Elaine Shi

From MaRDI portal
Person:1629436

Available identifiers

zbMath Open shi.elaineMaRDI QIDQ1629436

List of research outcomes

PublicationDate of PublicationType
Revisiting the Power of Non-Equivocation in Distributed Protocols2024-03-26Paper
On the Amortized Communication Complexity of Byzantine Broadcast2024-03-26Paper
Optimal single-server private information retrieval2024-01-16Paper
NanoGRAM: garbled RAM with \(\widetilde{O}(\log N)\) overhead2024-01-16Paper
https://portal.mardi4nfdi.de/entity/Q61473902024-01-15Paper
A theory of composition for differential obliviousness2023-12-12Paper
Multi-client inner product encryption: function-hiding instantiations without random oracles2023-11-24Paper
Oblivious parallel tight compaction2023-11-02Paper
Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions.2023-07-03Paper
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms2023-07-03Paper
\(\log^\ast\)-round game-theoretically-fair leader election2023-06-30Paper
Maliciously secure massively parallel computation for all-but-one corruptions2023-06-12Paper
Foundations of Differentially Oblivious Algorithms2023-04-27Paper
Oblivious RAM with worst-case logarithmic overhead2023-04-13Paper
On the adaptive security of MACs and PRFs2023-03-21Paper
Communication complexity of Byzantine agreement, revisited2023-03-14Paper
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture2023-02-03Paper
A complete characterization of game-theoretically fair, multi-party coin toss2022-08-30Paper
Sorting Short Keys in Circuits of Size ${o(n \log n)}$2022-05-31Paper
Oblivious RAM with \textit{worst-case} logarithmic overhead2022-05-18Paper
Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time2022-05-18Paper
Game-theoretic fairness meets multi-party protocols: the case of leader election2022-04-22Paper
OptORAMa: optimal oblivious RAM2022-03-23Paper
Secure massively parallel computation for dishonest majority2022-03-23Paper
Locality-preserving oblivious RAM2022-03-03Paper
Non-interactive anonymous router2021-12-08Paper
Sublinear-round Byzantine agreement under corrupt majority2021-12-01Paper
Expected constant round Byzantine broadcast under dishonest majority2021-12-01Paper
Round-efficient Byzantine broadcast under strongly adaptive and majority corruptions2021-12-01Paper
Lower Bounds for External Memory Integer Sorting via Network Coding2021-10-18Paper
Communication Complexity of Byzantine Agreement, Revisited2021-01-20Paper
Synchronous, with a chance of partition tolerance2020-05-20Paper
Streamlined blockchains: a simple and elegant approach (a tutorial and survey)2020-05-20Paper
Towards attribute-based encryption for RAMs from LWE: sub-linear decryption, and more2020-05-20Paper
Locally decodable and updatable non-malleable codes and their applications2020-03-03Paper
Locality-preserving oblivious RAM2020-02-06Paper
Lower bounds for external memory integer sorting via network coding2020-01-30Paper
Can We Overcome the n log n Barrier for Oblivious Sorting?2019-10-15Paper
Foundations of Differentially Oblivious Algorithms2019-10-15Paper
Oblivious network RAM and leveraging parallelism to achieve obliviousness2019-08-13Paper
More is less: perfectly secure oblivious algorithms in the multi-server setting2019-01-23Paper
Game theoretic notions of fairness in multi-party coin toss2018-12-11Paper
Perfectly secure oblivious parallel RAM2018-12-06Paper
Path ORAM2018-12-06Paper
Distributed Private Data Analysis2018-11-12Paper
Thunderella: blockchains with optimistic instant confirmation2018-07-09Paper
On the depth of oblivious parallel RAM2018-04-06Paper
Oblivious hashing revisited, and applications to asymptotically efficient ORAM and OPRAM2018-04-06Paper
https://portal.mardi4nfdi.de/entity/Q46080372018-03-15Paper
The sleepy model of consensus2018-03-08Paper
Circuit OPRAM: unifying statistically and computationally secure ORAMs and OPRAMs2018-01-19Paper
FruitChains2017-10-11Paper
Formal Abstractions for Attested Execution Secure Processors2017-06-13Paper
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness2016-06-10Paper
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM2016-04-08Paper
Constant-Round MPC with Fairness and Guarantee of Output Delivery2015-12-10Paper
Locally Decodable and Updatable Non-malleable Codes and Their Applications2015-07-06Paper
Multi-Client Verifiable Computation with Stronger Security Guarantees2015-07-06Paper
Multi-input Functional Encryption2014-05-27Paper
Verifiable Oblivious Storage2014-03-25Paper
Streaming Authenticated Data Structures2013-05-31Paper
Signatures of Correct Computation2013-03-18Paper
Privacy-Preserving Stream Aggregation with Fault Tolerance2012-11-09Paper
Optimal Lower Bound for Differentially Private Multi-party Aggregation2012-09-25Paper
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies2012-07-20Paper
Oblivious RAM with O((logN)3) Worst-Case Cost2011-12-02Paper
Private and Continual Release of Statistics2010-09-07Paper
Signatures of Reputation2010-08-17Paper
Predicate Privacy in Encryption Systems2009-03-03Paper
Delegating Capabilities in Predicate Encryption Systems2008-08-19Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Elaine Shi