Practical secure aggregation for privacy-preserving machine learning K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ... proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 2061 | 2017 |
Practical secure aggregation for federated learning on user-held data K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ... arXiv preprint arXiv:1611.04482, 2016 | 346 | 2016 |
Indistinguishability obfuscation from semantically-secure multilinear encodings R Pass, K Seth, S Telang Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 192 | 2014 |
Private intersection-sum protocol with applications to attributing aggregate ad conversions M Ion, B Kreuter, E Nergiz, S Patel, S Saxena, K Seth, D Shanahan, ... Cryptology ePrint Archive, 2017 | 88 | 2017 |
On deploying secure computing: Private intersection-sum-with-cardinality M Ion, B Kreuter, AE Nergiz, S Patel, S Saxena, K Seth, M Raykova, ... 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 370-389, 2020 | 78 | 2020 |
Indistinguishability obfuscation with non-trivial efficiency H Lin, R Pass, K Seth, S Telang Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 57 | 2016 |
Output-compressing randomized encodings and applications H Lin, R Pass, K Seth, S Telang Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015 | 48 | 2015 |
On the impossibility of cryptography with tamperable randomness P Austrin, KM Chung, M Mahmoody, R Pass, K Seth Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 47 | 2014 |
{Communication–Computation} Trade-offs in {PIR} A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo 30th USENIX Security Symposium (USENIX Security 21), 1811-1828, 2021 | 44 | 2021 |
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications. M Ion, B Kreuter, AE Nergiz, S Patel, M Raykova, S Saxena, K Seth, ... IACR Cryptol. ePrint Arch. 2019, 723, 2019 | 43 | 2019 |
Non-black-box simulation from one-way functions and applications to resettable security KM Chung, R Pass, K Seth Proceedings of the forty-fifth annual ACM symposium on Theory of Computing …, 2013 | 43 | 2013 |
Two-sided malicious security for private intersection-sum with cardinality P Miao, S Patel, M Raykova, K Seth, M Yung Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 35 | 2020 |
Practical secure aggregation for privacy-preserving machine learning A Segal, A Marcedone, B Kreuter, D Ramage, HB McMahan, K Seth, ... | 30 | 2017 |
Private join and compute from PIR with default T Lepoint, S Patel, M Raykova, K Seth, N Trieu Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 10 | 2021 |
Secure poisson regression M Kelkar, PH Le, M Raykova, K Seth 31st USENIX Security Symposium (USENIX Security 22), 791-808, 2022 | 9 | 2022 |
What's in a Name? Exploring CA Certificate Control. Z Ma, J Mason, M Antonakakis, Z Durumeric, M Bailey USENIX Security Symposium, 4383-4400, 2021 | 5 | 2021 |
On the (Im) Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses. P Austrin, KM Chung, M Mahmoody, R Pass, K Seth IACR Cryptol. ePrint Arch. 2013, 194, 2013 | 4 | 2013 |
On the impossibility of black-box transformations in mechanism design R Pass, K Seth Algorithmic Game Theory: 7th International Symposium, SAGT 2014, Haifa …, 2014 | 3 | 2014 |
Systems and methods for establishing a link between identifiers without disclosing specific identifying information S Saxena, B Kreuter, S Patel, K Seth US Patent App. 17/567,208, 2022 | 1 | 2022 |
Methods for aggregating credit across interactions K Seth, S Patel, M Raykova, S Seshadri, M Werner, P McDonnell, ... US Patent App. 17/285,831, 2022 | 1 | 2022 |