Arpita Patra

Orcid: 0000-0002-8036-4407

According to our database1, Arpita Patra authored at least 129 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Perfect Asynchronous MPC with Linear Communication Overhead.
IACR Cryptol. ePrint Arch., 2024

2023
Ruffle: Rapid 3-Party Shuffle Protocols.
Proc. Priv. Enhancing Technol., July, 2023

MPClan: Protocol Suite for Privacy-Conscious Computations.
J. Cryptol., July, 2023

Find Thy Neighbourhood: Privacy-Preserving Local Clustering.
Proc. Priv. Enhancing Technol., April, 2023

On the Communication Efficiency of Statistically Secure Asynchronous MPC with Optimal Resilience.
J. Cryptol., April, 2023

CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks.
IACR Cryptol. ePrint Arch., 2023

Entrada to Secure Graph Convolutional Networks.
IACR Cryptol. ePrint Arch., 2023

Shield: Secure Allegation Escrow System with Stronger Guarantees.
IACR Cryptol. ePrint Arch., 2023

sfAsterisk: Super-fast MPC with a Friend.
IACR Cryptol. ePrint Arch., 2023

Perfectly Secure Asynchronous Agreement on a Core Set in Constant Expected Time.
IACR Cryptol. ePrint Arch., 2023

Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time.
IACR Cryptol. ePrint Arch., 2023

The Round Complexity of Statistical MPC with Optimal Resiliency.
Electron. Colloquium Comput. Complex., 2023

2022
A Survey on Perfectly Secure Verifiable Secret-sharing.
ACM Comput. Surv., January, 2022

How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols.
Proc. Priv. Enhancing Technol., 2022

MPClan: Protocol Suite for Privacy-Conscious Computations.
IACR Cryptol. ePrint Arch., 2022

PentaGOD: Stepping beyond Traditional GOD with Five Parties.
IACR Cryptol. ePrint Arch., 2022

Vogue: Faster Computation of Private Heavy Hitters.
IACR Cryptol. ePrint Arch., 2022

Fully-Secure MPC with Minimal Trust.
IACR Cryptol. ePrint Arch., 2022

Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority.
IACR Cryptol. ePrint Arch., 2022

Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.
IACR Cryptol. ePrint Arch., 2022

On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness.
IACR Cryptol. ePrint Arch., 2022

Asymptotically Free Broadcast in Constant Expected Time via Packed VSS.
IACR Cryptol. ePrint Arch., 2022

Attaining GOD Beyond Honest Majority With Friends and Foes.
IACR Cryptol. ePrint Arch., 2022

Privadome: Protecting Citizen Privacy from Delivery Drones.
CoRR, 2022

Round-Optimal Honest-Majority MPC in Minicrypt and with Everlasting Security - (Extended Abstract).
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Verifiable Relation Sharing and Multi-verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority - (Extended Abstract).
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Poster MPClan: : Protocol Suite for Privacy-Conscious Computations.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Vogue: Faster Computation of Private Heavy Hitters.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
On the Exact Round Complexity of Secure Three-Party Computation.
J. Cryptol., 2021

SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation.
IACR Cryptol. ePrint Arch., 2021

Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2021

Tetrad: Actively Secure 4PC for Secure Training and Inference.
IACR Cryptol. ePrint Arch., 2021

Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security.
IACR Cryptol. ePrint Arch., 2021

Optimal extension protocols for byzantine broadcast and agreement.
Distributed Comput., 2021

2020
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning.
Proc. Priv. Enhancing Technol., 2020

The Power of Shunning: Efficient Asynchronous Byzantine Agreement Revisited.
J. ACM, 2020

ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2020

BLAZE: Blazing Fast Privacy-Preserving Machine Learning.
IACR Cryptol. ePrint Arch., 2020

On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation.
IACR Cryptol. ePrint Arch., 2020

SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning.
IACR Cryptol. ePrint Arch., 2020

The Resiliency of MPC with Low Interaction: The Benefit of Making Errors.
IACR Cryptol. ePrint Arch., 2020

The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency.
Electron. Colloquium Comput. Complex., 2020

The Resiliency of MPC with Low Interaction: The Benefit of Making Errors (Extended Abstract).
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

2019
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation.
IACR Cryptol. ePrint Arch., 2019

ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction.
IACR Cryptol. ePrint Arch., 2019

Fast Actively Secure Five-Party Computation with Security Beyond Abort.
IACR Cryptol. ePrint Arch., 2019

2018
On the Power of Hybrid Networks in Multi-Party Computation.
IEEE Trans. Inf. Theory, 2018

Efficient Adaptively Secure Zero-knowledge from Garbled Circuits.
IACR Cryptol. ePrint Arch., 2018

Crash-tolerant Consensus in Directed Graph Revisited.
IACR Cryptol. ePrint Arch., 2018

Fast Secure Computation for Small Population over the Internet.
IACR Cryptol. ePrint Arch., 2018

Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited.
IACR Cryptol. ePrint Arch., 2018

Crash-Tolerant Consensus in Directed Graph Revisited (Extended Abstract).
Proceedings of the Structural Information and Communication Complexity, 2018

2017
An Efficient Framework for Unconditionally Secure Multiparty Computation.
IEEE Trans. Inf. Theory, 2017

Efficient One-Sided Adaptively Secure Computation.
J. Cryptol., 2017

Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic.
IACR Cryptol. ePrint Arch., 2017

Round and Communication Efficient Unconditionally-secure MPC with t < n/3 in Partially Synchronous Network.
IACR Cryptol. ePrint Arch., 2017

Fast and Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security.
IACR Cryptol. ePrint Arch., 2017

Brief Announcement: Crash-Tolerant Consensus in Directed Graph Revisited.
Proceedings of the 31st International Symposium on Distributed Computing, 2017

Round and Communication Efficient Unconditionally-Secure MPC with t t n / 3 in Partially Synchronous Network.
Proceedings of the Information Theoretic Security - 10th International Conference, 2017

2016
Fast Actively Secure OT Extension for Short Secrets.
IACR Cryptol. ePrint Arch., 2016

Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Broadcast Extensions with Optimal Communication and Round Complexity.
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, 2016

2015
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation.
J. Cryptol., 2015

Selective Opening Security for Receivers.
IACR Cryptol. ePrint Arch., 2015

Adaptively Secure Computation with Partial Erasures.
IACR Cryptol. ePrint Arch., 2015

Linear Overhead Robust MPC with Honest Majority Using Preprocessing.
IACR Cryptol. ePrint Arch., 2015

Optimally Resilient Asynchronous MPC with Linear Communication Complexity.
Proceedings of the 2015 International Conference on Distributed Computing and Networking, 2015

2014
Reducing the Overhead of Cloud MPC.
IACR Cryptol. ePrint Arch., 2014

Key-Indistinguishable Message Authentication Codes.
IACR Cryptol. ePrint Arch., 2014

Anonymous Authentication with Shared Secrets.
IACR Cryptol. ePrint Arch., 2014

Asynchronous Byzantine Agreement with optimal resilience.
Distributed Comput., 2014

Reducing the Overhead of MPC over a Large Population.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

2013
One-Sided Adaptively Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2013

Between a Rock and a Hard Place: Interpolating Between MPC and FHE.
IACR Cryptol. ePrint Arch., 2013

Asynchronous Multiparty Computation with Linear Communication Complexity.
Proceedings of the Distributed Computing - 27th International Symposium, 2013

2012
On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission.
J. ACM, 2012

Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity.
IACR Cryptol. ePrint Arch., 2012

Brief announcement: efficient optimally resilient statistical AVSS and its applications.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012

2011
Secure message transmission in asynchronous networks.
J. Parallel Distributed Comput., 2011

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity.
IACR Cryptol. ePrint Arch., 2011

On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks.
IACR Cryptol. ePrint Arch., 2011

Statistical Asynchronous Weak Commitment Scheme: A New Primitive to Design Statistical Asynchronous Verifiable Secret Sharing Scheme.
IACR Cryptol. ePrint Arch., 2011

Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary.
IACR Cryptol. ePrint Arch., 2011

Computational Verifiable Secret Sharing Revisited.
IACR Cryptol. ePrint Arch., 2011

The Round Complexity of Perfectly Secure General VSS.
Proceedings of the Information Theoretic Security - 5th International Conference, 2011

2010
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality.
Int. J. Appl. Cryptogr., 2010

Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2010

Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation.
IACR Cryptol. ePrint Arch., 2010

The Round Complexity of General VSS.
IACR Cryptol. ePrint Arch., 2010

Communication and Round Efficient Information Checking Protocol
CoRR, 2010

Brief announcement: communication efficient asynchronous byzantine agreement.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Brief announcement: perfectly secure message transmissiontolerating mobile mixed adversary with reduced phase complexity.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

Communication Optimal Multi-valued Asynchronous Broadcast Protocol.
Proceedings of the Progress in Cryptology, 2010

On Communication Complexity of Secure Message Transmission in Directed Networks.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010

The Round Complexity of Verifiable Secret Sharing: The Statistical Case.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Perfectly reliable and secure message transmission tolerating mobile adversary.
Int. J. Appl. Cryptogr., 2009

Communication Optimal Multi-Valued Asynchronous Byzantine Agreement with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2009

Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2009

On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks.
IACR Cryptol. ePrint Arch., 2009

Information Theoretically Secure Multi Party Set Intersection Re-Visited.
IACR Cryptol. ePrint Arch., 2009

Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security.
IACR Cryptol. ePrint Arch., 2009

Brief announcement: perfectly secure message transmission in directed networks re-visited.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Simple and efficient asynchronous byzantine agreement with optimal resilience.
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009

Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience.
Proceedings of the Progress in Cryptology, 2009

Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009

On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009

Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
Enhancing decision combination of face and fingerprint by exploitation of individual classifier space: An approach to multi-modal biometry.
Pattern Recognit., 2008

Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary.
IACR Cryptol. ePrint Arch., 2008

Unconditionally Reliable Message Transmission in Directed Hypergraphs.
IACR Cryptol. ePrint Arch., 2008

The Round Complexity of Verifiable Secret Sharing Revisited.
IACR Cryptol. ePrint Arch., 2008

Unconditionally Secure Multiparty Set Intersection Re-Visited.
IACR Cryptol. ePrint Arch., 2008

Efficient Asynchronous Multiparty Computation with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2008

Efficient Asynchronous Byzantine Agreement with Optimal Resilience.
IACR Cryptol. ePrint Arch., 2008

Round Efficient Unconditionally Secure Multiparty Computation Protocol.
IACR Cryptol. ePrint Arch., 2008

Statistically Reliable and Secure Message Transmission in Directed Networks.
IACR Cryptol. ePrint Arch., 2008

Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary.
IACR Cryptol. ePrint Arch., 2008

Perfectly Secure Message Transmission Tolerating Mixed Adversary.
IACR Cryptol. ePrint Arch., 2008

Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Efficient single phase unconditionally secure message transmission with optimum communication complexity.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary.
Proceedings of the Twenty-Seventh Annual ACM Symposium on Principles of Distributed Computing, 2008

Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary.
Proceedings of the Information Theoretic Security, Third International Conference, 2008

Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Indoor versus Outdoor Scene Classification Using Probabilistic Neural Network.
EURASIP J. Adv. Signal Process., 2007

Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary.
Proceedings of the Distributed Computing, 21st International Symposium, 2007

Constant phase efficient protocols for secure message transmission in directed networks.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality.
Proceedings of the Progress in Cryptology, 2007

Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

2006
Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission.
Proceedings of the Progress in Cryptology, 2006


  Loading...