Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mor Weiss is active.

Publication


Featured researches published by Mor Weiss.


theory of cryptography conference | 2014

Probabilistically Checkable Proofs of Proximity with Zero-Knowledge

Yuval Ishai; Mor Weiss

A probabilistically Checkable Proof (PCP) allows a randomized verifier, with oracle access to a purported proof, to probabilistically verify an input statement of the form “x ∈ L” by querying only few bits of the proof. A PCP of proximity (PCPP) has the additional feature of allowing the verifier to query only few bits of the input x, where if the input is accepted then the verifier is guaranteed that (with high probability) the input is close to some x′ ∈ L.


public key cryptography | 2018

Multi-Key Searchable Encryption, Revisited

Ariel Hamlin; Abhi Shelat; Mor Weiss; Daniel Wichs

We consider a setting where users store their encrypted documents on a remote server and can selectively share documents with each other. A user should be able to perform keyword searches over all the documents she has access to, including the ones that others shared with her. The contents of the documents, and the search queries, should remain private from the server.


theory of cryptography conference | 2016

Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits

Yuval Ishai; Mor Weiss; Guang Yang

A Probabilistically Checkable Proof (PCP) allows a randomized verifier, with oracle access to a purported proof, to probabilistically verify an input statement of the form “\(x\in L\)” by querying only few bits of the proof. A zero-knowledge PCP (ZKPCP) is a PCP with the additional guarantee that the view of any verifier querying a bounded number of proof bits can be efficiently simulated given the input x alone, where the simulated and actual views are statistically close.


theory of cryptography conference | 2017

How to Construct a Leakage-Resilient (Stateless) Trusted Party

Daniel Genkin; Yuval Ishai; Mor Weiss

Trusted parties and devices are commonly used in the real world to securely perform computations on secret inputs. However, their security can often be compromised by side-channel attacks in which the adversary obtains partial leakage on intermediate computation values. This gives rise to the following natural question: To what extent can one protect the trusted party against leakage?


international workshop and international workshop on approximation, randomization, and combinatorial optimization. algorithms and techniques | 2013

Zero Knowledge LTCs and Their Applications

Yuval Ishai; Amit Sahai; Michael Viderman; Mor Weiss

Locally testable codes (LTCs) are error-correcting codes for which membership in the code can be tested by probing few symbols of a purported codeword. Motivated by applications in cryptography, we initiate the study of zero knowledge locally testable codes (ZK-LTCs). ZK-LTCs are LTCs which admit a randomized encoding function, such that even a malicious tester which reads a large number of codeword symbols learns essentially nothing about the encoded message.


IACR Cryptology ePrint Archive | 2014

Protecting obfuscation against arithmetic attacks

Eric Miles; Amit Sahai; Mor Weiss


arXiv: Cryptography and Security | 2015

Practical Solutions For Format-Preserving Encryption.

Mor Weiss; Boris Rozenberg; Muhammad Barham


theory of cryptography conference | 2016

Binary AMD Circuits from Secure Multiparty Computation

Daniel Genkin; Yuval Ishai; Mor Weiss


IACR Cryptology ePrint Archive | 2018

Private Anonymous Data Access.

Ariel Hamlin; Rafail Ostrovsky; Mor Weiss; Daniel Wichs


IACR Cryptology ePrint Archive | 2018

Is there an Oblivious RAM Lower Bound for Online Reads

Mor Weiss; Daniel Wichs

Collaboration


Dive into the Mor Weiss's collaboration.

Top Co-Authors

Avatar

Yuval Ishai

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Daniel Genkin

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Daniel Wichs

Northeastern University

View shared research outputs
Top Co-Authors

Avatar

Amit Sahai

University of California

View shared research outputs
Top Co-Authors

Avatar

Ariel Hamlin

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Yuval Ishai

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michael Viderman

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Abhi Shelat

Northeastern University

View shared research outputs
Researchain Logo
Decentralizing Knowledge