scispace - formally typeset
B

Benny Pinkas

Researcher at Bar-Ilan University

Publications -  156
Citations -  23468

Benny Pinkas is an academic researcher from Bar-Ilan University. The author has contributed to research in topics: Secure multi-party computation & Secure two-party computation. The author has an hindex of 64, co-authored 156 publications receiving 21122 citations. Previous affiliations of Benny Pinkas include Hebrew University of Jerusalem & VMware.

Papers
More filters
Journal Article

Privacy preserving data mining

TL;DR: This paper introduces the concept of privacy preserving data mining, and presents a solution that is considerably more efficient than generic solutions, and demonstrates that secure multi-party computation can be made practical, even for complex problems and large inputs.
Journal ArticleDOI

Secure Multiparty Computation for Privacy-Preserving Data Mining

TL;DR: In this article, the basic paradigms and notions of secure mul-tiparty computation and their relevance to the field of privacy-preserving data mining are surveyed and discussed, as well as the relationship between secure multiparty computations and privacy preserving data mining.
Proceedings ArticleDOI

FairplayMP: a system for secure multi-party computation

TL;DR: This work presents FairplayMP, a system for secure multi-party computation that supplements the Fairplay system and modified the BMR protocol in a novel way and considerably improved its performance by using the Ben-Or-Goldwasser-Wigderson (BGW) protocol for the purpose of constructing gate tables.
Proceedings ArticleDOI

Proofs of ownership in remote storage systems

TL;DR: In this article, the authors introduce the notion of proof of ownership (PoW) which allows a client to efficiently prove to a server that the client holds a file, rather than just some short information about it.
Journal ArticleDOI

Side Channels in Cloud Services: Deduplication in Cloud Storage

TL;DR: As the volume of data increases, so does the demand for online storage services, from simple backup services to cloud storage infrastructures, and cross-user deduplication is most effective when applied across multiple users.