Arpita Patra

From MaRDI portal
Person:514476

Available identifiers

zbMath Open patra.arpitaMaRDI QIDQ514476

List of research outcomes





PublicationDate of PublicationType
Perfect asynchronous MPC with linear communication overhead2024-11-13Paper
The round complexity of statistical MPC with optimal resiliency2024-05-08Paper
Detect, pack and batch: perfectly-secure MPC with linear communication and constant expected time2023-12-08Paper
Attaining GOD beyond honest majority with friends and foes2023-08-25Paper
Fully-secure MPC with minimal trust2023-08-14Paper
On perfectly secure two-party computation for symmetric functionalities with correlated randomness2023-08-14Paper
Asymptotically free broadcast in constant expected time via packed VSS2023-08-14Paper
Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)2023-08-14Paper
Beyond honest majority: the round complexity of fair and robust multi-party computation2023-07-26Paper
Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)2023-07-07Paper
Quadratic multiparty randomized encodings beyond honest majority and their applications2023-07-07Paper
MPClan: protocol suite for privacy-conscious computations2023-07-05Paper
On the communication efficiency of statistically secure asynchronous MPC with optimal resilience2023-04-13Paper
On the exact round complexity of best-of-both-worlds multi-party computation2023-03-29Paper
Three-round secure multiparty computation from black-box two-round oblivious transfer2022-04-22Paper
The resiliency of MPC with low interaction: the benefit of making errors (extended abstract)2022-03-23Paper
On the exact round complexity of secure three-party computation2021-09-10Paper
Optimal extension protocols for Byzantine broadcast and agreement2021-03-12Paper
The Power of Shunning2020-11-11Paper
Beyond honest majority: the round complexity of fair and robust multi-party computation2020-05-20Paper
Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited2019-09-19Paper
Crash-tolerant consensus in directed graph revisited (extended abstract)2019-01-30Paper
On the exact round complexity of secure three-party computation2018-09-26Paper
On the Power of Hybrid Networks in Multi-Party Computation2018-09-14Paper
Efficient adaptively secure zero-knowledge from garbled circuits2018-05-29Paper
Round and communication efficient unconditionally-secure MPC with \(t<n/3\) in partially synchronous network2018-03-16Paper
Privacy-free garbled circuits for formulas: size zero and information-theoretic2017-11-03Paper
Broadcast Extensions with Optimal Communication and Round Complexity2017-09-29Paper
An Efficient Framework for Unconditionally Secure Multiparty Computation2017-05-02Paper
Efficient one-sided adaptively secure computation2017-03-02Paper
Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing2016-10-21Paper
Selective Opening Security for Receivers2016-06-10Paper
Adaptively secure computation with partial erasures2016-03-23Paper
Anonymous Authentication with Shared Secrets2015-09-17Paper
Efficient asynchronous verifiable secret sharing and multiparty computation2015-03-25Paper
Brief announcement2015-03-02Paper
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary2014-12-12Paper
Efficient single phase unconditionally secure message transmission with optimum communication complexity2014-12-12Paper
Brief announcement2014-12-05Paper
Reducing the Overhead of MPC over a Large Population2014-10-14Paper
Key-Indistinguishable Message Authentication Codes2014-10-14Paper
Simple and efficient asynchronous byzantine agreement with optimal resilience2014-07-23Paper
Asynchronous Byzantine agreement with optimal resilience2014-07-11Paper
Constant phase efficient protocols for secure message transmission in directed networks2014-03-13Paper
One-Sided Adaptively Secure Two-Party Computation2014-02-18Paper
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission2014-02-17Paper
Between a Rock and a Hard Place: Interpolating between MPC and FHE2013-12-10Paper
On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks2012-11-01Paper
Computational Verifiable Secret Sharing Revisited2011-12-02Paper
Secure message transmission in asynchronous networks2011-08-19Paper
Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary2011-06-28Paper
Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience2011-05-19Paper
The Round Complexity of Perfectly Secure General VSS2011-05-19Paper
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality2011-04-05Paper
The Round Complexity of Verifiable Secret Sharing: The Statistical Case2010-12-07Paper
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience2010-11-23Paper
Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience2010-09-29Paper
Communication Optimal Multi-valued Asynchronous Broadcast Protocol2010-08-31Paper
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience2010-05-04Paper
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience2009-12-17Paper
Information Theoretically Secure Multi Party Set Intersection Re-visited2009-12-09Paper
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security2009-11-26Paper
The Round Complexity of Verifiable Secret Sharing Revisited2009-10-20Paper
Indoor versus outdoor scene classification using probabilistic neural network2009-09-01Paper
Perfectly reliable and secure message transmission tolerating mobile adversary2009-05-12Paper
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks2009-03-26Paper
Round Efficient Unconditionally Secure Multiparty Computation Protocol2009-01-22Paper
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary2009-01-09Paper
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited2008-11-20Paper
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary2008-09-02Paper
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary2008-07-08Paper
Enhancing decision combination of face and fingerprint by exploitation of individual classifier space: An approach to multi-modal biometry2008-05-09Paper
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary2008-04-15Paper
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission2008-04-11Paper
Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality2008-04-11Paper

Research outcomes over time

This page was built for person: Arpita Patra