Search Results - "Varia, Mayank"

Refine Results
  1. 1

    Privacy With Estimation Guarantees by Wang, Hao, Vo, Lisa, Calmon, Flavio P., Medard, Muriel, Duffy, Ken R., Varia, Mayank

    Published in IEEE transactions on information theory (01-12-2019)
    “…We study the central problem in data privacy: how to share data with an analyst while providing both privacy and utility guarantees to the user that owns the…”
    Get full text
    Journal Article
  2. 2

    Principal Inertia Components and Applications by Calmon, Flavio Du Pin, Makhdoumi, Ali, Medard, Muriel, Varia, Mayank, Christiansen, Mark, Duffy, Ken R.

    Published in IEEE transactions on information theory (01-08-2017)
    “…We explore properties and applications of the principal inertia components (PICs) between two discrete random variables X and Y. The PICs lie in the…”
    Get full text
    Journal Article
  3. 3

    EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security by Canetti, Ran, Stoughton, Alley, Varia, Mayank

    “…We present a methodology for using the EasyCrypt proof assistant (originally designed for mechanizing the generation of proofs of game-based security of…”
    Get full text
    Conference Proceeding
  4. 4

    Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model by Stoughton, Alley, Varia, Mayank

    “…We report on our research on proving the security of multi-party cryptographic protocols using the EASYCRYPT proof assistant. We work in the computational…”
    Get full text
    Conference Proceeding
  5. 5

    SoK: Cryptographically Protected Database Search by Fuller, Benjamin, Varia, Mayank, Yerukhimovich, Arkady, Shen, Emily, Hamlin, Ariel, Gadepally, Vijay, Shay, Richard, Mitchell, John Darby, Cunningham, Robert K.

    “…Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits…”
    Get full text
    Conference Proceeding
  6. 6

    Cryptographically Secure Computation by Shen, Emily, Varia, Mayank, Cunningham, Robert K., Vesey, W. Konrad

    Published in Computer (Long Beach, Calif.) (01-04-2015)
    “…Researchers are making secure multiparty computation--a cryptographic technique that enables information sharing and analysis while keeping sensitive inputs…”
    Get full text
    Journal Article
  7. 7

    A Universally Composable Treatment of Network Time by Canetti, Ran, Hogan, Kyle, Malhotra, Aanchal, Varia, Mayank

    “…The security of almost any real-world distributed system today depends on the participants having some "reasonably accurate" sense of current real time…”
    Get full text
    Conference Proceeding
  8. 8

    Automated Exposure Notification for COVID-19 by Samuels, Leo, Boskov, Novak, Francisco Oliveira, Andreas, Sun, Edwin, Starobinski, David, Trachtenberg, Ari, Monga, Manan, Varia, Mayank, Canetti, Ran, Devaiah, Anand, Denis, Gerald V

    Published in Journal of young investigators (01-12-2022)
    “…In the current COVID-19 pandemic, various Automated Exposure Notification (AEN) systems have been proposed to help quickly identify potential contacts of…”
    Get full text
    Journal Article
  9. 9

    An exploration of the role of principal inertia components in information theory by Calmon, Flavio P., Varia, Mayank, Medard, Muriel

    “…The principal inertia components of the joint distribution of two random variables X and Y are inherently connected to how an observation of Y is statistically…”
    Get full text
    Conference Proceeding
  10. 10

    Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance by Wright, Charles, Varia, Mayank

    “…Governments around the world are demanding more access to encrypted data, but it has been difficult to build a system that allows the authorities some access…”
    Get full text
    Conference Proceeding
  11. 11

    Can the Government Compel Decryption? Don't Trust -- Verify by Cohen, Aloni, Scheffler, Sarah, Varia, Mayank

    Published 04-08-2022
    “…If a court knows that a respondent knows the password to a device, can the court compel the respondent to enter that password into the device? In this work, we…”
    Get full text
    Journal Article
  12. 12

    Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity by Scheffler, Sarah, Tromer, Eran, Varia, Mayank

    Published 02-06-2022
    “…A central notion in U.S. copyright law is judging the substantial similarity between an original and an (allegedly) derived work. Capturing this notion has…”
    Get full text
    Journal Article
  13. 13

    Computing on masked data: a high performance method for improving big data veracity by Kepner, Jeremy, Gadepally, Vijay, Michaleas, Pete, Schear, Nabil, Varia, Mayank, Yerukhimovich, Arkady, Cunningham, Robert K.

    “…The growing gap between data and users calls for innovative tools that address the challenges faced by big data volume, velocity and variety. Along with these…”
    Get full text
    Conference Proceeding
  14. 14

    Anonymous Collocation Discovery: Harnessing Privacy to Tame the Coronavirus by Canetti, Ran, Trachtenberg, Ari, Varia, Mayank

    Published 30-03-2020
    “…Successful containment of the Coronavirus pandemic rests on the ability to quickly and reliably identify those who have been in close proximity to a contagious…”
    Get full text
    Journal Article
  15. 15

    Secrecy: Secure collaborative analytics on secret-shared data by Liagouris, John, Kalavri, Vasiliki, Faisal, Muhammad, Varia, Mayank

    Published 01-02-2021
    “…We present a relational MPC framework for secure collaborative analytics on private data with no information leakage. Our work targets challenging use cases…”
    Get full text
    Journal Article
  16. 16

    Secret Sharing MPC on FPGAs in the Datacenter by Wolfe, Pierre-Francois, Patel, Rushi, Munafo, Robert, Varia, Mayank, Herbordt, Martin

    “…Multi-Party Computation (MPC) is a technique enabling data from several sources to be used in a secure computation revealing only the result while protecting…”
    Get full text
    Conference Proceeding
  17. 17

    COPA Use Case: Distributed Secure Joint Computation by Patel, Rushi, Haghi, Pouya, Jain, Shweta, Kot, Andriy, Krishnan, Venkata, Varia, Mayank, Herbordt, Martin

    “…Data centers provide good environments for distributed computing as they are easily accessible and may have low-latency communication between nodes [1] ;…”
    Get full text
    Conference Proceeding
  18. 18

    Distributed Hardware Accelerated Secure Joint Computation on the COPA Framework by Patel, Rushi, Haghi, Pouya, Jain, Shweta, Kot, Andriy, Krishnan, Venkata, Varia, Mayank, Herbordt, Martin

    Published 10-04-2022
    “…Performance of distributed data center applications can be improved through use of FPGA-based SmartNICs, which provide additional functionality and enable…”
    Get full text
    Journal Article
  19. 19

    Distributed Hardware Accelerated Secure Joint Computation on the COPA Framework by Patel, Rushi, Haghi, Pouya, Jain, Shweta, Kot, Andriy, Krishnan, Venkata, Varia, Mayrmk, Herbord, Martin

    “…Performance of distributed data center applications can be improved through use of FPGA-based SmartNICs, which provide additional functionality and enable…”
    Get full text
    Conference Proceeding
  20. 20

    Secure MPC for Analytics as a Web Application by Lapets, Andrei, Volgushev, Nikolaj, Bestavros, Azer, Jansen, Frederick, Varia, Mayank

    “…Companies, government agencies, and other organizations have been analyzing data pertaining to their internal operations with great effect, such as in…”
    Get full text
    Conference Proceeding