scispace - formally typeset
I

Ilan Komargodski

Researcher at Hebrew University of Jerusalem

Publications -  111
Citations -  1472

Ilan Komargodski is an academic researcher from Hebrew University of Jerusalem. The author has contributed to research in topics: Computer science & Secret sharing. The author has an hindex of 21, co-authored 96 publications receiving 1110 citations. Previous affiliations of Ilan Komargodski include Weizmann Institute of Science & Cornell University.

Papers
More filters
Book ChapterDOI

OptORAMa: Optimal Oblivious RAM.

TL;DR: The O(n) algorithm improves the previously best known deterministic or randomized algorithms whose running time is improved and presents the first secure ORAM with \documentclass[12pt]{minimal} \usepackage{amsmath} \usedpackage{wasysym} \use package{amsbsy} £1,000,000 á¬2,500,ì3,000 \setlength{\oddsidemargin}{-
Book ChapterDOI

Continuous Verifiable Delay Functions

TL;DR: Boneh et al. as mentioned in this paper introduced the notion of continuous verifiable delay functions (cVDFs), which are iteratively verifiable and can be efficiently verified in time independent of t.
Proceedings ArticleDOI

One-Way Functions and (Im)Perfect Obfuscation

TL;DR: Barak et al. as mentioned in this paper show that if P ≠ NP and program obfuscation is possible, then one-way functions exist, and if P ⊄ ioBPP and there is an efficient (even imperfect) indistinguishability obfuscator, then there are oneway functions.
Proceedings ArticleDOI

Improved Average-Case Lower Bounds for DeMorgan Formula Size

TL;DR: An explicit function h is given such that every deMorgan formula of size n3-o(1)/r2 agrees with h on at most a fraction of 1/2+2-Ω(r) of the inputs, which improves the previous average-case lower bound of Komargodski and Raz (STOC, 2013).
Journal ArticleDOI

Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions

TL;DR: A general transformation is presented that simultaneously relies on weaker assumptions and guarantees stronger security and can be extended to a super-constant number of inputs assuming that the underlying single-input scheme is sub-exponential secure.