Benny Pinkas |
![]() |
|
I am interested in computer security, privacy and cryptography, and in particular in the design of efficient security systems based on sound assumptions and solid proofs.
During the 2011/2 academic year I was also on sabbatical at Google Research. I previously worked at the University of Haifa, at HP Labs in Haifa and in Princeton, and at STAR Lab, Intertrust Technologies. Before that I was a Ph.D. student of Moni Naor at the Foundations of Computer Science Group at the Department of Computer Science and Applied Math in the Weizmann Institute of Science.
Jonathan Berger, Amit Klein and Benny Pinkas
Flaw Label: Exploiting IPv6 Flow Label
IEEE S&P 2020. [ paper
]
Alin Tomescu, Robert Chen, Yiming Zheng, Ittai Abraham, Benny Pinkas, Guy Golan Gueta and Srinivas Devadas
Towards Scalable Threshold Cryptosystems
IEEE S&P 2020. [ paper
]
Benny Pinkas, Mike Rosulek, Ni Trieu and Avishay Yanai
PSI from PaXoS: Fast, Malicious Private Set Intersection
Eurocrypt 2020. [ eprint
]
Moni Naor, Benny Pinkas and Eyal Ronen
Phillipp Schoppmann, Adria
Gascon, Mariana Raykova and Benny Pinkas
Make Some ROOM for the Zeros: Data Sparsity in Secure
Distributed Machine Learning
ACM CCS '2019. [ eprint
]
Benny Pinkas, Mike Rosulek, Ni Trieu and Avishay Yanai
SpOT-Light: Lightweight
Private Set Intersection from Sparse OT Extension
Crypto 2019. [ eprint
]
Amit Klein and Benny Pinkas
From IP ID to Device ID and KASLR Bypass
Usenix Security 2019. [ slides ] [ proceedings ] [ Windows vulnerability report, Linux patch 1, Linux patch 2, Linux patch 3 ]
Benny Pinkas, Thomas
Schneider, Oleksandr Tkachenko and Avishay Yanai
Efficient Circuit-based PSI with Linear Communication
Eurocrypt 2019. [ eprint
]
Yehuda Lindell, Benny Pinkas, Nigel Smart and Avishay Yanai
Efficient Constant-Round Computation Combining BMR and SPDZ
Journal of Cryptology 2019. [ springer
] [ eprint
]
Amit Klein and Benny Pinkas
DNS Cache-Based User Tracking
The Network and Distributed Security Symposium
(NDSS) 2019. [ proceedings
]
Koji Chida, Koki Hamada, Dai
Ikarashi, Ryo Kikuchi, and Benny Pinkas
High-Throughput Secure AES Computation
Workshop on Encrypted Computing and Applied
Homomorphic Cryptography '2018
Available files: [ proccedings
]
Roi
Inbar, Eran Omri and Benny Pinkas
Efficient Scalable Multiparty Private Set-Intersection
via Garbled Bloom Filters
SCN '2018
Available files: [ Springer
]
Tore
Fredriksen, Yehuda Lindel, Valery Oshether and Benny Pinkas
Fast Distributed RSA Key Generation for Semi-honest and
Malicious Adversaries
Crypto '2018
Available files: [ eprint
] [ blog
]
Yossi
Adi, Carsten Baum, Moustapha Cissé, Benny Pinkas and Joseph Keshet
Turning Your Weakness Into a Strength: Watermarking Deep
Neural Networks by Backdooring
Usenix Security '2018
Available files: [ arxiv]
[ blog
] [ slides
and video ]
Benny
Pinkas, Thomas Schneider, Christian Weinet and Udi Wieder
Efficient
Circuit-based PSI via Cuckoo Hashing
Eurocrypt '2018
Available files: [ eprint ]
Yotam
Harchol, Ittai Abraham and Benny Pinkas
Efficient
Distributed SSH Key Management with Proactive RSA Threshold Signatures
ACNS '2018
Available files: [ eprint ]
Tore
Fredriksen, Benny Pinkas, and Avishay Yanai
Committed
MPC - Maliciously Secure Multiparty Computation from Homomorphic
Commitments
PKC '2018
Available files: [ eprint ]
Benny Pinkas, Thomas Schneider and Michael Zohner
Scalable
Private Set Intersection Based on OT Extension
ACM Transactions on Privacy and Security 21(2): 7:1-7:35 (2018)
Available files: [ eprint
]
Vladimir
Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek and Ni Trieu
Practical
Multi-party Private Set Intersection from Symmetric Key Techniques
ACM CCS '2017
Available
files: [ eprint
]
Eyal Kolman
and and
Benny Pinkas
Securely
Computing a Ground Speed Model
ACM
TIST 8(4), 2017
Available files: [ journal
]
Niv Drucker, Shay
Gueron and Benny Pinkas
Fasr
Secure Cloud Computations with a Trusted Proxy
IEEE
Scurity and Privacy magazine 15(6): 61-67, 2017
Agnes Kiss,
Jian Liu, Thomas Schneider, N.
Asokan and Benny
Pinkas
Private
Set Intersection for Unequal Set Sizes with Mobile Applications
PoPETS
'2017
Available
files: [ eprint ]
Sandeep
Tamrakar, Jian Liu, Andrew Paverd, Jan-Erik Ekberg, Benny Pinkas and N.
Asokan
The
Circle Game: Scalable Private Membership Test Using Trusted Hardware
Asia
CCS '2017
(recevied
an honorable
mention)
Available
files: [ arxiv ]
Ittai
Abraham, Christofpher W. Fletcher, Kartik
Nayak, Benny Pinkas and Ling Ren
An
Oblivious RAM with Sub-logarithmic Bandwidth Blowup
PKC 2017
Available files: [ eprint
]
David
W. Archer, Dan Bogdanov, Benny Pinkas and Pille Pullonen
Maturity
and Performance of Programmable Secure Computation
IEEE Security and Privacy Journal, Vol. 14, Issue 5, 2016.
Available files: [ eprint
]
Michael
Freedman, Carmit Hazay, Kobbi Nissim and Benny Pinkas
Efficient
Set Intersection with Simulation-based Security
J. Cryptology 29(1):115-155 (2016).
Shay
Gueron, Yehuda Lindell, Ariel Nof and Benny Pinkas
Fast
Garbling of Circuits Under Standard Assumptions
ACM CCS '2015 and J. Cryptology 31(3): 798-844 (2018)
Available files: [ eprint
]
Jian Liu,
N. Asokan and
Benny Pinkas
Secure
Deduplication of Encrypted Data without Additional Independent Servers
ACM CCS '2015
Available files: [ eprint
]
Yehuda
Lindell, Benny Pinkas, Nigel Smart and Avishay Yanai
Efficient
Constant Round Multi-party Computation Combining BMR and SPDZ
Crypto '2015
Available files: [ eprint
]
Benny
Pinkas, Thomas Schnedier, Gil Segev and Michael Zohner
Phasing:
Private Set Intersection Using Permutation-based Hashing
Usenix Security '2015
Available files: [ eprint]
Benny Pinkas,
Thomas Schnedier and
Michael Zohner
Private
Set Intersection based on OT Extension
Usenix Security '2014.
Available files: [ eprint ]
Benny
Pinkas and Tzachy Reinman
A
Simple Recursive Tree Oblivious RAM
Available files: [ eprint ]
Arash Afshar,
Payman Mohassel, Benny
Pinkas, and Ben Riva
Non-Interactive
Secure Computation Based on Cut-and-Choose
Eurocrypt '2014.
Available files: [ slides
]
Ayman
Jarrous and Benny Pinkas
Canon-MPC,
a system for casual non-interactive secure multi-party computation
using native client
Workshopon Privacy Enhancing Tchnologies (WPES) 2013.
Available files: [ pdf
]
Ayman Jarrous
and Benny Pinkas
Secure
Computation of Functionalities based on Hamming Distance and its
Application to Computing Document Similarity
Interntional Journal
of Applied Cryptography
(IJACT) 3(1): 21-45 (2013).
Available files: [ pdf
]
Omer Berkman,
Benny Pinkas and Moti
Yung
Firm
Grip Handshakes: a Tool for Bidirectional Vouching
CANS
2012, December 2012.
Available files: [ pdf
]
Shai Halevi,
Danny Harnik, Benny Pinkas and Alexandra Shulman-Peleg
Proofs of Ownership in Remote Storage Systems
Proceedings of the ACM Computer and Communications Security Conference
(ACM CCS), October 2011.
Available files: [ eprint
]
Yehuda Lindell,
Eli Oxman and Benny Pinkas
The IPS Compiler: Optimizations, Variants and Concrete
Efficiency
Crypto 2011, August 14-18 2011, Santa Barbara, CA.
Available files: [ eprint
]
Shai Halevi,
Yehuda Lindell and Benny Pinkas
Secure Computation on the Web: Computing without
Simultaneous Interaction
Crypto 2011, August 14-18 2011, Santa Barbara, CA.
Available files: [ eprint
]
Yehuda Lindell
and Benny Pinkas
Secure Two-Party Computation via Cut-and-Choose Oblivious
Transfer
Theory of Cryptography Conference (TCC), March 2011, Providence, RI.
Available files: [ eprint
]
Marc Fischlin,
Benny Pinkas, Ahmad-Reza Sadeghi, Thomas Schneider and Ivan Visconti
Secure Set Intersection with Untrusted Hardware Tokens
CT-RSA, February 2011, San Francisco, CA.
Available files: [ pdf
]
Benny Pinkas
Traitor tracing
Encyclopedia
of Cryptography and Security (2nd Ed.), pp. 1313-1316, 2011.
Danny Harnik,
Benny Pinkas and Alexandra Shulman-Peleg
Side
Channels in Cloud Services, the Case of Deduplication in Cloud Storage
IEEE Security and Privacy Magazine, special issue of Cloud Security,
Vol. 8, No. 2, pp. 40-47, 2010.
Available files: [ Older version
of paper ].
Moni Naor and
Benny Pinkas
Efficient Trace and Revoke Schemes
International Journal of Information Security, Springer-Verlag, Vol. 9,
No. 6, pp. 40-47, 2010.
Benny Pinkas and
Tzachy Reinman
Oblivious RAM Revisited
Crypto 2010, August 15-19 2010, Santa Barbara, CA.
Available files: [ eprint]
Mark Manulis,
Benny Pinkas and Bertram Poettering
Privacy-Preserving Group Discovery with Linear Complexity
8th Intl. Conf. on Applied Cryptography and Network Security (ACNS
2010), June 22-25 2010, Beijing, China.
Margarita
Osadchy, Benny Pinkas, Ayman Jarrous and Boaz Moskovich
SCiFI - A System for Secure Face Identification
(Received the best
paper award!)
31st IEEE Symposium on Security & Privacy, May 16-19, 2010,
Oakland, CA.
Available files: [ pdf, project and code
]
Gagan Aggarwal,
Nina Mishra and Benny Pinkas
Secure Computation of the Median (and Other Elements of
Specified Ranks)
Journal of Cryptology, Vol. 23, No. 3, pp. 373-401. Online since
February 05, 2010.
Available files: [
Springer ]
Ayman
Jarrous and Benny Pinkas
Secure Hamming Distance
based Computation and its Applications
(Best student paper award!)
Proceedings of the International Conference
on Applied Cryptography and Network Security (ACNS),
June 2009.
Available files: [ pdf
]
Advertisement: check the web site of Gila Stopler ���� ������
Last
updated: May 2020.