Gabriel Kaptchuk

Orcid: 0000-0002-8886-4748

According to our database1, Gabriel Kaptchuk authored at least 31 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Enforcing Demographic Coherence: A Harms Aware Framework for Reasoning about Private Data Release.
CoRR, February, 2025

Models Matter: Setting Accurate Privacy Expectations for Local and Central Differential Privacy.
Proc. Priv. Enhancing Technol., 2025

Cryptographic Personas: Responsible Pseudonyms Without De-Anonymization.
IACR Cryptol. ePrint Arch., 2025

How to Trace Viral Content in End-to-End Encrypted Messaging.
IACR Cryptol. ePrint Arch., 2025

2024
SocIoTy: Practical Cryptography in Smart Home Contexts.
Proc. Priv. Enhancing Technol., January, 2024

Safer Digital Intimacy for Sex Workers and Beyond: A Technical Research Agenda.
IEEE Secur. Priv., 2024

Pulsar: Secure Steganography for Diffusion Models.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Dora: A Simple Approach to Zero-Knowledge for RAM Programs.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Pulsar: Secure Steganography through Diffusion Models.
IACR Cryptol. ePrint Arch., 2023

Dora: Processor Expressiveness is (Nearly) Free in Zero-Knowledge for RAM Programs.
IACR Cryptol. ePrint Arch., 2023

What Are the Chances? Explaining the Epsilon Parameter in Differential Privacy.
Proceedings of the 32nd USENIX Security Symposium, 2023

Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Disjunctions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Scalable Multiparty Garbling.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Efficient Proofs of Software Exploitability for Real-world Processors.
IACR Cryptol. ePrint Arch., 2022

Introduction to the Special Issue on Security and Privacy for COVID-19.
DTRAP, 2022

How Good is Good Enough? Quantifying the Impact of Benefits, Accuracy, and Privacy on Willingness to Adopt COVID-19 Decision Aids.
DTRAP, 2022

Stacking Sigmas: A Framework to Compose $\varSigma $-Protocols for Disjunctions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Efficient Set Membership Proofs using MPC-in-the-Head.
IACR Cryptol. ePrint Arch., 2021

Stacking Sigmas: A Framework to Compose Σ-Protocols for Disjunctions.
IACR Cryptol. ePrint Arch., 2021

Improving Signal's Sealed Sender.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Order-C Secure Multiparty Computation for Highly Repetitive Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Abuse Resistant Law Enforcement Access Systems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Fluid MPC: Secure Multiparty Computation with Dynamic Participants.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Meteor: Cryptographically Secure Steganography for Realistic Distributions.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

"I need a better description": An Investigation Into User Expectations For Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
How good is good enough for COVID19 apps? The influence of benefits, accuracy, and privacy on willingness to adopt.
CoRR, 2020

2019
Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2017
Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control.
IACR Cryptol. ePrint Arch., 2017

Outsourcing Medical Dataset Analysis: A Possible Solution.
Proceedings of the Financial Cryptography and Data Security, 2017

Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage.
Proceedings of the 25th USENIX Security Symposium, 2016


  Loading...