Elaine Shi

From MaRDI portal
Person:1629436

Available identifiers

zbMath Open shi.elaineMaRDI QIDQ1629436

List of research outcomes





PublicationDate of PublicationType
PIR with client-side preprocessing: information-theoretic constructions and lower bounds2024-12-13Paper
Efficient pre-processing PIR without public-key cryptography2024-11-13Paper
What can cryptography do for decentralized mechanism design?2024-09-25Paper
Non-interactive anonymous router with quasi-linear router computation2024-08-02Paper
Distributed-prover interactive proofs2024-08-01Paper
Optimal oblivious parallel RAM2024-07-19Paper
Optimal sorting circuits for short keys2024-07-19Paper
OptORAMa: Optimal oblivious RAM2024-07-04Paper
Foundations of transaction fee mechanism design2024-05-14Paper
Bucket oblivious sort: an extremely simple oblivious sort2024-05-14Paper
Revisiting the Power of Non-Equivocation in Distributed Protocols2024-03-26Paper
On the Amortized Communication Complexity of Byzantine Broadcast2024-03-26Paper
Optimal single-server private information retrieval2024-01-16Paper
NanoGRAM: garbled RAM with \(\widetilde{O}(\log N)\) overhead2024-01-16Paper
https://portal.mardi4nfdi.de/entity/Q61473902024-01-15Paper
A theory of composition for differential obliviousness2023-12-12Paper
Multi-client inner product encryption: function-hiding instantiations without random oracles2023-11-24Paper
Improved extension protocols for Byzantine broadcast and agreement2023-11-02Paper
Oblivious parallel tight compaction2023-11-02Paper
Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions.2023-07-03Paper
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms2023-07-03Paper
\(\log^\ast\)-round game-theoretically-fair leader election2023-06-30Paper
Maliciously secure massively parallel computation for all-but-one corruptions2023-06-12Paper
Foundations of Differentially Oblivious Algorithms2023-04-27Paper
Oblivious RAM with worst-case logarithmic overhead2023-04-13Paper
On the adaptive security of MACs and PRFs2023-03-21Paper
Communication complexity of Byzantine agreement, revisited2023-03-14Paper
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture2023-02-03Paper
Hybrid consensus: efficient consensus in the permissionless model2023-02-03Paper
A complete characterization of game-theoretically fair, multi-party coin toss2022-08-30Paper
Sorting Short Keys in Circuits of Size ${o(n \log n)}$2022-05-31Paper
Oblivious RAM with \textit{worst-case} logarithmic overhead2022-05-18Paper
Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time2022-05-18Paper
Game-theoretic fairness meets multi-party protocols: the case of leader election2022-04-22Paper
Secure massively parallel computation for dishonest majority2022-03-23Paper
OptORAMa: optimal oblivious RAM2022-03-23Paper
Locality-preserving oblivious RAM2022-03-03Paper
Non-interactive anonymous router2021-12-08Paper
Expected constant round Byzantine broadcast under dishonest majority2021-12-01Paper
Sublinear-round Byzantine agreement under corrupt majority2021-12-01Paper
Round-efficient Byzantine broadcast under strongly adaptive and majority corruptions2021-12-01Paper
Lower Bounds for External Memory Integer Sorting via Network Coding2021-10-18Paper
Communication Complexity of Byzantine Agreement, Revisited2021-01-20Paper
Towards attribute-based encryption for RAMs from LWE: sub-linear decryption, and more2020-05-20Paper
Synchronous, with a chance of partition tolerance2020-05-20Paper
Streamlined blockchains: a simple and elegant approach (a tutorial and survey)2020-05-20Paper
Locally decodable and updatable non-malleable codes and their applications2020-03-03Paper
Locality-preserving oblivious RAM2020-02-06Paper
Lower bounds for external memory integer sorting via network coding2020-01-30Paper
Can We Overcome the n log n Barrier for Oblivious Sorting?2019-10-15Paper
Foundations of Differentially Oblivious Algorithms2019-10-15Paper
Oblivious network RAM and leveraging parallelism to achieve obliviousness2019-08-13Paper
More is less: perfectly secure oblivious algorithms in the multi-server setting2019-01-23Paper
Game theoretic notions of fairness in multi-party coin toss2018-12-11Paper
Path ORAM2018-12-06Paper
Perfectly secure oblivious parallel RAM2018-12-06Paper
Distributed Private Data Analysis2018-11-12Paper
Thunderella: blockchains with optimistic instant confirmation2018-07-09Paper
On the depth of oblivious parallel RAM2018-04-06Paper
Oblivious hashing revisited, and applications to asymptotically efficient ORAM and OPRAM2018-04-06Paper
https://portal.mardi4nfdi.de/entity/Q46080372018-03-15Paper
The sleepy model of consensus2018-03-08Paper
Circuit OPRAM: unifying statistically and computationally secure ORAMs and OPRAMs2018-01-19Paper
FruitChains2017-10-11Paper
Formal Abstractions for Attested Execution Secure Processors2017-06-13Paper
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness2016-06-10Paper
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM2016-04-08Paper
Constant-Round MPC with Fairness and Guarantee of Output Delivery2015-12-10Paper
Locally Decodable and Updatable Non-malleable Codes and Their Applications2015-07-06Paper
Multi-Client Verifiable Computation with Stronger Security Guarantees2015-07-06Paper
Multi-input Functional Encryption2014-05-27Paper
Verifiable Oblivious Storage2014-03-25Paper
Streaming Authenticated Data Structures2013-05-31Paper
Signatures of Correct Computation2013-03-18Paper
Privacy-Preserving Stream Aggregation with Fault Tolerance2012-11-09Paper
Optimal Lower Bound for Differentially Private Multi-party Aggregation2012-09-25Paper
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies2012-07-20Paper
Oblivious RAM with O((logN)3) Worst-Case Cost2011-12-02Paper
Private and Continual Release of Statistics2010-09-07Paper
Signatures of Reputation2010-08-17Paper
Predicate Privacy in Encryption Systems2009-03-03Paper
Delegating Capabilities in Predicate Encryption Systems2008-08-19Paper

Research outcomes over time

This page was built for person: Elaine Shi