Divya Gupta
Divya Gupta
Senior Researcher, Microsoft Research India
Bestätigte E-Mail-Adresse bei microsoft.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
SecureNN: 3-Party Secure Computation for Neural Network Training.
S Wagh, D Gupta, N Chandran
Proc. Priv. Enhancing Technol. 2019 (3), 26-49, 2019
197*2019
Optimizing obfuscation: avoiding Barrington's theorem
P Ananth, D Gupta, Y Ishai, A Sahai
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1182014
Ezpc: Programmable and efficient secure two-party computation for machine learning
N Chandran, D Gupta, A Rastogi, R Sharma, S Tripathi
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 496-511, 2019
712019
A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations
S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Theory of Cryptography Conference, 375-397, 2015
672015
Cryptflow: Secure tensorflow inference
N Kumar, M Rathee, N Chandran, D Gupta, A Rastogi, R Sharma
2020 IEEE Symposium on Security and Privacy (SP), 336-353, 2020
662020
Optimal computational split-state non-malleable codes
D Aggarwal, S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Theory of Cryptography Conference, 393-417, 2016
552016
Explicit non-malleable codes against bit-wise tampering and permutations
S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Annual Cryptology Conference, 538-557, 2015
522015
Laconic oblivious transfer and its applications
C Cho, N Döttling, S Garg, D Gupta, P Miao, A Polychroniadou
Annual International Cryptology Conference, 33-65, 2017
512017
Efficient round optimal blind signatures
S Garg, D Gupta
Annual International Conference on the Theory and Applications of …, 2014
332014
Hosting services on an untrusted cloud
D Boneh, D Gupta, I Mironov, A Sahai
Annual international conference on the theory and applications of …, 2015
302015
Multi-input functional encryption for unbounded arity functions
S Badrinarayanan, D Gupta, A Jain, A Sahai
International Conference on the Theory and Application of Cryptology and …, 2015
282015
CrypTFlow2: Practical 2-Party Secure Inference
D Rathee, M Rathee, N Kumar, N Chandran, D Gupta, A Rastogi, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
232020
Secure multiparty RAM computation in constant rounds
S Garg, D Gupta, P Miao, O Pandey
Theory of Cryptography Conference, 491-520, 2016
232016
Approximation algorithms for the unsplittable flow problem on paths and trees
K Elbassioni, N Garg, D Gupta, A Kumar, V Narula, A Pal
IARCS Annual Conference on Foundations of Software Technology and …, 2012
192012
Obfuscation from low noise multilinear maps
N Döttling, S Garg, D Gupta, P Miao, P Mukherjee
International Conference on Cryptology in India, 329-352, 2018
182018
On constant-round concurrent zero-knowledge from a knowledge assumption
D Gupta, A Sahai
International Conference on Cryptology in India, 71-88, 2014
132014
What Information is Leaked Under Concurrent Composition?
V Goyal, D Gupta, A Jain
Crypto 8043, 220--238, 2013
102013
Secure computation from leaky correlated randomness
D Gupta, Y Ishai, HK Maji, A Sahai
Annual Cryptology Conference, 701-720, 2015
72015
Concurrent secure computation via non-black box simulation
V Goyal, D Gupta, A Sahai
Annual Cryptology Conference, 23-42, 2015
52015
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI.
N Chandran, N Dasgupta, D Gupta, SLB Obbattu, S Sekar, A Shah
IACR Cryptol. ePrint Arch. 2021, 172, 2021
42021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20