Arpita Patra

Orcid: 0000-0002-0188-6558

According to our database1, Arpita Patra authored at least 142 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Fault-Tolerant Distributed Consensus in Synchronous Networks
Information Security and Cryptography, Springer, ISBN: 978-3-031-80459-5, 2025

Match Quest: Fast and Secure Pattern Matching.
Proc. Priv. Enhancing Technol., 2025

Breaking the Barrier for Asynchronous MPC with a Friend.
IACR Cryptol. ePrint Arch., 2025

emGraph: Efficient Multiparty Secure Graph Computation.
IACR Cryptol. ePrint Arch., 2025

New Upper and Lower Bounds for Perfectly Secure MPC.
IACR Cryptol. ePrint Arch., 2025

Information-theoretic MPC with Constant Communication Overhead.
IACR Cryptol. ePrint Arch., 2025

Perfectly-secure Network-agnostic MPC with Optimal Resiliency.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2025

Pay What You Spend! Privacy-Aware Real-Time Pricing with High Precision IEEE 754 Floating Point Division.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Vogue: Faster Computation of Private Heavy Hitters.
IEEE Trans. Dependable Secur. Comput., 2024

Privadome: Delivery Drones and Citizen Privacy.
Proc. Priv. Enhancing Technol., 2024

QuickPool: Privacy-Preserving Ride-Sharing Service.
IACR Cryptol. ePrint Arch., 2024

Asynchronous Agreement on a Core Set in Constant Expected Time and More Efficient Asynchronous VSS and MPC.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Asterisk: Super-fast MPC with a Friend.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Perfect Asynchronous MPC with Linear Communication Overhead.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Graphiti: Secure Graph Computation Made More Scalable.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
MPClan: Protocol Suite for Privacy-Conscious Computations.
J. Cryptol., July, 2023

CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks.
IACR Cryptol. ePrint Arch., 2023

Entrada to Secure Graph Convolutional Networks.
IACR Cryptol. ePrint Arch., 2023

sfAsterisk: Super-fast MPC with a Friend.
IACR Cryptol. ePrint Arch., 2023

Perfectly Secure Asynchronous Agreement on a Core Set in Constant Expected Time.
IACR Cryptol. ePrint Arch., 2023

Ruffle: Rapid 3-party shuffle protocols.
IACR Cryptol. ePrint Arch., 2023

Shield: Secure Allegation Escrow System with Stronger Guarantees.
Proceedings of the ACM Web Conference 2023, 2023

The Round Complexity of Statistical MPC with Optimal Resiliency.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
A Survey on Perfectly Secure Verifiable Secret-sharing.
ACM Comput. Surv., January, 2022

MPClan: Protocol Suite for Privacy-Conscious Computations.
IACR Cryptol. ePrint Arch., 2022

On the Communication Efficiency of Statistically-Secure Asynchronous MPC with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2022

Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority.
IACR Cryptol. ePrint Arch., 2022

Find Thy Neighbourhood: Privacy-Preserving Local Clustering.
IACR Cryptol. ePrint Arch., 2022

Privadome: Protecting Citizen Privacy from Delivery Drones.
CoRR, 2022

Fully-Secure MPC with Minimal Trust.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Round-Optimal Honest-Majority MPC in Minicrypt and with Everlasting Security - (Extended Abstract).
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Asymptotically Free Broadcast in Constant Expected Time via Packed VSS.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Tetrad: Actively Secure 4PC for Secure Training and Inference.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Verifiable Relation Sharing and Multi-verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Poster MPClan: : Protocol Suite for Privacy-Conscious Computations.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

PentaGOD: Stepping beyond Traditional GOD with Five Parties.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Vogue: Faster Computation of Private Heavy Hitters.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Attaining GOD Beyond Honest Majority with Friends and Foes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2021

Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security.
IACR Cryptol. ePrint Arch., 2021

Optimal extension protocols for byzantine broadcast and agreement.
Distributed Comput., 2021

ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
Proceedings of the 30th USENIX Security Symposium, 2021

SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning.
Proceedings of the 30th USENIX Security Symposium, 2021

SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021

Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
The Power of Shunning: Efficient Asynchronous Byzantine Agreement Revisited.
J. ACM, 2020

The Resiliency of MPC with Low Interaction: The Benefit of Making Errors.
IACR Cryptol. ePrint Arch., 2020

The Resiliency of MPC with Low Interaction: The Benefit of Making Errors (Extended Abstract).
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

BLAZE: Blazing Fast Privacy-Preserving Machine Learning.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency.
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

On the Exact Round Complexity of Best-of-Both-Worlds Multi-party Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning.
IACR Cryptol. ePrint Arch., 2019

ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

Fast Actively Secure Five-Party Computation with Security Beyond Abort.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
On the Power of Hybrid Networks in Multi-Party Computation.
IEEE Trans. Inf. Theory, 2018

Crash-tolerant Consensus in Directed Graph Revisited.
IACR Cryptol. ePrint Arch., 2018

Crash-Tolerant Consensus in Directed Graph Revisited (Extended Abstract).
Proceedings of the Structural Information and Communication Complexity, 2018

Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited.
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018

Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

On the Exact Round Complexity of Secure Three-Party Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Fast Secure Computation for Small Population over the Internet.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
An Efficient Framework for Unconditionally Secure Multiparty Computation.
IEEE Trans. Inf. Theory, 2017

Efficient One-Sided Adaptively Secure Computation.
J. Cryptol., 2017

Round and Communication Efficient Unconditionally-secure MPC with t < n/3 in Partially Synchronous Network.
IACR Cryptol. ePrint Arch., 2017

Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security.
IACR Cryptol. ePrint Arch., 2017

Brief Announcement: Crash-Tolerant Consensus in Directed Graph Revisited.
Proceedings of the 31st International Symposium on Distributed Computing, 2017

Fast Actively Secure OT Extension for Short Secrets.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Round and Communication Efficient Unconditionally-Secure MPC with t t n / 3 in Partially Synchronous Network.
Proceedings of the Information Theoretic Security - 10th International Conference, 2017

Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Broadcast Extensions with Optimal Communication and Round Complexity.
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, 2016

2015
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation.
J. Cryptol., 2015

Linear Overhead Robust MPC with Honest Majority Using Preprocessing.
IACR Cryptol. ePrint Arch., 2015

Adaptively Secure Computation with Partial Erasures.
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015

Optimally Resilient Asynchronous MPC with Linear Communication Complexity.
Proceedings of the 2015 International Conference on Distributed Computing and Networking, 2015

Selective Opening Security for Receivers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Reducing the Overhead of Cloud MPC.
IACR Cryptol. ePrint Arch., 2014

Asynchronous Byzantine Agreement with optimal resilience.
Distributed Comput., 2014

One-Sided Adaptively Secure Two-Party Computation.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Reducing the Overhead of MPC over a Large Population.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Key-Indistinguishable Message Authentication Codes.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Anonymous Authentication with Shared Secrets.
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014

2013
Asynchronous Multiparty Computation with Linear Communication Complexity.
Proceedings of the Distributed Computing - 27th International Symposium, 2013

Between a Rock and a Hard Place: Interpolating between MPC and FHE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission.
J. ACM, 2012

Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity.
IACR Cryptol. ePrint Arch., 2012

Brief announcement: efficient optimally resilient statistical AVSS and its applications.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012

2011
Secure message transmission in asynchronous networks.
J. Parallel Distributed Comput., 2011

Statistical Asynchronous Weak Commitment Scheme: A New Primitive to Design Statistical Asynchronous Verifiable Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2011

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity.
Proceedings of the Principles of Distributed Systems - 15th International Conference, 2011

Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience.
Proceedings of the Information Theoretic Security - 5th International Conference, 2011

The Round Complexity of Perfectly Secure General VSS.
Proceedings of the Information Theoretic Security - 5th International Conference, 2011

On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Computational Verifiable Secret Sharing Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality.
Int. J. Appl. Cryptogr., 2010

Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation.
IACR Cryptol. ePrint Arch., 2010

The Round Complexity of General VSS.
IACR Cryptol. ePrint Arch., 2010

Communication and Round Efficient Information Checking Protocol
CoRR, 2010

Brief announcement: communication efficient asynchronous byzantine agreement.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Brief announcement: perfectly secure message transmissiontolerating mobile mixed adversary with reduced phase complexity.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Communication Optimal Multi-valued Asynchronous Broadcast Protocol.
Proceedings of the Progress in Cryptology, 2010

On Communication Complexity of Secure Message Transmission in Directed Networks.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010

The Round Complexity of Verifiable Secret Sharing: The Statistical Case.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience.
Proceedings of the Progress in Cryptology, 2010

2009
Perfectly reliable and secure message transmission tolerating mobile adversary.
Int. J. Appl. Cryptogr., 2009

Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2009

On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks.
IACR Cryptol. ePrint Arch., 2009

Information Theoretically Secure Multi Party Set Intersection Re-visited.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Brief announcement: perfectly secure message transmission in directed networks re-visited.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Simple and efficient asynchronous byzantine agreement with optimal resilience.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience.
Proceedings of the Progress in Cryptology, 2009

Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009

On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009

The Round Complexity of Verifiable Secret Sharing Revisited.
Proceedings of the Advances in Cryptology, 2009

Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary.
Proceedings of the 2009 ACM Symposium on Information, 2009

Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

2008
Enhancing decision combination of face and fingerprint by exploitation of individual classifier space: An approach to multi-modal biometry.
Pattern Recognit., 2008

Unconditionally Secure Multiparty Set Intersection Re-Visited.
IACR Cryptol. ePrint Arch., 2008

Efficient Asynchronous Multiparty Computation with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2008

Efficient Asynchronous Byzantine Agreement with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2008

Statistically Reliable and Secure Message Transmission in Directed Networks.
IACR Cryptol. ePrint Arch., 2008

Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary.
IACR Cryptol. ePrint Arch., 2008

Perfectly Secure Message Transmission Tolerating Mixed Adversary.
IACR Cryptol. ePrint Arch., 2008

Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Efficient single phase unconditionally secure message transmission with optimum communication complexity.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

Round Efficient Unconditionally Secure Multiparty Computation Protocol.
Proceedings of the Progress in Cryptology, 2008

Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary.
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Unconditionally Reliable Message Transmission in Directed Hypergraphs.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Indoor versus Outdoor Scene Classification Using Probabilistic Neural Network.
EURASIP J. Adv. Signal Process., 2007

Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary.
Proceedings of the Distributed Computing, 21st International Symposium, 2007

Constant phase efficient protocols for secure message transmission in directed networks.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality.
Proceedings of the Progress in Cryptology, 2007

Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

2006
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission.
Proceedings of the Progress in Cryptology, 2006


  Loading...