Arpita Patra

From MaRDI portal
(Redirected from Person:514476)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Asymptotically free broadcast in constant expected time via packed VSS
Journal of Cryptology
2025-10-23Paper
Perfect asynchronous MPC with linear communication overhead2024-11-13Paper
The round complexity of statistical MPC with optimal resiliency2024-05-08Paper
Detect, pack and batch: perfectly-secure MPC with linear communication and constant expected time
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Attaining GOD beyond honest majority with friends and foes
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Fully-secure MPC with minimal trust
Theory of Cryptography
2023-08-14Paper
On perfectly secure two-party computation for symmetric functionalities with correlated randomness
Theory of Cryptography
2023-08-14Paper
Asymptotically free broadcast in constant expected time via packed VSS
Theory of Cryptography
2023-08-14Paper
Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract)
Theory of Cryptography
2023-08-14Paper
Beyond honest majority: the round complexity of fair and robust multi-party computation
Journal of Cryptology
2023-07-26Paper
Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract)
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Quadratic multiparty randomized encodings beyond honest majority and their applications
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
MPClan: protocol suite for privacy-conscious computations
Journal of Cryptology
2023-07-05Paper
On the communication efficiency of statistically secure asynchronous MPC with optimal resilience
Journal of Cryptology
2023-04-13Paper
On the exact round complexity of best-of-both-worlds multi-party computation2023-03-29Paper
Three-round secure multiparty computation from black-box two-round oblivious transfer2022-04-22Paper
The resiliency of MPC with low interaction: the benefit of making errors (extended abstract)2022-03-23Paper
On the exact round complexity of secure three-party computation
Journal of Cryptology
2021-09-10Paper
Optimal extension protocols for Byzantine broadcast and agreement
Distributed Computing
2021-03-12Paper
The power of shunning: efficient asynchronous Byzantine agreement revisited
Journal of the ACM
2020-11-11Paper
Beyond honest majority: the round complexity of fair and robust multi-party computation2020-05-20Paper
Almost-surely terminating asynchronous Byzantine agreement revisited
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing
2019-09-19Paper
Crash-tolerant consensus in directed graph revisited (extended abstract)2019-01-30Paper
On the exact round complexity of secure three-party computation
Lecture Notes in Computer Science
2018-09-26Paper
On the Power of Hybrid Networks in Multi-Party Computation
IEEE Transactions on Information Theory
2018-09-14Paper
Efficient adaptively secure zero-knowledge from garbled circuits2018-05-29Paper
Round and communication efficient unconditionally-secure MPC with \(t<n/3\) in partially synchronous network2018-03-16Paper
Privacy-free garbled circuits for formulas: size zero and information-theoretic2017-11-03Paper
Broadcast Extensions with Optimal Communication and Round Complexity
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing
2017-09-29Paper
An Efficient Framework for Unconditionally Secure Multiparty Computation
IEEE Transactions on Information Theory
2017-05-02Paper
Efficient one-sided adaptively secure computation
Journal of Cryptology
2017-03-02Paper
Linear overhead optimally-resilient robust MPC using preprocessing
Lecture Notes in Computer Science
2016-10-21Paper
Selective Opening Security for Receivers
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Adaptively secure computation with partial erasures
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing
2016-03-23Paper
Anonymous authentication with shared secrets
Progress in Cryptology - LATINCRYPT 2014
2015-09-17Paper
Efficient asynchronous verifiable secret sharing and multiparty computation
Journal of Cryptology
2015-03-25Paper
Brief announcement: communication efficient asynchronous Byzantine agreement
Proceedings of the 29th ACM SIGACT-SIGOPS symposium on Principles of distributed computing
2015-03-02Paper
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
2014-12-12Paper
Efficient single phase unconditionally secure message transmission with optimum communication complexity
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
2014-12-12Paper
Brief announcement: Efficient optimally resilient statistical AVSS and its applications
Proceedings of the 2012 ACM symposium on Principles of distributed computing
2014-12-05Paper
Reducing the Overhead of MPC over a Large Population
Lecture Notes in Computer Science
2014-10-14Paper
Key-indistinguishable message authentication codes
Lecture Notes in Computer Science
2014-10-14Paper
Simple and efficient asynchronous Byzantine agreement with optimal resilience
Proceedings of the 28th ACM symposium on Principles of distributed computing
2014-07-23Paper
Asynchronous Byzantine agreement with optimal resilience
Distributed Computing
2014-07-11Paper
Constant phase efficient protocols for secure message transmission in directed networks
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
2014-03-13Paper
One-Sided Adaptively Secure Two-Party Computation
Theory of Cryptography
2014-02-18Paper
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission
Journal of the ACM
2014-02-17Paper
Between a rock and a hard place: interpolating between MPC and FHE
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
On the communication complexity of reliable and secure message transmission in asynchronous networks
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Computational verifiable secret sharing revisited
Lecture Notes in Computer Science
2011-12-02Paper
Secure message transmission in asynchronous networks
Journal of Parallel and Distributed Computing
2011-08-19Paper
Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary
Applied Cryptography and Network Security
2011-06-28Paper
Communication optimal multi-valued asynchronous Byzantine agreement with optimal resilience
Lecture Notes in Computer Science
2011-05-19Paper
The round complexity of perfectly secure general VSS
Lecture Notes in Computer Science
2011-05-19Paper
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality
International Journal of Applied Cryptography
2011-04-05Paper
The round complexity of verifiable secret sharing: the statistical case
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Communication efficient statistical asynchronous multiparty computation with optimal resilience
Information Security and Cryptology
2010-11-23Paper
Efficient statistical asynchronous verifiable secret sharing with optimal resilience
Lecture Notes in Computer Science
2010-09-29Paper
Communication optimal multi-valued asynchronous broadcast protocol
Lecture Notes in Computer Science
2010-08-31Paper
Communication efficient perfectly secure VSS and MPC in asynchronous networks with optimal resilience
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Round efficient unconditionally secure MPC and multiparty set intersection with optimal resilience
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Information Theoretically Secure Multi Party Set Intersection Re-visited
Selected Areas in Cryptography
2009-12-09Paper
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
Cryptology and Network Security
2009-11-26Paper
The Round Complexity of Verifiable Secret Sharing Revisited
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Indoor versus outdoor scene classification using probabilistic neural network
EURASIP Journal on Advances in Signal Processing
2009-09-01Paper
Perfectly reliable and secure message transmission tolerating mobile adversary
International Journal of Applied Cryptography
2009-05-12Paper
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks
Distributed Computing and Networking
2009-03-26Paper
Round Efficient Unconditionally Secure Multiparty Computation Protocol
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
Lecture Notes in Computer Science
2009-01-09Paper
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited
Lecture Notes in Computer Science
2008-11-20Paper
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary
Lecture Notes in Computer Science
2008-09-02Paper
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary
Information Security and Privacy
2008-07-08Paper
Enhancing decision combination of face and fingerprint by exploitation of individual classifier space: An approach to multi-modal biometry
Pattern Recognition
2008-05-09Paper
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary
Cryptology and Network Security
2008-04-15Paper
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality
Lecture Notes in Computer Science
2008-04-11Paper


Research outcomes over time


This page was built for person: Arpita Patra