Karn Seth

Orcid: 0009-0008-5735-3524

According to our database1, Karn Seth authored at least 22 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Prior-Based Label Differential Privacy via Secure Two-Party Computation.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Malicious Security for Sparse Private Histograms.
IACR Cryptol. ePrint Arch., 2024

Communication-Efficient Secure Logistic Regression.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
Anonymous Counting Tokens.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Secure Poisson Regression.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Communication-Computation Trade-offs in PIR.
Proceedings of the 30th USENIX Security Symposium, 2021

Private Join and Compute from PIR with Default.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications.
IACR Cryptol. ePrint Arch., 2019

2017
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions.
IACR Cryptol. ePrint Arch., 2017

Practical Secure Aggregation for Privacy-Preserving Machine Learning.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Non-Black Box Use of Code in Cryptography.
PhD thesis, 2016

Practical Secure Aggregation for Federated Learning on User-Held Data.
CoRR, 2016

Output-Compressing Randomized Encodings and Applications.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Indistinguishability Obfuscation with Non-trivial Efficiency.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2014
On the Impossibility of Black-Box Transformations in Mechanism Design.
Proceedings of the Algorithmic Game Theory - 7th International Symposium, 2014

Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

On the Impossibility of Cryptography with Tamperable Randomness.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Obfuscation from Semantically-Secure Multi-linear Encodings.
IACR Cryptol. ePrint Arch., 2013

On the (Im)Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses.
IACR Cryptol. ePrint Arch., 2013

Non-black-box simulation from one-way functions and applications to resettable security.
Proceedings of the Symposium on Theory of Computing Conference, 2013


  Loading...