Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Eyal Kushilevitz is active.

Publication


Featured researches published by Eyal Kushilevitz.


foundations of computer science | 1997

Replication is not needed: single database, computationally-private information retrieval

Eyal Kushilevitz; Rafail Ostrovsky

We establish the following, quite unexpected, result: replication of data for the computational private information retrieval problem is not necessary. More specifically, based on the quadratic residuosity assumption, we present a single database, computationally private information retrieval scheme with O(n/sup /spl epsiv//) communication complexity for any /spl epsiv/>0.


foundations of computer science | 1995

Private information retrieval

Benny Chor; Oded Goldreich; Eyal Kushilevitz; Madhu Sudan

We describe schemes that enable a user to access k replicated copies of a database (k/spl ges/2) and privately retrieve information stored in the database. This means that each individual database gets no information on the identity of the item retrieved by the user. For a single database, achieving this type of privacy requires communicating the whole database, or n bits (where n is the number of bits in the database). Our schemes use the replication to gain substantial saving. In particular, we have: A two database scheme with communication complexity of O(n/sup 1/3/). A scheme for a constant number, k, of databases with communication complexity O(n/sup 1/k/). A scheme for 1/3 log/sub 2/ n databases with polylogarithmic (in n) communication complexity.


symposium on the theory of computing | 1998

Efficient search for approximate nearest neighbor in high dimensional spaces

Eyal Kushilevitz; Rafail Ostrovsky; Yuval Rabani

We address the problem ofdesigning data structures that allow efficient search f or approximate nearest neighbors. More specifically, given a database consisting ofa set ofvectors in some high dimensional Euclidean space, we want to construct a space-efficient data structure that would allow us to search, given a query vector, for the closest or nearly closest vector in the database. We also address this problem when distances are measured by the L1 norm and in the Hamming cube. Significantly improving and extending recent results ofKleinberg, we construct data structures whose size is polynomial in the size ofthe database and search algorithms that run in time nearly linear or nearly quadratic in the dimension. (Depending on the case, the extra factors are polylogarithmic in the size ofthe database.)


symposium on the theory of computing | 1998

Protecting data privacy in private information retrieval schemes

Yael Gertner; Yuval Ishai; Eyal Kushilevitz; Tal Malkin

Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit data string x, replicated in k?2 databases (in the information-theoretic setting) or in k?1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a scheme is its communication complexity. In this paper we introduce a model of symmetrically-private information retrieval (SPIR), where the privacy of the data, as well as the privacy of the user, is guaranteed. That is, in every invocation of a SPIR protocol, the user learns only a single physical bit of x and no other information about the data. Previously known PIR schemes severely fail to meet this goal. We show how to transform PIR schemes into SPIR schemes (with information-theoretic privacy), paying a constant factor in communication complexity. To this end, we introduce and utilize a new cryptographic primitive, called conditional disclosure of secrets, which we believe may be a useful building block for the design of other cryptographic protocols. In particular, we get a k-database SPIR scheme of complexity O(n1/(2k?1)) for every constant k?2 and an O(logn)-database SPIR scheme of complexity O(log2n·loglogn). All our schemes require only a single round of interaction, and are resilient to any dishonest behavior of the user. These results also yield the first implementation of a distributed version of (n1)-OT (1-out-of-n oblivious transfer) with information-theoretic security and sublinear communication complexity.


SIAM Journal on Computing | 1998

An

Eyal Kushilevitz; Yishay Mansour

We show that for any randomized broadcast protocol for radio networks, there exists a network in which the expected time to broadcast a message is


SIAM Journal on Computing | 2000

\Omega(D\log (N/D))

Eyal Kushilevitz; Rafail Ostrovsky; Yuval Rabani

\Omega(D\log (N/D))


foundations of computer science | 2002

Lower Bound for Broadcast in Radio Networks

Amos Beimel; Yuval Ishai; Eyal Kushilevitz; Jean-François Raymond

, where D is the diameter of the network and N is the number of nodes. This implies a tight lower bound of


symposium on the theory of computing | 1991

Efficient Search for Approximate Nearest Neighbor in High Dimensional Spaces

Eyal Kushilevitz; Yishay Mansour

\Omega(D\log N)


SIAM Journal on Computing | 2006

Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval

Benny Applebaum; Yuval Ishai; Eyal Kushilevitz

for any


international colloquium on automata languages and programming | 2010

Learning decision trees using the Fourier spectrum

Benny Applebaum; Yuval Ishai; Eyal Kushilevitz

D \le N^{1-\varepsilon}

Collaboration


Dive into the Eyal Kushilevitz's collaboration.

Top Co-Authors

Avatar

Yuval Ishai

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amos Beimel

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Noam Nisan

Hebrew University of Jerusalem

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amit Sahai

University of California

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge