Arpita Patra
Orcid: 0000-0002-0188-6558
According to our database1,
Arpita Patra
authored at least 142 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Information Security and Cryptography, Springer, ISBN: 978-3-031-80459-5, 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2025
Pay What You Spend! Privacy-Aware Real-Time Pricing with High Precision IEEE 754 Floating Point Division.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025
2024
IEEE Trans. Dependable Secur. Comput., 2024
Asynchronous Agreement on a Core Set in Constant Expected Time and More Efficient Asynchronous VSS and MPC.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023
Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
ACM Comput. Surv., January, 2022
IACR Cryptol. ePrint Arch., 2022
On the Communication Efficiency of Statistically-Secure Asynchronous MPC with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2022
Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Round-Optimal Honest-Majority MPC in Minicrypt and with Everlasting Security - (Extended Abstract).
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Verifiable Relation Sharing and Multi-verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Distributed Comput., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
J. ACM, 2020
IACR Cryptol. ePrint Arch., 2020
The Resiliency of MPC with Low Interaction: The Benefit of Making Errors (Extended Abstract).
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
IEEE Trans. Inf. Theory, 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Structural Information and Communication Complexity, 2018
Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IEEE Trans. Inf. Theory, 2017
Round and Communication Efficient Unconditionally-secure MPC with t < n/3 in Partially Synchronous Network.
IACR Cryptol. ePrint Arch., 2017
Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 31st International Symposium on Distributed Computing, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Round and Communication Efficient Unconditionally-Secure MPC with t t n / 3 in Partially Synchronous Network.
Proceedings of the Information Theoretic Security - 10th International Conference, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, 2016
2015
J. Cryptol., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 ACM Symposium on Principles of Distributed Computing, 2015
Proceedings of the 2015 International Conference on Distributed Computing and Networking, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Progress in Cryptology - LATINCRYPT 2014, 2014
2013
Proceedings of the Distributed Computing - 27th International Symposium, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission.
J. ACM, 2012
Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity.
IACR Cryptol. ePrint Arch., 2012
Brief announcement: efficient optimally resilient statistical AVSS and its applications.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012
2011
J. Parallel Distributed Comput., 2011
Statistical Asynchronous Weak Commitment Scheme: A New Primitive to Design Statistical Asynchronous Verifiable Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2011
Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity.
Proceedings of the Principles of Distributed Systems - 15th International Conference, 2011
Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience.
Proceedings of the Information Theoretic Security - 5th International Conference, 2011
Proceedings of the Information Theoretic Security - 5th International Conference, 2011
On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary.
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality.
Int. J. Appl. Cryptogr., 2010
Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Brief announcement: perfectly secure message transmissiontolerating mobile mixed adversary with reduced phase complexity.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Proceedings of the Progress in Cryptology, 2010
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience.
Proceedings of the Progress in Cryptology, 2010
2009
Int. J. Appl. Cryptogr., 2009
Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2009
On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Brief announcement: perfectly secure message transmission in directed networks re-visited.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience.
Proceedings of the Progress in Cryptology, 2009
Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009
Proceedings of the Advances in Cryptology, 2009
Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary.
Proceedings of the 2009 ACM Symposium on Information, 2009
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
Enhancing decision combination of face and fingerprint by exploitation of individual classifier space: An approach to multi-modal biometry.
Pattern Recognit., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Efficient single phase unconditionally secure message transmission with optimum communication complexity.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008
On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008
Proceedings of the Progress in Cryptology, 2008
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary.
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
EURASIP J. Adv. Signal Process., 2007
Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary.
Proceedings of the Distributed Computing, 21st International Symposium, 2007
Constant phase efficient protocols for secure message transmission in directed networks.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007
Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality.
Proceedings of the Progress in Cryptology, 2007
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
2006
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission.
Proceedings of the Progress in Cryptology, 2006