions

TL;DR: A taxonomy of multicast scenarios on the Internet and an improved solution to the key revocation problem are presented, which can be regarded as a 'midpoint' between traditional message authentication codes and digital signatures.