Ben Riva - Research
Currently working for curv. Previously worked for Google, completed my Ph.D. at Tel Aviv University, advised by Prof. Ran Canetti, and was a post-doctoral researcher at BIU Crypto group, hosted by Prof. Benny Pinkas and Prof. Yehuda Lindell.
Research Interests: Applied Cryptography and Computer Security.
Projects I've been working on:
Practical Delegation of Computation using Multiple Servers. Ran Canetti, Ben Riva and Guy N. Rothblum. CCS 11. (Code is here.)
Two Protocols for Delegation of Computation. Ran Canetti, Ben Riva and Guy N. Rothblum. ICITS 12.
Verifiable Computation with Two or More Clouds (short abstract). Ran Canetti, Ben Riva and Guy N. Rothblum. IBM's Workshop on Cryptography and Security in Clouds.
Refereed Delegation of Computation. Ran Canetti, Ben Riva and Guy N. Rothblum. Information and Computation (volume 226).
Bare-Handed Electronic Voting with Pre-processing. Ben Riva and Amnon Ta-Shma. EVT 07 and WOTE 07.
A New Implementation of a Dual (Paper and Cryptographic) Voting System. Jonathan Ben-Nun, Niko Farhi, Morgan Llewellyn, Ben Riva, Alon Rosen, Amnon Ta-Shma and Douglas Wikstrom. EVOTE 12.
Salus: A System for Server-Aided Secure Function Evaluation. Seny Kamara, Payman Mohassel and Ben Riva. CCS 12.
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation. Payman Mohassel and Ben Riva. CRYPTO 13.
Non-Interactive Secure Computation Based on Cut-and-Choose. Arash Afshar, Payman Mohassel, Benny Pinkas and and Ben Riva. EUROCRYPT 14.
Cut-and-Choose Yao-Based Secure Computation in the Online/Offline and Batch Settings. Yehuda Lindell and Ben Riva. CRYPTO 14.
Richer Efficiency/Security Trade-offs in 2PC. Vladimir Kolesnikov, Payman Mohassel, Ben Riva and Mike Rosulek. TCC 15.
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries. Yehuda Lindell and Ben Riva. CCS 15.
Efficient Server-Aided 2PC for Mobile Phones. Payman Mohassel, Ostap Orobets and Ben Riva. PETS 16.
Nerus: Vulnerability Mitigation Via OS-Aided, Self-Imposed Restrictions. Ran Canetti, Itay Itzhaki and Ben Riva. Manuscript. (A prototype is available here.)
Communications of the ACM, ACM Transactions on Information and System Security, CCS, ESORICS, Journal of Cryptography, CRYPTO, EUROCRYPT, ASIACRYPT, PKC, TCC.
Courses TA'ed (at TAU):
Workshop in Electronic Voting - Fall 10
Workshop in Computer Security - Fall 10, Spring 10
Software Project - Spring 10, Fall 09, Spring 09