scispace - formally typeset
M

Moni Naor

Researcher at Weizmann Institute of Science

Publications -  348
Citations -  49941

Moni Naor is an academic researcher from Weizmann Institute of Science. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 102, co-authored 338 publications receiving 47090 citations. Previous affiliations of Moni Naor include IBM & Stanford University.

Papers
More filters
Book ChapterDOI

On robust combiners for oblivious transfer and other primitives

TL;DR: A (1, 2)-robust combiner is a construction that takes two candidate schemes for a cryptographic primitive and combines them into one scheme that securely implements the candidate schemes even if one of the candidates fails as discussed by the authors.
Journal ArticleDOI

Zaps and Their Applications

TL;DR: This work presents a zap for every language in NP, based on the existence of noninteractive zero-knowledge proofs in the shared random string model, and characterize theexistence of zaps in terms of a primitive called verifiable pseudorandom bit generators.
Patent

System and method for verifying signatures on documents

TL;DR: In this paper, a system and method for producing verified signatures on documents such as checks and affidavits is described, where a customer who is to obtain a verified signature, at some point in time, registers with a signatory authority, and a secret key, having public and private components, is established uniquely for that customer.
Journal ArticleDOI

Derandomized Constructions of k -Wise (Almost) Independent Permutations

TL;DR: In this paper, a pseudorandom generator is used to construct families of k-wise almost independent functions with an optimal description length up to a constant factor, where the distance from uniform for any k tuple should be at most δ, and the size of the description of a permutation in the family is O(kn+log 1/delta).
Proceedings ArticleDOI

Split-ballot voting: everlasting privacy with distributed trust

TL;DR: This paper formally proves the security of the protocol in the Universal Composability framework, based on number-theoretic assumptions, that has "everlasting privacy": even a computationally unbounded adversary gains no information about specific votes from observing the protocol's output.