Aniket Kate

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Computationally efficient asynchronous MPC with linear communication and low additive overhead2026-02-04Paper
Disincentivize collusion in verifiable secret sharing2025-12-02Paper
The unique chain rule and its applications2024-07-17Paper
Towards overcoming the undercutting problem
Financial Cryptography and Data Security
2023-05-26Paper
Flexible signatures: making authentication suitable for real-time environments2022-08-25Paper
Anonymous RAM2022-08-19Paper
cMix: mixing with minimal real-time asymmetric cryptographic operations2022-07-01Paper
\textsf{Reparo}: publicly verifiable layer to repair blockchains
(available as arXiv preprint)
2022-06-22Paper
DLSAG: non-interactive refund transactions for interoperable payment channels in Monero2021-02-08Paper
Efficient non-interactive zero-knowledge proofs in cross-domains without trusted setup2020-01-28Paper
Secrecy without perfect randomness: cryptography with (bounded) weak sources
Applied Cryptography and Network Security
2016-03-10Paper
Post-quantum forward-secure onion routing (future anonymity in today's budget)
Applied Cryptography and Network Security
2016-03-10Paper
Asynchronous MPC with a strict honest majority using non-equivocation
Proceedings of the 2014 ACM symposium on Principles of distributed computing
2015-09-03Paper
Brief announcement
Proceedings of the 2012 ACM symposium on Principles of distributed computing
2014-12-05Paper
BackRef: accountability in anonymous communication networks
Applied Cryptography and Network Security
2014-07-07Paper
Asynchronous computational VSS with reduced communication complexity
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Computational verifiable secret sharing revisited
Lecture Notes in Computer Science
2011-12-02Paper
Constant-Size Commitments to Polynomials and Their Applications
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Distributed private-key generators for identity-based cryptography
Lecture Notes in Computer Science
2010-09-10Paper


Research outcomes over time


This page was built for person: Aniket Kate