Elaine Shi

Orcid: 0000-0002-5605-1048

Affiliations:
  • Carnegie Mellon University, USA
  • Cornell University, Ithaca, NY, USA (former)


According to our database1, Elaine Shi authored at least 238 papers between 2004 and 2025.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2023, "For contributions to the scientific foundation of oblivious computation and decentralized blockchains".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Implementation of Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting.
Dataset, April, 2025

Implementation of Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting.
Dataset, January, 2025

Decentralized Data Archival: New Definitions and Constructions.
IACR Cryptol. ePrint Arch., 2025

Zelda: Efficient Multi-server Preprocessing PIR with Unconditional Security.
IACR Cryptol. ePrint Arch., 2025

Fairness in the Wild: Secure Atomic Swap with External Incentives.
IACR Cryptol. ePrint Arch., 2025

Pacmann: Efficient Private Approximate Nearest Neighbor Search.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

Quasi-Linear Indistinguishability Obfuscation via Mathematical Proofs of Equivalence and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Pseudorandom Functions with Weak Programming Privacy and Applications to Private Information Retrieval.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

PicoGRAM: Practical Garbled RAM from Decisional Diffie-Hellman.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Foundations of Platform-Assisted Auctions.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Mechanism Design for Automated Market Makers.
Proceedings of the 7th Conference on Advances in Financial Technologies, 2025

2024
Implementation of Flexway O-Sort: Enclave-Friendly and Optimal Oblivious Sorting.
Dataset, January, 2024

Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware.
Proc. Priv. Enhancing Technol., 2024

MicroSecAgg: Streamlined Single-Server Secure Aggregation.
Proc. Priv. Enhancing Technol., 2024

Continual Observation of Joins under Differential Privacy.
Proc. ACM Manag. Data, 2024

Information-Theoretic Multi-Server PIR with Global Preprocessing.
IACR Cryptol. ePrint Arch., 2024

On the Viability of Open-Source Financial Rails: Economic Security of Permissionless Consensus.
CoRR, 2024

Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy.
CoRR, 2024

Connected Components in Linear Work and Near-Optimal Time.
Proceedings of the 36th ACM Symposium on Parallelism in Algorithms and Architectures, 2024

Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Collusion-Resilience in Transaction Fee Mechanism Design.
Proceedings of the 25th ACM Conference on Economics and Computation, 2024

Advanced Composition Theorems for Differential Obliviousness.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

Maximizing Miner Revenue in Transaction Fee Mechanism Design.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

Efficient Pre-processing PIR Without Public-Key Cryptography.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Conan: Distributed Proofs of Compliance for Anonymous Data Collection.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
A Core Calculus for Equational Proofs of Cryptographic Protocols.
Proc. ACM Program. Lang., January, 2023

XCRYPT: Accelerating Lattice-Based Cryptography With Memristor Crossbar Arrays.
IEEE Micro, 2023

Proof of Compliance for Anonymous, Unlinkable Messages.
IACR Cryptol. ePrint Arch., 2023

Can open decentralized ledgers be economically secure?
IACR Cryptol. ePrint Arch., 2023

Efficient Oblivious Sorting and Shuffling for Hardware Enclaves.
IACR Cryptol. ePrint Arch., 2023

EnigMap: External-Memory Oblivious Map for Secure Enclaves.
Proceedings of the 32nd USENIX Security Symposium, 2023

Non-Interactive Anonymous Router with Quasi-Linear Router Computation.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Distributed-Prover Interactive Proofs.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Foundations of Transaction Fee Mechanism Design.
Proceedings of the 2023 ACM-SIAM Symposium on Discrete Algorithms, 2023

On the Amortized Communication Complexity of Byzantine Broadcast.
Proceedings of the 2023 ACM Symposium on Principles of Distributed Computing, 2023

Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Efficient Dynamic Proof of Retrievability for Cold Storage.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

What Can Cryptography Do for Decentralized Mechanism Design?
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

A Theory of Composition for Differential Obliviousness.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Optimal Single-Server Private Information Retrieval.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Sorting Short Keys in Circuits of Size ${o(n \log n)}$.
SIAM J. Comput., 2022

Differentially Oblivious Relational Database Operators.
Proc. VLDB Endow., 2022

The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms.
IACR Cryptol. ePrint Arch., 2022

EnigMap: Signal Should Use Oblivious Algorithms for Private Contact Discovery.
IACR Cryptol. ePrint Arch., 2022

log*-Round Game-Theoretically-Fair Leader Election.
IACR Cryptol. ePrint Arch., 2022

MicroFedML: Privacy Preserving Federated Learning for Small Weights.
IACR Cryptol. ePrint Arch., 2022

Non-Interactive Anonymous Router with Quasi-Linear Router Computation.
IACR Cryptol. ePrint Arch., 2022

Rapidash: Improved Constructions for Side-Contract-Resilient Fair Exchange.
IACR Cryptol. ePrint Arch., 2022

Ponyta: Foundations of Side-Contract-Resilient Fair Exchange.
IACR Cryptol. ePrint Arch., 2022

Adore: Differentially Oblivious Relational Database Operators.
CoRR, 2022

STAMP: Lightweight TEE-Assisted MPC for Efficient Privacy-Preserving Machine Learning.
CoRR, 2022

Polynomial Commitment with a One-to-Many Prover and Applications.
Proceedings of the 31st USENIX Security Symposium, 2022

Locally Differentially Private Sparse Vector Aggregation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Optimal Sorting Circuits for Short Keys.
Proceedings of the 2022 ACM-SIAM Symposium on Discrete Algorithms, 2022

Optimal Oblivious Parallel RAM.
Proceedings of the 2022 ACM-SIAM Symposium on Discrete Algorithms, 2022

Revisiting the Power of Non-Equivocation in Distributed Protocols.
Proceedings of the PODC '22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25, 2022

A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

log <sup>*</sup>-Round Game-Theoretically-Fair Leader Election.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Maliciously Secure Massively Parallel Computation for All-but-One Corruptions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Differentially Private Densest Subgraph.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

2021
IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols.
IACR Cryptol. ePrint Arch., 2021

Non-Interactive Differentially Anonymous Router.
IACR Cryptol. ePrint Arch., 2021

Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report).
IACR Cryptol. ePrint Arch., 2021

Data Oblivious Algorithms for Multicores.
Proceedings of the SPAA '21: 33rd ACM Symposium on Parallelism in Algorithms and Architectures, 2021

Sorting Short Keys in Circuits of Size <i>o</i>(<i>n</i> log <i>n</i>).
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021

Viaduct: an extensible, optimizing compiler for secure distributed programs.
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021

Differentially Oblivious Turing Machines.
Proceedings of the 12th Innovations in Theoretical Computer Science Conference, 2021

Selfish Mining Attacks Exacerbated by Elastic Hash Supply.
Proceedings of the Financial Cryptography and Data Security, 2021

Non-Interactive Anonymous Router.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Game-Theoretic Fairness Meets Multi-party Protocols: The Case of Leader Election.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Oblivious RAM with Worst-Case Logarithmic Overhead.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

Streamlet: An Absurdly Simple, Textbook Blockchain Protocol.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
A Retrospective on Path ORAM.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

Puncturable Pseudorandom Sets and Private Information Retrieval with Polylogarithmic Bandwidth and Sublinear Time.
IACR Cryptol. ePrint Arch., 2020

Game-Theoretically Fair Leader Election in O(log log n) Rounds under Majority Coalitions.
IACR Cryptol. ePrint Arch., 2020

Perfectly Secure Oblivious Parallel RAM with O(log<sup>3</sup> N/ log log N) Overhead.
IACR Cryptol. ePrint Arch., 2020

Blockchain with Varying Number of Players.
IACR Cryptol. ePrint Arch., 2020

Improved Extension Protocols for Byzantine Broadcast and Agreement.
Proceedings of the 34th International Symposium on Distributed Computing, 2020

Expected Constant Round Byzantine Broadcast Under Dishonest Majority.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Round-Efficient Byzantine Broadcast Under Strongly Adaptive and Majority Corruptions.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Secure Massively Parallel Computation for Dishonest Majority.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels.
Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, 2020

Bucket Oblivious Sort: An Extremely Simple Oblivious Sort.
Proceedings of the 3rd Symposium on Simplicity in Algorithms, 2020

Sublinear-Round Byzantine Agreement Under Corrupt Majority.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

Oblivious Parallel Tight Compaction.
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020

OptORAMa: Optimal Oblivious RAM.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

On the Adaptive Security of MACs and PRFs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

Streamlet: Textbook Streamlined Blockchains.
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, 2020

2019
Path Oblivious Heap.
IACR Cryptol. ePrint Arch., 2019

IPDL: A Probabilistic Dataflow Logic for Cryptography.
IACR Cryptol. ePrint Arch., 2019

Round Complexity of Byzantine Agreement, Revisited.
IACR Cryptol. ePrint Arch., 2019

Lower bounds for external memory integer sorting via network coding.
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019

Towards Automated Safety Vetting of PLC Code in Real-World Plants.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Can We Overcome the n log n Barrier for Oblivious Sorting?
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019

Foundations of Differentially Oblivious Algorithms.
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019

Communication Complexity of Byzantine Agreement, Revisited.
Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing, 2019

Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake.
Proceedings of the Financial Cryptography and Data Security, 2019

Consensus Through Herding.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Locality-Preserving Oblivious RAM.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Analysis of Deterministic Longest-Chain Protocols.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

Synchronous, with a Chance of Partition Tolerance.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey).
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Path ORAM: An Extremely Simple Oblivious RAM Protocol.
J. ACM, 2018

PaLa: A Simple Partially Synchronous Blockchain.
IACR Cryptol. ePrint Arch., 2018

PiLi: An Extremely Simple Synchronous Blockchain.
IACR Cryptol. ePrint Arch., 2018

OptORAMa: Optimal Oblivious RAM.
IACR Cryptol. ePrint Arch., 2018

Communication-Efficient Byzantine Agreement without Erasures.
CoRR, 2018

Game Theoretic Notions of Fairness in Multi-party Coin Toss.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Perfectly Secure Oblivious Parallel RAM.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

xJsnark: A Framework for Efficient Verifiable Computation.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Cache-Oblivious and Data-Oblivious Sorting and Applications.
Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms, 2018

Thunderella: Blockchains with Optimistic Instant Confirmation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Symbolic Proofs for Lattice-Based Cryptography.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

More is Less: Perfectly Secure Oblivious Algorithms in the Multi-server Setting.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Distributed Private Data Analysis: Lower Bounds and Practical Constructions.
ACM Trans. Algorithms, 2017

Oblivious Computation with Data Locality.
IACR Cryptol. ePrint Arch., 2017

Hybrid Consensus: Efficient Consensus in the Permissionless Model.
Proceedings of the 31st International Symposium on Distributed Computing, 2017

Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

FruitChains: A Fair Blockchain.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

HOP: Hardware makes Obfuscation Practical.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Formal Abstractions for Attested Execution Secure Processors.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Rethinking Large-Scale Consensus.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Solidus: Confidential Distributed Ledger Transactions via PVORM.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

The Sleepy Model of Consensus.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

On the Depth of Oblivious Parallel RAM.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Circuit OPRAM: A (Somewhat) Tight Oblivious Parallel RAM.
IACR Cryptol. ePrint Arch., 2016

Snow White: Provably Secure Proofs of Stake.
IACR Cryptol. ePrint Arch., 2016

The Sleepy Model of Consensus.
IACR Cryptol. ePrint Arch., 2016

Characterizing Long-tail SEO Spam on Cloud Web Hosting Services.
Proceedings of the 25th International Conference on World Wide Web, 2016

Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Understanding Craigslist Rental Scams.
Proceedings of the Financial Cryptography and Data Security, 2016

Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab.
Proceedings of the Financial Cryptography and Data Security, 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Town Crier: An Authenticated Data Feed for Smart Contracts.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

The Honey Badger of BFT Protocols.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

The Ring of Gyges: Investigating the Future of Criminal Smart Contracts.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Case Study: Rental Scams.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Case Study: Sales Scams.
Proceedings of the Understanding Social Engineering Based Scams, 2016

Identifying Scams and Trends.
Proceedings of the Understanding Social Engineering Based Scams, 2016

2015
How to Authenticate any Data Structure.
Tiny Trans. Comput. Sci., 2015

iDASH Secure Genome Analysis Competition Using ObliVM.
IACR Cryptol. ePrint Arch., 2015

Secure Dating with Four or Fewer Cards.
IACR Cryptol. ePrint Arch., 2015

How to Use SNARKs in Universally Composable Protocols.
IACR Cryptol. ePrint Arch., 2015

Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM.
IACR Cryptol. ePrint Arch., 2015

Oblivious Network RAM.
IACR Cryptol. ePrint Arch., 2015

Constants Count: Practical Improvements to Oblivious RAM.
Proceedings of the 24th USENIX Security Symposium, 2015

Multi-Client Verifiable Computation with Stronger Security Guarantees.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Locally Decodable and Updatable Non-malleable Codes and Their Applications.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

GraphSC: Parallel Secure Computation Made Easy.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

ObliVM: A Programming Framework for Secure Computation.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Constant-Round MPC with Fairness and Guarantee of Output Delivery.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Joint Link Prediction and Attribute Inference Using a Social-Attribute Network.
ACM Trans. Intell. Syst. Technol., 2014

Oblivious Data Structures.
IACR Cryptol. ePrint Arch., 2014

Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM.
IACR Cryptol. ePrint Arch., 2014

TRUESET: Nearly Practical Verifiable Set Computations.
IACR Cryptol. ePrint Arch., 2014

Pseudonymous Secure Computation from Time-Lock Puzzles.
IACR Cryptol. ePrint Arch., 2014

Adaptively Secure Fully Homomorphic Signatures Based on Lattices.
IACR Cryptol. ePrint Arch., 2014

SDDR: Light-Weight, Secure Mobile Encounters.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

TRUESET: Faster Verifiable Set Computations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Permacoin: Repurposing Bitcoin Work for Data Preservation.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Automating Efficient RAM-Model Secure Computation.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

A secure computation framework for SDNs.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Authenticated data structures, generically.
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014

Verifiable Oblivious Storage.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Practical Dynamic Searchable Encryption with Small Leakage.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Scambaiter: Understanding Targeted Nigerian Scams on Craigslist.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

EnCore: private, context-based communication for mobile social apps.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Multi-input Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Oblivious Data Structures.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

SCORAM: Oblivious RAM for Secure Computation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Emil Stefanov: Bridging the Theory and Practice of Cloud Computing Security.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

ShadowCrypt: Encrypted Web Applications for Everyone.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Multi-Input Functional Encryption.
IACR Cryptol. ePrint Arch., 2013

Signatures of Correct Computation.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

ObliviStore: High Performance Oblivious Cloud Storage.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

ObliviStore: High Performance Oblivious Distributed Cloud Data Store.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Streaming Authenticated Data Structures.
Proceedings of the Advances in Cryptology, 2013

Memory Trace Oblivious Program Execution.
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013

Multi-cloud oblivious storage.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Path ORAM: an extremely simple oblivious RAM protocol.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Practical dynamic proofs of retrievability.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Summary/overview for artificial intelligence and security (AISec'13).
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

PHANTOM: practical oblivious computation in a secure processor.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
FastPRP: Fast Pseudo-Random Permutations for Small Domains.
IACR Cryptol. ePrint Arch., 2012

Path O-RAM: An Extremely Simple Oblivious RAM Protocol
CoRR, 2012

Cloud Data Protection for the Masses.
Computer, 2012

Context-centric Security.
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012

GUPT: privacy preserving data analysis made easy.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012

Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Towards Practical Oblivious RAM.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Opaak: using mobile phones to limit anonymous identities online.
Proceedings of the 10th International Conference on Mobile Systems, 2012

Privacy-Preserving Stream Aggregation with Fault Tolerance.
Proceedings of the Financial Cryptography and Data Security, 2012

Bitter to Better - How to Make Bitcoin a Better Currency.
Proceedings of the Financial Cryptography and Data Security, 2012

Optimal Lower Bound for Differentially Private Multi-party Aggregation.
Proceedings of the Algorithms - ESA 2012, 2012

2011
Oblivious RAM with O((log N)<sup>3</sup>) Worst-Case Cost.
IACR Cryptol. ePrint Arch., 2011

Publicly Verifiable Delegation of Computation.
IACR Cryptol. ePrint Arch., 2011

Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN)
CoRR, 2011

Efficient and secure threshold-based event validation for VANETs.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Privacy settings from contextual attributes: A case study using Google Buzz.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Privacy-Preserving Aggregation of Time-Series Data.
Proceedings of the Network and Distributed System Security Symposium, 2011

Link prediction by de-anonymization: How We Won the Kaggle Social Network Challenge.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011

Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

Oblivious RAM with O((logN)3) Worst-Case Cost.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Implicit Authentication through Learning User Behavior.
Proceedings of the Information Security - 13th International Conference, 2010

Private and Continual Release of Statistics.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010

Signatures of Reputation.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Authentication in the clouds: a framework and its application to mobile users.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Predicate Privacy in Encryption Systems.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Controlling data in the cloud: outsourcing computation without outsourcing control.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Delegating Capabilities in Predicate Encryption Systems.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

2007
Multi-Dimensional Range Query over Encrypted Data.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Portcullis: protecting connection setup from denial-of-capability attacks.
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007

2005
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Detection of Denial-of-Message Attacks on Sensor Network Broadcasts.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005

2004
Designing secure sensor networks.
IEEE Wirel. Commun., 2004

The sybil attack in sensor networks: analysis & defenses.
Proceedings of the Third International Symposium on Information Processing in Sensor Networks, 2004


  Loading...