Aniket Kate

According to our database1, Aniket Kate authored at least 99 papers between 2007 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
hbACSS: How to Robustly Share Many Secrets.
IACR Cryptol. ePrint Arch., 2021

OpenSquare: Decentralized Repeated Modular Squaring Service.
IACR Cryptol. ePrint Arch., 2021

Collusion-Deterrent Threshold Information Escrow.
IACR Cryptol. ePrint Arch., 2021

Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications.
IACR Cryptol. ePrint Arch., 2021

Apollo - Optimistically Linear and Responsive SMR.
IACR Cryptol. ePrint Arch., 2021

Donner: UTXO-Based Virtual Channels Across Multiple Hops.
IACR Cryptol. ePrint Arch., 2021

Blitz: Secure Multi-Hop Payments Without Two-Phase Commits.
IACR Cryptol. ePrint Arch., 2021

Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Reparo: Publicly Verifiable Layer to Repair Blockchains.
Proceedings of the Financial Cryptography and Data Security, 2021

RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies.
Proc. Priv. Enhancing Technol., 2020

A Tale of Two Trees: One Writes, and Other Reads.
Proc. Priv. Enhancing Technol., 2020

Comprehensive Anonymity Trilemma: User Coordination is not enough.
Proc. Priv. Enhancing Technol., 2020

Verifiable Timed Signatures Made Practical.
IACR Cryptol. ePrint Arch., 2020

RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication.
IACR Cryptol. ePrint Arch., 2020

HACCLE: An Ecosystem for Building Secure Multi-Party Computations.
CoRR, 2020

"My Friend Wanted to Talk About It and I Didn't": Understanding Perceptions of Deletion Privacy in Social Platforms.
CoRR, 2020

Undercutting Bitcoin Is Not Profitable.
CoRR, 2020

Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms.
CoRR, 2020

Finding Safety in Numbers with Secure Allegation Escrows.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Lethe: Conceal Content Deletion from Persistent Observers.
Proc. Priv. Enhancing Technol., 2019

DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero.
IACR Cryptol. ePrint Arch., 2019

HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication.
IACR Cryptol. ePrint Arch., 2019

Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
IACR Cryptol. ePrint Arch., 2019

A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains.
CoRR, 2019

Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead.
CoRR, 2019

Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Towards Automatically Penalizing Multimedia Breaches (Extended Abstract).
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Flexible Signatures: Making Authentication Suitable for Real-Time Environments.
Proceedings of the Computer Security - ESORICS 2019, 2019

Reducing Automotive Counterfeiting Using Blockchain: Benefits and Challenges.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019

HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Blockchain Access Privacy: Challenges and Directions.
IEEE Secur. Priv., 2018

R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2018

Automated Penalization of Data Breaches using Crypto-augmented Smart Contracts.
IACR Cryptol. ePrint Arch., 2018

Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks.
IACR Cryptol. ePrint Arch., 2018

Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments.
IACR Cryptol. ePrint Arch., 2018

SATE: Robust and Private Allegation Escrows.
CoRR, 2018

ClearChart: Ensuring integrity of consumer ratings in online marketplaces.
Comput. Secur., 2018

Mind Your Credit: Assessing the Health of the Ripple Credit Network.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
PathShuffle: Credit Mixing and Anonymous Payments for Ripple.
Proc. Priv. Enhancing Technol., 2017

Longitudinal Privacy Management in Social Media: The Need for Better Controls.
IEEE Internet Comput., 2017

Concurrency and Privacy with Payment-Channel Networks.
IACR Cryptol. ePrint Arch., 2017

Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two.
IACR Cryptol. ePrint Arch., 2017

Encrypting Messages for Incomplete Chains of Certificates.
IACR Cryptol. ePrint Arch., 2017

Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers.
CoRR, 2017

SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Data Lineage in Malicious Environments.
IEEE Trans. Dependable Secur. Comput., 2016

Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network.
Proc. Priv. Enhancing Technol., 2016

AnoA: A Framework for Analyzing Anonymous Communication Protocols.
J. Priv. Confidentiality, 2016

P2P Mixing and Unlinkable Bitcoin Transactions.
IACR Cryptol. ePrint Arch., 2016

SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.
IACR Cryptol. ePrint Arch., 2016

cMix: Anonymization byHigh-Performance Scalable Mixing.
IACR Cryptol. ePrint Arch., 2016

Anonymous RAM.
IACR Cryptol. ePrint Arch., 2016

Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Introduction to Credit Networks: Security, Privacy, and Applications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget).
IACR Cryptol. ePrint Arch., 2015

Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Visigoth fault tolerance.
Proceedings of the Tenth European Conference on Computer Systems, 2015

Strength in Numbers: Robust Tamper Detection in Crowd Computations.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget).
Proceedings of the Applied Cryptography and Network Security, 2015

Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2014

Privacy-preserving Data Aggregation with Optimal Utility.
IACR Cryptol. ePrint Arch., 2014

(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
IACR Cryptol. ePrint Arch., 2014

Lime: Data Lineage in the Malicious Environment.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Asynchronous MPC with a strict honest majority using non-equivocation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
Proceedings of the Computer Security - ESORICS 2014, 2014

Differentially private data aggregation with optimal utility.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

BackRef: Accountability in Anonymous Communication Networks.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Towards Practical Communication in Byzantine-Resistant DHTs.
IEEE/ACM Trans. Netw., 2013

Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness.
IACR Cryptol. ePrint Arch., 2013

Asynchronous MPC with t<n/2 Using Non-equivocation.
IACR Cryptol. ePrint Arch., 2013

Introducing Accountability to Anonymity Networks.
CoRR, 2013

Identity-based steganography and its applications to censorship resistance.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Distributed Key Generation in the Wild.
IACR Cryptol. ePrint Arch., 2012

Asynchronous Computational VSS with Reduced Communication Complexity.
IACR Cryptol. ePrint Arch., 2012

Ace: an efficient key-exchange protocol for onion routing.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

On the (limited) power of non-equivocation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012

Brief announcement: distributed cryptography using trinc.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012

Adding query privacy to robust DHTs.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Generalizing cryptosystems based on the subset sum problem.
Int. J. Inf. Sec., 2011

Computational Verifiable Secret Sharing Revisited.
IACR Cryptol. ePrint Arch., 2011

Provably Secure and Practical Onion Routing.
IACR Cryptol. ePrint Arch., 2011

2010
Distributed Key Generation and Its Applications.
PhD thesis, 2010

Pairing-Based Onion Routing with Improved Forward Secrecy.
ACM Trans. Inf. Syst. Secur., 2010

Distributed Private-Key Generators for Identity-Based Cryptography.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Practical Robust Communication in DHTs Tolerating a Byzantine Adversary.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Constant-Size Commitments to Polynomials and Their Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Using Sphinx to Improve Onion Routing Circuit Construction.
IACR Cryptol. ePrint Arch., 2009

Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography.
IACR Cryptol. ePrint Arch., 2009

Distributed Key Generation for the Internet.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2007
Anonymity and security in delay tolerant networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Pairing-Based Onion Routing.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007


  Loading...