Gilad Asharov Updated: October 23, 2014 School of Computer Science and Engineering The Hebrew University of Jerusalem Rothberg A402 Jerusalem Israel [email protected] www.cs.huji.ac.il/∼asharov Current Position The Hebrew University of Jerusalem Post-Doctoral Researcher Hosted by: Dr. Gil Segev April 2014 – current Research Interest My research interest is in the field of cryptography, with a focus on secure multiparty computation (MPC). My research concentrates on the question of feasibility. This includes the question of what cryptographic tasks can and cannot be realized under what cryptographic assumptions, and is related to theoretical foundations of cryptography. In particular, my main interest is in achieving fairness in secure computation. In addition, I am also interested in efficiency of MPC, and closing the gap between the theory and practice of MPC. This includes the design of new realistic models that enable constructions and protocols with high efficiency. I am also interested in the intersection between GameTheory and Cryptography. Education Bar-Ilan University Ph.D. in Computer Science Field of Research: Cryptography. Thesis: Foundations of Secure Computation: Perfect Security and Fairness. Advisor: Prof. Yehuda Lindell. Bar-Ilan University M.Sc. in Computer Science Field of Research: Cryptography. Thesis: Utility Dependence in Correct and Fair Rational Secret Sharing. Advisor: Prof. Yehuda Lindell. summa cum laude Bar-Ilan University B.Sc. in Computer Science magna cum laude 2009 – 2014 2008 – 2009 2002 – 2005 1 of 4 Employment History Academic: IBM Research, T. J. Watson Center, Hawthorne, New York Summer intern. Summer 2011 Industry: Mentor Graphics Inc., Herzliya, Israel Software Engineer. 2005 – 2009 Scholarships and Awards • ICORE-algo Postdoctoral fellowship, The Israeli Center of Research Excellence in Algorithms, 2014. • Rector’s prize for outstanding Ph.D. students, Bar-Ilan University, 2011. • President’s Scholarship for excellent Ph.D. students, Bar-Ilan University, 2010 – 2013. • Dean’s outstanding research students award, for achievements in studies and the research work, BarIlan University, 2009. • Dean’s Undergraduate List of Excellence, 2002–2004, faculty of exact sciences, Bar-Ilan University. Professional Activities More than 30 reviews in the following publications (external reviewer): TCC 2015, Eurocrypt 2015, Financial Crypto 2015, ACM CCS 2014, DISC 2014, SCN 2014, CRYPTO 2014, STOC 2014, Distributed Computing (journal), Journal of Applied Mathematics, ASIACRYPT 2013, ESORICS 2013, CRYPTO 2013, Eurocrypt 2013, TCC 2013, PKC 2013, Inscrypt 2012, SCN 2012, ICITS 2012, CANS 2012, ICALP 2012, CRYPTO 2012, TCC 2012, Journal of Cryptology, CRYPTO 2011, ICITS 2011, CT-RSA 2011 and CRYPTO 2010. Teaching Assistant (All in Bar-Ilan University) Data Structures (89-120) Spring 2010, 2011, 2012, 2013, 2014 Lecturer: Prof. Shmuel Tomi Klein (2010-2013), Prof. Amihood Amir (2014). Complexity (89-320) Lecturer: Dr. Yair Dombb. Fall 2012 Introduction to Cryptography (89-656) Lecturer: Prof. Yehuda Lindell. Fall 2009 Publications Book Chapter (Invited) 1. Gilad Asharov and Yehuda Lindell, The BGW Protocol for Perfectly-Secure Multiparty Computation. In Secure Multiparty Computation, M. Prabhakaran and A. Sahai (Ed.), Cryptology and Information Security Series, IOS Press. 2 of 4 Journal Publications 1. Gilad Asharov and Yehuda Lindell, A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation. In Journal of Cryptology (to appear) 2. Gilad Asharov and Yehuda Lindell, Utility Dependence in Correct and Fair Rational Secret Sharing. In Journal of Cryptology, Volume 24, Issue 1 (2011), Pages: 157–202. Publications in Refereed Conferences 1. Gilad Asharov, Towards Characterizing Complete Fairness in Secure Two-Party Computation. In TCC 2014, pages 291-316. 2. Gilad Asharov, Yehuda Lindell, Thomas Schneider and Michael Zohner, More Efficient Oblivious Transfer and Extensions for Faster Secure Computation. In ACM CCS 2013 – ACM Conference on Computer and Communications Security, pages 535548. 3. Gilad Asharov, Yehuda Lindell and Hila Zarosim, Fair and Efficient Secure Multiparty Computation with Reputation Systems. In ASIACRYPT 2013, pages 201-220. 4. Gilad Asharov, Yehuda Lindell and Tal Rabin, A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness. In TCC 2013, Springer (LNCS 7785), pages 243-262, 2013. 5. Gilad Asharov and Claudio Orlandi, Calling Out Cheaters: Covert Security With Public Verifiability. In ASIACRYPT 2012, Springer (LNCS 7658), pages 681-698, 2012. 6. Gilad Asharov, Abhishek Jain, Adriana L´opez-Alt, Eran Tromer, Vinod Vaikuntanathan and Daniel Wichs, Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. In EUROCRYPT 2012, Springer (LNCS 7237), pages 483–501. 7. Gilad Asharov, Yehuda Lindell and Tal Rabin, Perfectly-Secure Multiplication for any t < n/3. In CRYPTO 2011, Springer (LNCS 6841), pages 240–258, 2011. 8. Gilad Asharov, Ran Canetti and Carmit Hazay, Towards a Game Theoretic View of Secure Computation. In EUROCRYPT 2011, Springer (LNCS 6632), pages 426–445, 2011. (In submission to Journal of Cryptology) 9. Gilad Asharov and Yehuda Lindell, Utility Dependence in Correct and Fair Rational Secret Sharing. In CRYPTO 2009, Springer (LNCS 5677), pages 559–576, 2009. 3 of 4 Talks in Conferences and Seminars Towards Characterizing Complete Fairness in Secure Two-Party Computation. • Theory Lunch, computer science department, The Technion, Israel. March, 2014. • TCC 2014, University of California, San-Diego (UCSD), CA. February, 2014. • MIT Cryptography and Information Security Seminar, MIT CSAIL, Boston, MA. February 2014. • Boston University Cryptography Seminar, Boston, MA. February 2014. • NYU Cryptography Seminar, New-York University, NY. February, 2014. • GTACS – The Greater Tel-Aviv Area Cryptographic Seminar, Interdisciplinary Center, Herzliya, Israel. December, 2013. A Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness. • Theory Lunch, computer science department, The Technion, Israel. March, 2013. • TCC 2013, The University of Tokyo, Tokyo, Japan. March, 2013. • GTACS – The Greater Tel-Aviv Area Cryptographic Seminar, Interdisciplinary Center, Herzliya, Israel. February, 2013. Calling Out Cheaters: Covert Security with Public Verifiability. • Asiacrypt 2012, Beijing, China. December, 2012. Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. • Eurocrypt 2012, The University of Cambridge, England. April, 2012. • GTACS – The Greater Tel-Aviv Area Cryptographic Seminar, Tel-Aviv University, March, 2012. • Computer Science Seminar, Ben-Gurion University, Israel. February, 2012. Perfectly-Secure Multiplication for any t < n/3. • Computer Science Theory Seminar, The Hebrew University of Jerusalem, Israel. November, 2011. • CRYPTO 2011, Santa Barbara, California, USA. August, 2011. Towards a Game Theoretic View of Secure Computation. • Eurocrypt 2011, Tallinn, Estonia. May, 2011. • IBM Research, T. J. Watson Research Center, New-York, USA. March, 2011. • GTACS – The Greater Tel-Aviv Area Cryptographic Seminar, Bar-Ilan University, March, 2011. Utility Dependence in Correct and Fair Rational Secret Sharing. • Computer Science Seminar, The Open–University, Israel. March, 2011. • Guest lecturer at Cryptography and Game Theory course, Tel-Aviv University, Israel, December, 2009. Instructors: Ran Canetti and Alon Rozen. • CRYPTO 2009, Santa Barbara, California, USA. August, 2009. • Computer Science Seminar, Ben-Gurion University, Israel. June, 2009. • Tel-Aviv – Weizmann Cryptography Reading Group, Tel-Aviv University, Israel. April, 2009. 4 of 4
© Copyright 2024