Ashish Choudhury

From MaRDI portal
(Redirected from Person:1017543)
Redirect page

Redirect to:



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Network-agnostic multi-party computation revisited (extended abstract)2024-11-12Paper
Network-agnostic perfectly secure message transmission revisited2024-10-23Paper
Network agnostic MPC with statistical security2024-08-02Paper
Perfectly-secure synchronous MPC with asynchronous fallback guarantees
IEEE Transactions on Information Theory
2024-07-18Paper
Almost-surely terminating asynchronous Byzantine agreement against general adversaries with optimal resilience
Theoretical Computer Science
2024-03-28Paper
Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees
Proceedings of the 2022 ACM Symposium on Principles of Distributed Computing
2024-03-26Paper
Brief announcement: Optimally-resilient unconditionally-secure asynchronous multi-party computation revisited2023-11-02Paper
Revisiting the efficiency of perfectly secure asynchronous multi-party computation against general adversaries
Lecture Notes in Computer Science
2023-08-14Paper
Revisiting the efficiency of asynchronous MPC with optimal resilience against general adversaries
Journal of Cryptology
2023-07-05Paper
On the communication efficiency of statistically secure asynchronous MPC with optimal resilience
Journal of Cryptology
2023-04-13Paper
Perfectly-secure asynchronous MPC for general adversaries (extended abstract)2022-07-06Paper
High throughput secure MPC over small population in hybrid networks (extended abstract)2022-07-06Paper
Improving the efficiency of optimally-resilient statistically-secure asynchronous multi-party computation2022-07-06Paper
Brief Announcement: Almost-surely Terminating Asynchronous Byzantine Agreement Protocols with a Constant Expected Running Time
Proceedings of the 39th Symposium on Principles of Distributed Computing
2021-03-15Paper
The power of shunning: efficient asynchronous Byzantine agreement revisited
Journal of the ACM
2020-11-11Paper
Almost-surely terminating asynchronous Byzantine agreement revisited
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing
2019-09-19Paper
Brief announcement: Asynchronous secure distributed computing with transferrable non-equivocation revisited
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing
2019-09-19Paper
Crash-tolerant consensus in directed graph revisited (extended abstract)2019-01-30Paper
Round and communication efficient unconditionally-secure MPC with \(t<n/3\) in partially synchronous network2018-03-16Paper
An Efficient Framework for Unconditionally Secure Multiparty Computation
IEEE Transactions on Information Theory
2017-05-02Paper
Linear overhead optimally-resilient robust MPC using preprocessing
Lecture Notes in Computer Science
2016-10-21Paper
The effect of population contexts on classifier performance
Journal of Biological Systems
2016-01-22Paper
Asynchronous MPC with a strict honest majority using non-equivocation
Proceedings of the 2014 ACM symposium on Principles of distributed computing
2015-09-03Paper
Efficient asynchronous verifiable secret sharing and multiparty computation
Journal of Cryptology
2015-03-25Paper
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
2014-12-12Paper
Efficient single phase unconditionally secure message transmission with optimum communication complexity
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
2014-12-12Paper
Brief announcement: Efficient optimally resilient statistical AVSS and its applications
Proceedings of the 2012 ACM symposium on Principles of distributed computing
2014-12-05Paper
Brief announcement: Optimal amortized secret sharing with cheater identification
Proceedings of the 2012 ACM symposium on Principles of distributed computing
2014-12-05Paper
Reducing the Overhead of MPC over a Large Population
Lecture Notes in Computer Science
2014-10-14Paper
Simple and efficient asynchronous Byzantine agreement with optimal resilience
Proceedings of the 28th ACM symposium on Principles of distributed computing
2014-07-23Paper
Asynchronous Byzantine agreement with optimal resilience
Distributed Computing
2014-07-11Paper
Constant phase efficient protocols for secure message transmission in directed networks
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
2014-03-13Paper
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission
Journal of the ACM
2014-02-17Paper
Breaking the ${\mathcal{O}}(n|C|)$ Barrier for Unconditionally Secure Asynchronous Multiparty Computation
Lecture Notes in Computer Science
2014-01-14Paper
Between a rock and a hard place: interpolating between MPC and FHE
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
On the communication complexity of reliable and secure message transmission in asynchronous networks
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Secure message transmission in asynchronous networks
Journal of Parallel and Distributed Computing
2011-08-19Paper
Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary
Applied Cryptography and Network Security
2011-06-28Paper
The round complexity of perfectly secure general VSS
Lecture Notes in Computer Science
2011-05-19Paper
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality
International Journal of Applied Cryptography
2011-04-05Paper
Modeling and control in cancer genomics2011-01-03Paper
Communication efficient statistical asynchronous multiparty computation with optimal resilience
Information Security and Cryptology
2010-11-23Paper
Efficient statistical asynchronous verifiable secret sharing with optimal resilience
Lecture Notes in Computer Science
2010-09-29Paper
Communication efficient perfectly secure VSS and MPC in asynchronous networks with optimal resilience
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Round efficient unconditionally secure MPC and multiparty set intersection with optimal resilience
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Information Theoretically Secure Multi Party Set Intersection Re-visited
Selected Areas in Cryptography
2009-12-09Paper
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
Cryptology and Network Security
2009-11-26Paper
The Round Complexity of Verifiable Secret Sharing Revisited
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Breaking the data encryption standard using networks of evolutionary processors with parallel string rewriting rules
International Journal of Computer Mathematics
2009-06-02Paper
Perfectly reliable and secure message transmission tolerating mobile adversary
International Journal of Applied Cryptography
2009-05-12Paper
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks
Distributed Computing and Networking
2009-03-26Paper
Round Efficient Unconditionally Secure Multiparty Computation Protocol
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
Lecture Notes in Computer Science
2009-01-09Paper
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited
Lecture Notes in Computer Science
2008-11-20Paper
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary
Lecture Notes in Computer Science
2008-09-02Paper
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary
Information Security and Privacy
2008-07-08Paper
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Cryptology and Network Security
2008-04-15Paper
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality
Lecture Notes in Computer Science
2008-04-11Paper
Returning and non-returning parallel communicating finite automata are equivalent
RAIRO - Theoretical Informatics and Applications
2008-02-15Paper
Returning and non-returning parallel communicating finite automata are equivalent
RAIRO - Theoretical Informatics and Applications
2008-02-15Paper
Returning and non-returning parallel communicating finite automata are equivalent
RAIRO - Theoretical Informatics and Applications
2008-02-15Paper
Network of evolutionary processors, past, present and future2007-12-11Paper
External control in Markovian genetic regulatory networks
Machine Learning
2003-08-20Paper


Research outcomes over time


This page was built for person: Ashish Choudhury