Ranjit Kumaresan

Orcid: 0009-0004-2128-1734

According to our database1, Ranjit Kumaresan authored at least 41 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
DTL: Data Tumbling Layer. A Composable Unlinkability for Smart Contracts.
CoRR, March, 2025

DTL: Data Tumbling Layer A Composable Unlinkability for Smart Contracts.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
A Plug-and-Play Long-Range Defense System for Proof-of-Stake Blockchains.
Proceedings of the Computer Security - ESORICS 2024, 2024

Programmable Payment Channels.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Off-Chain Programmability at Scale.
IACR Cryptol. ePrint Arch., 2023

Scalable Off-Chain Auctions.
IACR Cryptol. ePrint Arch., 2023

How to Design Fair Protocols in the Multi-Blockchain Setting.
IACR Cryptol. ePrint Arch., 2023

Synchronizable Fair Exchange.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Unlinkability and Interoperability in Account-Based Universal Payment Channels.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

LucidiTEE: Scalable Policy-Based Multiparty Computation with Fairness.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-Sized Sets.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2021
Universal Payment Channels: An Interoperability Platform for Digital Currencies.
CoRR, 2021

2020
Synchronizable Exchange.
IACR Cryptol. ePrint Arch., 2020

Towards a Two-Tier Hierarchical Infrastructure: An Offline Payment System for Central Bank Digital Currencies.
CoRR, 2020

2019
LucidiTEE: Policy-based Fair Computing at Scale.
IACR Cryptol. ePrint Arch., 2019

Sprites and State Channels: Payment Networks that Go Faster Than Lightning.
Proceedings of the Financial Cryptography and Data Security, 2019

2017
Sprites: Payment Channels that Go Faster than Lightning.
CoRR, 2017

Instantaneous Decentralized Poker.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Network Oblivious Transfer.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Improvements to Secure Computation with Penalties.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Amortizing Secure Computation with Penalties.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Efficient Batched Oblivious PRF with Applications to Private Set Intersection.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Secure Computation with Minimal Interaction, Revisited.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

How to Use Bitcoin to Play Decentralized Poker.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

On Cut-and-Choose Oblivious Transfer and Its Variants.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
On the Cryptographic Complexity of the Worst Functions.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

On the Complexity of UC Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Amortizing Garbled Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

How to Use Bitcoin to Design Fair Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

How to Use Bitcoin to Incentivize Correct Computations.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Multi-Client Non-interactive Verifiable Computation.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Improved OT Extension for Transferring Short Secrets.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Broadcast and Verifiable Secret Sharing: New Security Models and Round Optimal Constructions.
PhD thesis, 2012

On the Security of the "Free-XOR" Technique.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
Adaptively secure broadcast, revisited.
Proceedings of the 30th Annual ACM Symposium on Principles of Distributed Computing, 2011

2010
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2010

The Round Complexity of Verifiable Secret Sharing: The Statistical Case.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2008
Improving the Round Complexity of VSS in Point-to-Point Networks.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

2007
On Exponential Lower Bound for Protocols for Reliable Communication in Networks.
Proceedings of the Information Theoretic Security - Second International Conference, 2007


  Loading...