Eyal Kushilevitz
Technion – Israel Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Eyal Kushilevitz.
foundations of computer science | 1997
Eyal Kushilevitz; Rafail Ostrovsky
We establish the following, quite unexpected, result: replication of data for the computational private information retrieval problem is not necessary. More specifically, based on the quadratic residuosity assumption, we present a single database, computationally private information retrieval scheme with O(n/sup /spl epsiv//) communication complexity for any /spl epsiv/>0.
foundations of computer science | 1995
Benny Chor; Oded Goldreich; Eyal Kushilevitz; Madhu Sudan
We describe schemes that enable a user to access k replicated copies of a database (k/spl ges/2) and privately retrieve information stored in the database. This means that each individual database gets no information on the identity of the item retrieved by the user. For a single database, achieving this type of privacy requires communicating the whole database, or n bits (where n is the number of bits in the database). Our schemes use the replication to gain substantial saving. In particular, we have: A two database scheme with communication complexity of O(n/sup 1/3/). A scheme for a constant number, k, of databases with communication complexity O(n/sup 1/k/). A scheme for 1/3 log/sub 2/ n databases with polylogarithmic (in n) communication complexity.
symposium on the theory of computing | 1998
Eyal Kushilevitz; Rafail Ostrovsky; Yuval Rabani
We address the problem ofdesigning data structures that allow efficient search f or approximate nearest neighbors. More specifically, given a database consisting ofa set ofvectors in some high dimensional Euclidean space, we want to construct a space-efficient data structure that would allow us to search, given a query vector, for the closest or nearly closest vector in the database. We also address this problem when distances are measured by the L1 norm and in the Hamming cube. Significantly improving and extending recent results ofKleinberg, we construct data structures whose size is polynomial in the size ofthe database and search algorithms that run in time nearly linear or nearly quadratic in the dimension. (Depending on the case, the extra factors are polylogarithmic in the size ofthe database.)
symposium on the theory of computing | 1998
Yael Gertner; Yuval Ishai; Eyal Kushilevitz; Tal Malkin
Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit data string x, replicated in k?2 databases (in the information-theoretic setting) or in k?1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a scheme is its communication complexity. In this paper we introduce a model of symmetrically-private information retrieval (SPIR), where the privacy of the data, as well as the privacy of the user, is guaranteed. That is, in every invocation of a SPIR protocol, the user learns only a single physical bit of x and no other information about the data. Previously known PIR schemes severely fail to meet this goal. We show how to transform PIR schemes into SPIR schemes (with information-theoretic privacy), paying a constant factor in communication complexity. To this end, we introduce and utilize a new cryptographic primitive, called conditional disclosure of secrets, which we believe may be a useful building block for the design of other cryptographic protocols. In particular, we get a k-database SPIR scheme of complexity O(n1/(2k?1)) for every constant k?2 and an O(logn)-database SPIR scheme of complexity O(log2n·loglogn). All our schemes require only a single round of interaction, and are resilient to any dishonest behavior of the user. These results also yield the first implementation of a distributed version of (n1)-OT (1-out-of-n oblivious transfer) with information-theoretic security and sublinear communication complexity.
SIAM Journal on Computing | 1998
Eyal Kushilevitz; Yishay Mansour
We show that for any randomized broadcast protocol for radio networks, there exists a network in which the expected time to broadcast a message is
SIAM Journal on Computing | 2000
Eyal Kushilevitz; Rafail Ostrovsky; Yuval Rabani
\Omega(D\log (N/D))
foundations of computer science | 2002
Amos Beimel; Yuval Ishai; Eyal Kushilevitz; Jean-François Raymond
, where D is the diameter of the network and N is the number of nodes. This implies a tight lower bound of
symposium on the theory of computing | 1991
Eyal Kushilevitz; Yishay Mansour
\Omega(D\log N)
SIAM Journal on Computing | 2006
Benny Applebaum; Yuval Ishai; Eyal Kushilevitz
for any
international colloquium on automata languages and programming | 2010
Benny Applebaum; Yuval Ishai; Eyal Kushilevitz
D \le N^{1-\varepsilon}