Ashish Choudhury

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Network-agnostic multi-party computation revisited (extended abstract)2024-11-12Paper
Network-agnostic perfectly secure message transmission revisited2024-10-23Paper
Network agnostic MPC with statistical security2024-08-02Paper
Perfectly-secure synchronous MPC with asynchronous fallback guarantees
IEEE Transactions on Information Theory
2024-07-18Paper
Almost-surely terminating asynchronous Byzantine agreement against general adversaries with optimal resilience
Theoretical Computer Science
2024-03-28Paper
Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing
2024-03-26Paper
Brief announcement: Optimally-resilient unconditionally-secure asynchronous multi-party computation revisited2023-11-02Paper
Revisiting the efficiency of perfectly secure asynchronous multi-party computation against general adversaries
Lecture Notes in Computer Science
2023-08-14Paper
Revisiting the efficiency of asynchronous MPC with optimal resilience against general adversaries
Journal of Cryptology
2023-07-05Paper
On the communication efficiency of statistically secure asynchronous MPC with optimal resilience
Journal of Cryptology
2023-04-13Paper
Perfectly-secure asynchronous MPC for general adversaries (extended abstract)2022-07-06Paper
High throughput secure MPC over small population in hybrid networks (extended abstract)2022-07-06Paper
Improving the efficiency of optimally-resilient statistically-secure asynchronous multi-party computation2022-07-06Paper
Brief Announcement: Almost-surely Terminating Asynchronous Byzantine Agreement Protocols with a Constant Expected Running Time
Proceedings of the 39th Symposium on Principles of Distributed Computing
2021-03-15Paper
The power of shunning: efficient asynchronous Byzantine agreement revisited
Journal of the ACM
2020-11-11Paper
Almost-surely terminating asynchronous Byzantine agreement revisited
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing
2019-09-19Paper
Brief announcement: Asynchronous secure distributed computing with transferrable non-equivocation revisited
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing
2019-09-19Paper
Crash-tolerant consensus in directed graph revisited (extended abstract)2019-01-30Paper
Round and communication efficient unconditionally-secure MPC with \(t<n/3\) in partially synchronous network2018-03-16Paper
An Efficient Framework for Unconditionally Secure Multiparty Computation
IEEE Transactions on Information Theory
2017-05-02Paper
Linear overhead optimally-resilient robust MPC using preprocessing
Lecture Notes in Computer Science
2016-10-21Paper
The effect of population contexts on classifier performance
Journal of Biological Systems
2016-01-22Paper
Asynchronous MPC with a strict honest majority using non-equivocation
Proceedings of the 2014 ACM symposium on Principles of distributed computing
2015-09-03Paper
Efficient asynchronous verifiable secret sharing and multiparty computation
Journal of Cryptology
2015-03-25Paper
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
2014-12-12Paper
Efficient single phase unconditionally secure message transmission with optimum communication complexity
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
2014-12-12Paper
Brief announcement: Efficient optimally resilient statistical AVSS and its applications
Proceedings of the 2012 ACM symposium on Principles of distributed computing
2014-12-05Paper
Brief announcement: Optimal amortized secret sharing with cheater identification
Proceedings of the 2012 ACM symposium on Principles of distributed computing
2014-12-05Paper
Reducing the Overhead of MPC over a Large Population
Lecture Notes in Computer Science
2014-10-14Paper
Simple and efficient asynchronous Byzantine agreement with optimal resilience
Proceedings of the 28th ACM symposium on Principles of distributed computing
2014-07-23Paper
Asynchronous Byzantine agreement with optimal resilience
Distributed Computing
2014-07-11Paper
Constant phase efficient protocols for secure message transmission in directed networks
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
2014-03-13Paper
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission
Journal of the ACM
2014-02-17Paper
Breaking the ${\mathcal{O}}(n|C|)$ Barrier for Unconditionally Secure Asynchronous Multiparty Computation
Lecture Notes in Computer Science
2014-01-14Paper
Between a rock and a hard place: interpolating between MPC and FHE
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
On the communication complexity of reliable and secure message transmission in asynchronous networks
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Secure message transmission in asynchronous networks
Journal of Parallel and Distributed Computing
2011-08-19Paper
Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary
Applied Cryptography and Network Security
2011-06-28Paper
The round complexity of perfectly secure general VSS
Lecture Notes in Computer Science
2011-05-19Paper
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality
International Journal of Applied Cryptography
2011-04-05Paper
Modeling and control in cancer genomics2011-01-03Paper
Communication efficient statistical asynchronous multiparty computation with optimal resilience
Information Security and Cryptology
2010-11-23Paper
Efficient statistical asynchronous verifiable secret sharing with optimal resilience
Lecture Notes in Computer Science
2010-09-29Paper
Communication efficient perfectly secure VSS and MPC in asynchronous networks with optimal resilience
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Round efficient unconditionally secure MPC and multiparty set intersection with optimal resilience
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Information Theoretically Secure Multi Party Set Intersection Re-visited
Selected Areas in Cryptography
2009-12-09Paper
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
Cryptology and Network Security
2009-11-26Paper
The Round Complexity of Verifiable Secret Sharing Revisited
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Breaking the data encryption standard using networks of evolutionary processors with parallel string rewriting rules
International Journal of Computer Mathematics
2009-06-02Paper
Perfectly reliable and secure message transmission tolerating mobile adversary
International Journal of Applied Cryptography
2009-05-12Paper
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks
Distributed Computing and Networking
2009-03-26Paper
Round Efficient Unconditionally Secure Multiparty Computation Protocol
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
Lecture Notes in Computer Science
2009-01-09Paper
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited
Lecture Notes in Computer Science
2008-11-20Paper
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary
Lecture Notes in Computer Science
2008-09-02Paper
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary
Information Security and Privacy
2008-07-08Paper
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Cryptology and Network Security
2008-04-15Paper
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality
Lecture Notes in Computer Science
2008-04-11Paper
Returning and non-returning parallel communicating finite automata are equivalent
RAIRO - Theoretical Informatics and Applications
2008-02-15Paper
Returning and non-returning parallel communicating finite automata are equivalent
RAIRO - Theoretical Informatics and Applications
2008-02-15Paper
Returning and non-returning parallel communicating finite automata are equivalent
RAIRO - Theoretical Informatics and Applications
2008-02-15Paper
Network of evolutionary processors, past, present and future2007-12-11Paper
External control in Markovian genetic regulatory networks
Machine Learning
2003-08-20Paper


Research outcomes over time


This page was built for person: Ashish Choudhury