Search Results - "Varia, Mayank"
-
1
Privacy With Estimation Guarantees
Published in IEEE transactions on information theory (01-12-2019)“…We study the central problem in data privacy: how to share data with an analyst while providing both privacy and utility guarantees to the user that owns the…”
Get full text
Journal Article -
2
Principal Inertia Components and Applications
Published in IEEE transactions on information theory (01-08-2017)“…We explore properties and applications of the principal inertia components (PICs) between two discrete random variables X and Y. The PICs lie in the…”
Get full text
Journal Article -
3
EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security
Published in 2019 IEEE 32nd Computer Security Foundations Symposium (CSF) (01-06-2019)“…We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of…”
Get full text
Conference Proceeding -
4
Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model
Published in 2017 IEEE 30th Computer Security Foundations Symposium (CSF) (01-08-2017)“…We report on our research on proving the security of multi-party cryptographic protocols using the EASYCRYPT proof assistant. We work in the computational…”
Get full text
Conference Proceeding -
5
SoK: Cryptographically Protected Database Search
Published in 2017 IEEE Symposium on Security and Privacy (SP) (01-05-2017)“…Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits…”
Get full text
Conference Proceeding -
6
Cryptographically Secure Computation
Published in Computer (Long Beach, Calif.) (01-04-2015)“…Researchers are making secure multiparty computation--a cryptographic technique that enables information sharing and analysis while keeping sensitive inputs…”
Get full text
Journal Article -
7
A Universally Composable Treatment of Network Time
Published in 2017 IEEE 30th Computer Security Foundations Symposium (CSF) (01-08-2017)“…The security of almost any real-world distributed system today depends on the participants having some "reasonably accurate" sense of current real time…”
Get full text
Conference Proceeding -
8
Automated Exposure Notification for COVID-19
Published in Journal of young investigators (01-12-2022)“…In the current COVID-19 pandemic, various Automated Exposure Notification (AEN) systems have been proposed to help quickly identify potential contacts of…”
Get full text
Journal Article -
9
An exploration of the role of principal inertia components in information theory
Published in 2014 IEEE Information Theory Workshop (ITW 2014) (01-11-2014)“…The principal inertia components of the joint distribution of two random variables X and Y are inherently connected to how an observation of Y is statistically…”
Get full text
Conference Proceeding -
10
Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance
Published in 2018 IEEE European Symposium on Security and Privacy (EuroS&P) (01-04-2018)“…Governments around the world are demanding more access to encrypted data, but it has been difficult to build a system that allows the authorities some access…”
Get full text
Conference Proceeding -
11
Can the Government Compel Decryption? Don't Trust -- Verify
Published 04-08-2022“…If a court knows that a respondent knows the password to a device, can the court compel the respondent to enter that password into the device? In this work, we…”
Get full text
Journal Article -
12
Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity
Published 02-06-2022“…A central notion in U.S. copyright law is judging the substantial similarity between an original and an (allegedly) derived work. Capturing this notion has…”
Get full text
Journal Article -
13
Computing on masked data: a high performance method for improving big data veracity
Published in 2014 IEEE High Performance Extreme Computing Conference (HPEC) (01-09-2014)“…The growing gap between data and users calls for innovative tools that address the challenges faced by big data volume, velocity and variety. Along with these…”
Get full text
Conference Proceeding -
14
Anonymous Collocation Discovery: Harnessing Privacy to Tame the Coronavirus
Published 30-03-2020“…Successful containment of the Coronavirus pandemic rests on the ability to quickly and reliably identify those who have been in close proximity to a contagious…”
Get full text
Journal Article -
15
Secrecy: Secure collaborative analytics on secret-shared data
Published 01-02-2021“…We present a relational MPC framework for secure collaborative analytics on private data with no information leakage. Our work targets challenging use cases…”
Get full text
Journal Article -
16
Secret Sharing MPC on FPGAs in the Datacenter
Published in 2020 30th International Conference on Field-Programmable Logic and Applications (FPL) (01-08-2020)“…Multi-Party Computation (MPC) is a technique enabling data from several sources to be used in a secure computation revealing only the result while protecting…”
Get full text
Conference Proceeding -
17
COPA Use Case: Distributed Secure Joint Computation
Published in 2022 IEEE 30th Annual International Symposium on Field-Programmable Custom Computing Machines (FCCM) (15-05-2022)“…Data centers provide good environments for distributed computing as they are easily accessible and may have low-latency communication between nodes [1] ;…”
Get full text
Conference Proceeding -
18
Distributed Hardware Accelerated Secure Joint Computation on the COPA Framework
Published 10-04-2022“…Performance of distributed data center applications can be improved through use of FPGA-based SmartNICs, which provide additional functionality and enable…”
Get full text
Journal Article -
19
Distributed Hardware Accelerated Secure Joint Computation on the COPA Framework
Published in 2022 IEEE High Performance Extreme Computing Conference (HPEC) (19-09-2022)“…Performance of distributed data center applications can be improved through use of FPGA-based SmartNICs, which provide additional functionality and enable…”
Get full text
Conference Proceeding -
20
Secure MPC for Analytics as a Web Application
Published in 2016 IEEE Cybersecurity Development (SecDev) (01-11-2016)“…Companies, government agencies, and other organizations have been analyzing data pertaining to their internal operations with great effect, such as in…”
Get full text
Conference Proceeding