Benny Pinkas |
|
I am interested in computer security, privacy and cryptography, and in particular in the design of efficient security systems based on sound assumptions and solid proofs.
During the 2011/2 academic year I was also on sabbatical at Google Research. I previously worked at the University of Haifa, at HP Labs in Haifa and in Princeton, and at STAR Lab, Intertrust Technologies. Before that I was a Ph.D. student of Moni Naor at the Foundations of Computer Science Group at the Department of Computer Science and Applied Math in the Weizmann Institute of Science.
Yaniv Ben-Itzhak, Helen Mollering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame and Avishay Yanai
ScionFL: Secure Quantized Aggregation for Federated Learning
[ arxiv
]
Gilad Asharov,
Koki Hamada,
Dai Ikarashi,
Ryo Kikuchi,
Ariel Nof,
Benny Pinkas,
Katsumi Takahashi
and Junichi Tomida
Efficient Secure Three-Party Sorting
with Applications to Data Analysis and Heavy Hitters
ACM CCS 2022
Daniel
Günther, Maurice Heymann, Benny Pinkas and Thomas Schneider
GPU-accelerated
PIR with Client-Independent Preprocessing for Large-Scale Applications
Usenix Security Symposium 2022
[ full paper
] [ proceedings version and presentation
]
Alin Tomescu, Adithya Bhat, Benny Applebaum, Ittai Abraham, Guy Gueta, Benny Pinkas, and Avishay Yanai
UTT: Decentralized Ecash with Accountable Privacy
[ paper
] [ project
]
Toshinori Araki, Jun Furukawa, Benny Pinkas, Kazuma Ohara, Hanan
Rosemarin and Hikaru Tsuchida
Secure
Graph Analysis at Scale
ACM CCS 2021
Gayathri
Garimella, Benny Pinkas, Mike Rosulek, Ni Trieu and Avishay Yanai
Oblivious
Key-Value Stores and Amplification for Private Set Intersection
Crypto 2021 [ paper
]
Shahar
Segal, Yossi Adi, Benny Pinkas, Carsten Baum, Chaya Ganesh and Joseph
Keshet
Fairness in the Eyes of the Data: Certifying Machine-Learning Models
The Fourth AAAI/ACM Conference on
Artificial
Intelligence, Ethics, and Society (AIES), 2021 [ paper
]
Daniel
Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas
and Thomas Schneider
PEM:
Privacy-preserving Epidemiological Modeling
[ paper
]
Ittai
Abraham, Benny Pinkas and Avishay Yanai
Blinder - Scalable, Robust Anonymous Committed Broadcast
ACM CCS 2020. [ paper
]
Jonathan Berger, Amit Klein
and Benny Pinkas
Flaw Label: Exploiting IPv6 Flow Label
IEEE S&P 2020. [ paper
]
Alin Tomescu, Robert Chen,
Yiming Zheng, Ittai Abraham, Benny Pinkas, Guy Golan Gueta and Srinivas
Devadas
Towards Scalable Threshold Cryptosystems
IEEE S&P 2020. [ paper
]
Benny Pinkas, Mike Rosulek,
Ni Trieu and Avishay Yanai
PSI from PaXoS: Fast, Malicious Private Set Intersection
Eurocrypt 2020. [ eprint
]
Moni Naor, Benny Pinkas and Eyal Ronen
Phillipp Schoppmann, Adria
Gascon, Mariana Raykova and Benny Pinkas
Make Some ROOM for the Zeros: Data Sparsity in Secure
Distributed Machine Learning
ACM CCS '2019. [ eprint
]
Benny Pinkas, Mike Rosulek, Ni Trieu and Avishay Yanai
SpOT-Light: Lightweight
Private Set Intersection from Sparse OT Extension
Crypto 2019. [ eprint
]
Amit Klein and Benny
Pinkas
From IP ID to Device ID and KASLR
Bypass
Usenix Security 2019.
[ slides
] [ proceedings
] [ Windows
vulnerability report, Linux
patch 1, Linux
patch 2, Linux
patch 3 ]
Benny Pinkas, Thomas
Schneider, Oleksandr Tkachenko and Avishay Yanai
Efficient Circuit-based PSI with Linear Communication
Eurocrypt 2019. [ eprint
]
Yehuda Lindell, Benny Pinkas,
Nigel Smart and Avishay Yanai
Efficient Constant-Round Computation Combining BMR and SPDZ
Journal of Cryptology 2019. [ springer
] [ eprint
]
Amit Klein and Benny Pinkas
DNS Cache-Based User Tracking
The Network and Distributed Security Symposium
(NDSS) 2019. [ proceedings
]
Koji Chida, Koki Hamada, Dai
Ikarashi, Ryo Kikuchi, and Benny Pinkas
High-Throughput Secure AES Computation
Workshop on Encrypted Computing and Applied
Homomorphic Cryptography '2018
Available files: [ proccedings
]
Roi
Inbar, Eran Omri and Benny Pinkas
Efficient Scalable Multiparty Private Set-Intersection
via Garbled Bloom Filters
SCN '2018
Available files: [ Springer
]
Tore
Fredriksen, Yehuda Lindel, Valery Oshether and Benny Pinkas
Fast Distributed RSA Key Generation for Semi-honest and
Malicious Adversaries
Crypto '2018
Available files: [ eprint
] [ blog
]
Yossi
Adi, Carsten Baum, Moustapha Cissé, Benny Pinkas and Joseph Keshet
Turning Your Weakness Into a Strength: Watermarking Deep
Neural Networks by Backdooring
Usenix Security '2018
Available files: [ arxiv]
[ blog
] [ slides
and video ]
Benny
Pinkas, Thomas Schneider, Christian Weinet and Udi Wieder
Efficient
Circuit-based PSI via Cuckoo Hashing
Eurocrypt '2018
Available files: [ eprint ]
Yotam
Harchol, Ittai Abraham and Benny Pinkas
Efficient
Distributed SSH Key Management with Proactive RSA Threshold Signatures
ACNS '2018
Available files: [ eprint ]
Tore
Fredriksen, Benny Pinkas, and Avishay Yanai
Committed
MPC - Maliciously Secure Multiparty Computation from Homomorphic
Commitments
PKC '2018
Available files: [ eprint ]
Benny Pinkas, Thomas Schneider and Michael Zohner
Scalable
Private Set Intersection Based on OT Extension
ACM Transactions on Privacy and Security 21(2): 7:1-7:35 (2018)
Available files: [ eprint
]
Vladimir
Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek and Ni Trieu
Practical
Multi-party Private Set Intersection from Symmetric Key Techniques
ACM CCS '2017
Available
files: [ eprint
]
Eyal
Kolman
and and
Benny Pinkas
Securely
Computing a Ground Speed Model
ACM
TIST 8(4), 2017
Available files: [ journal
]
Niv Drucker, Shay
Gueron and Benny Pinkas
Fasr
Secure Cloud Computations with a Trusted Proxy
IEEE
Security and Privacy magazine 15(6): 61-67, 2017
Agnes
Kiss,
Jian Liu, Thomas Schneider, N.
Asokan and Benny
Pinkas
Private
Set Intersection for Unequal Set Sizes with Mobile Applications
PoPETS
'2017
Available
files: [ eprint ]
Sandeep
Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas and N.
Asokan
The
Circle Game: Scalable Private Membership Test Using Trusted Hardware
Asia
CCS '2017
(recevied
an honorable
mention)
Available
files: [ arxiv ]
Ittai
Abraham, Christofpher W. Fletcher, Kartik
Nayak, Benny Pinkas and Ling Ren
An
Oblivious RAM with Sub-logarithmic Bandwidth Blowup
PKC 2017
Available files: [ eprint
]
David
W. Archer, Dan Bogdanov, Benny Pinkas and Pille Pullonen
Maturity
and Performance of Programmable Secure Computation
IEEE Security and Privacy Journal, Vol. 14, Issue 5, 2016.
Available files: [ eprint
]
Michael
Freedman, Carmit Hazay, Kobbi Nissim and Benny Pinkas
Efficient
Set Intersection with Simulation-based Security
J. Cryptology 29(1):115-155 (2016).
Shay
Gueron, Yehuda Lindell, Ariel Nof and Benny Pinkas
Fast
Garbling of Circuits Under Standard Assumptions
ACM CCS '2015 and J. Cryptology 31(3): 798-844 (2018)
Available files: [ eprint
]
Jian Liu,
N. Asokan and
Benny Pinkas
Secure
Deduplication of Encrypted Data without Additional Independent Servers
ACM CCS '2015
Available files: [ eprint
]
Yehuda
Lindell, Benny Pinkas, Nigel Smart and Avishay Yanai
Efficient
Constant Round Multi-party Computation Combining BMR and SPDZ
Crypto '2015
Available files: [ eprint
]
Benny
Pinkas, Thomas Schnedier, Gil Segev and Michael Zohner
Phasing:
Private Set Intersection Using Permutation-based Hashing
Usenix Security '2015
Available files: [ eprint]
Benny
Pinkas,
Thomas Schnedier and
Michael Zohner
Private
Set Intersection based on OT Extension
Usenix Security '2014.
Available files: [ eprint ]
Benny
Pinkas and Tzachy Reinman
A
Simple Recursive Tree Oblivious RAM
Available files: [ eprint ]
Arash
Afshar,
Payman Mohassel, Benny
Pinkas, and Ben Riva
Non-Interactive
Secure Computation Based on Cut-and-Choose
Eurocrypt '2014.
Available files: [ slides
]
Ayman
Jarrous and Benny Pinkas
Canon-MPC,
a system for casual non-interactive secure multi-party computation
using native client
Workshopon Privacy Enhancing Tchnologies (WPES) 2013.
Available files: [ pdf
]
Ayman
Jarrous
and Benny Pinkas
Secure
Computation of Functionalities based on Hamming Distance and its
Application to Computing Document Similarity
Interntional Journal
of Applied Cryptography
(IJACT) 3(1): 21-45 (2013).
Available files: [ pdf
]
Omer
Berkman,
Benny Pinkas and Moti
Yung
Firm
Grip Handshakes: a Tool for Bidirectional Vouching
CANS
2012, December 2012.
Available files: [ pdf
]
Shai Halevi,
Danny Harnik, Benny Pinkas and Alexandra Shulman-Peleg
Proofs of Ownership in Remote Storage Systems
Proceedings of the ACM Computer and Communications Security Conference
(ACM CCS), October 2011.
Available files: [ eprint
]
Yehuda Lindell,
Eli Oxman and Benny Pinkas
The IPS Compiler: Optimizations, Variants and Concrete
Efficiency
Crypto 2011, August 14-18 2011, Santa Barbara, CA.
Available files: [ eprint
]
Shai Halevi,
Yehuda Lindell and Benny Pinkas
Secure Computation on the Web: Computing without
Simultaneous Interaction
Crypto 2011, August 14-18 2011, Santa Barbara, CA.
Available files: [ eprint
]
Yehuda Lindell
and Benny Pinkas
Secure Two-Party Computation via Cut-and-Choose Oblivious
Transfer
Theory of Cryptography Conference (TCC), March 2011, Providence, RI.
Available files: [ eprint
]
Marc Fischlin,
Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider and Ivan Visconti
Secure Set Intersection with Untrusted Hardware Tokens
CT-RSA, February 2011, San Francisco, CA.
Available files: [ pdf
]
Benny Pinkas
Traitor tracing
Encyclopedia
of Cryptography and Security (2nd Ed.), pp. 1313-1316, 2011.
Danny Harnik,
Benny Pinkas and Alexandra Shulman-Peleg
Side
Channels in Cloud Services, the Case of Deduplication in Cloud Storage
IEEE Security and Privacy Magazine, special issue of Cloud Security,
Vol. 8, No. 2, pp. 40-47, 2010.
Available files: [ Older version
of paper ].
Moni Naor and
Benny Pinkas
Efficient Trace and Revoke Schemes
International Journal of Information Security, Springer-Verlag, Vol. 9,
No. 6, pp. 40-47, 2010.
Benny Pinkas and
Tzachy Reinman
Oblivious RAM Revisited
Crypto 2010, August 15-19 2010, Santa Barbara, CA.
Available files: [ eprint]
Mark Manulis,
Benny Pinkas and Bertram Poettering
Privacy-Preserving Group Discovery with Linear Complexity
8th Intl. Conf. on Applied Cryptography and Network Security (ACNS
2010), June 22-25 2010, Beijing, China.
Margarita
Osadchy, Benny Pinkas, Ayman Jarrous and Boaz Moskovich
SCiFI - A System for Secure Face Identification
(Received the best
paper award!)
31st IEEE Symposium on Security & Privacy, May 16-19, 2010,
Oakland, CA.
Available files: [ pdf, project and code
]
Gagan Aggarwal,
Nina Mishra and Benny Pinkas
Secure Computation of the Median (and Other Elements of
Specified Ranks)
Journal of Cryptology, Vol. 23, No. 3, pp. 373-401. Online since
February 05, 2010.
Available files: [
Springer ]
Ayman
Jarrous and Benny Pinkas
Secure Hamming Distance
based Computation and its Applications
(Best student paper award!)
Proceedings of the International Conference
on Applied Cryptography and Network Security (ACNS),
June 2009.
Available files: [ pdf
]
Advertisement: check the web site of Gila Stopler ���� ������
Last
updated: October 2022.