Folgen
Karn Seth
Karn Seth
Bestätigte E-Mail-Adresse bei google.com
Titel
Zitiert von
Zitiert von
Jahr
Practical secure aggregation for privacy-preserving machine learning
K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ...
proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
20612017
Practical secure aggregation for federated learning on user-held data
K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ...
arXiv preprint arXiv:1611.04482, 2016
3462016
Indistinguishability obfuscation from semantically-secure multilinear encodings
R Pass, K Seth, S Telang
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
1922014
Private intersection-sum protocol with applications to attributing aggregate ad conversions
M Ion, B Kreuter, E Nergiz, S Patel, S Saxena, K Seth, D Shanahan, ...
Cryptology ePrint Archive, 2017
882017
On deploying secure computing: Private intersection-sum-with-cardinality
M Ion, B Kreuter, AE Nergiz, S Patel, S Saxena, K Seth, M Raykova, ...
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 370-389, 2020
782020
Indistinguishability obfuscation with non-trivial efficiency
H Lin, R Pass, K Seth, S Telang
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
572016
Output-compressing randomized encodings and applications
H Lin, R Pass, K Seth, S Telang
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015
482015
On the impossibility of cryptography with tamperable randomness
P Austrin, KM Chung, M Mahmoody, R Pass, K Seth
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
472014
{Communication–Computation} Trade-offs in {PIR}
A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo
30th USENIX Security Symposium (USENIX Security 21), 1811-1828, 2021
442021
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications.
M Ion, B Kreuter, AE Nergiz, S Patel, M Raykova, S Saxena, K Seth, ...
IACR Cryptol. ePrint Arch. 2019, 723, 2019
432019
Non-black-box simulation from one-way functions and applications to resettable security
KM Chung, R Pass, K Seth
Proceedings of the forty-fifth annual ACM symposium on Theory of Computing …, 2013
432013
Two-sided malicious security for private intersection-sum with cardinality
P Miao, S Patel, M Raykova, K Seth, M Yung
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
352020
Practical secure aggregation for privacy-preserving machine learning
A Segal, A Marcedone, B Kreuter, D Ramage, HB McMahan, K Seth, ...
302017
Private join and compute from PIR with default
T Lepoint, S Patel, M Raykova, K Seth, N Trieu
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
102021
Secure poisson regression
M Kelkar, PH Le, M Raykova, K Seth
31st USENIX Security Symposium (USENIX Security 22), 791-808, 2022
92022
What's in a Name? Exploring CA Certificate Control.
Z Ma, J Mason, M Antonakakis, Z Durumeric, M Bailey
USENIX Security Symposium, 4383-4400, 2021
52021
On the (Im) Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses.
P Austrin, KM Chung, M Mahmoody, R Pass, K Seth
IACR Cryptol. ePrint Arch. 2013, 194, 2013
42013
On the impossibility of black-box transformations in mechanism design
R Pass, K Seth
Algorithmic Game Theory: 7th International Symposium, SAGT 2014, Haifa …, 2014
32014
Systems and methods for establishing a link between identifiers without disclosing specific identifying information
S Saxena, B Kreuter, S Patel, K Seth
US Patent App. 17/567,208, 2022
12022
Methods for aggregating credit across interactions
K Seth, S Patel, M Raykova, S Seshadri, M Werner, P McDonnell, ...
US Patent App. 17/285,831, 2022
12022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20