scispace - formally typeset
D

Danny Harnik

Researcher at IBM

Publications -  84
Citations -  2800

Danny Harnik is an academic researcher from IBM. The author has contributed to research in topics: Data deduplication & Hash function. The author has an hindex of 23, co-authored 82 publications receiving 2617 citations. Previous affiliations of Danny Harnik include University of California, Los Angeles & Weizmann Institute of Science.

Papers
More filters
Proceedings ArticleDOI

Proofs of ownership in remote storage systems

TL;DR: In this article, the authors introduce the notion of proof of ownership (PoW) which allows a client to efficiently prove to a server that the client holds a file, rather than just some short information about it.
Journal ArticleDOI

Side Channels in Cloud Services: Deduplication in Cloud Storage

TL;DR: As the volume of data increases, so does the demand for online storage services, from simple backup services to cloud storage infrastructures, and cross-user deduplication is most effective when applied across multiple users.
Book ChapterDOI

Constant-Round Oblivious Transfer in the Bounded Storage Model

TL;DR: A constant round protocol for Oblivious Transfer in Maurer's bounded storage model that has only 5 messages and uses constructions of almost t-wise independent permutations, randomness extractors and averaging samplers from the theory of derandomization.
Proceedings ArticleDOI

On the Compressibility of NP Instances and Cryptographic Applications

TL;DR: The study of compression that preserves the solution to an instance of a problem rather than preserving the instance itself is initiated, and a new classification of NP is given with respect to compression, which forms a stratification of NP that is called the VC hierarchy.
Book ChapterDOI

OT-combiners via secure computation

TL;DR: This work introduces a new general approach for combining OTs by making a simple and modular use of protocols for secure computation, and obtains the first constant-rate OT-combiners in which the number of secure OTs being produced is a constant fraction of the total number of calls to the OT-candidates, while still tolerating a constant fractions of faulty candidates.