Obserwuj
Esha Ghosh
Esha Ghosh
Microsoft Research
Zweryfikowany adres z microsoft.com
Tytuł
Cytowane przez
Cytowane przez
Rok
Hash first, argue later: Adaptive verifiable computations on outsourced data
D Fiore, C Fournet, E Ghosh, M Kohlweiss, O Ohrimenko, B Parno
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
922016
Seemless: Secure end-to-end encrypted messaging with less trust
M Chase, A Deshpande, E Ghosh, H Malvai
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
602019
Property inference from poisoning
S Mahloujifar, E Ghosh, M Chase
2022 IEEE Symposium on Security and Privacy (SP), 1120-1137, 2022
522022
Faster parameterized algorithms for deletion to split graphs
E Ghosh, S Kolay, M Kumar, P Misra, F Panolan, A Rai, MS Ramanujan
Algorithmica 71 (4), 989-1006, 2015
492015
Secret-shared shuffle
M Chase, E Ghosh, O Poburinnaya
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
342020
Zero-knowledge accumulators and set algebra
E Ghosh, O Ohrimenko, D Papadopoulos, R Tamassia, N Triandopoulos
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
322016
Membership inference on word embedding and beyond
S Mahloujifar, HA Inan, M Chase, E Ghosh, M Hasegawa
arXiv preprint arXiv:2106.11384, 2021
292021
Property inference from poisoning
M Chase, E Ghosh, S Mahloujifar
arXiv preprint arXiv:2101.11073, 2021
232021
Efficient graph encryption scheme for shortest path queries
E Ghosh, S Kamara, R Tamassia
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
212021
Parakeet: Practical key transparency for end-to-end encrypted messaging
H Malvai, L Kokoris-Kogias, A Sonnino, E Ghosh, E Oztürk, K Lewi, ...
Cryptology ePrint Archive, 2023
202023
Zero-knowledge authenticated order queries and order statistics on a list
E Ghosh, O Ohrimenko, R Tamassia
International Conference on Applied Cryptography and Network Security, 149-171, 2015
192015
Faster parameterized algorithms for deletion to split graphs
E Ghosh, S Kolay, M Kumar, P Misra, F Panolan, A Rai, MS Ramanujan
Scandinavian Workshop on Algorithm Theory, 107-118, 2012
192012
Zero-knowledge accumulators and set operations
E Ghosh, O Ohrimenko, D Papadopoulos, R Tamassia, N Triandopoulos
Cryptology ePrint Archive, 2015
142015
Verifiable and provably secure machine unlearning
T Eisenhofer, D Riepel, V Chandrasekaran, E Ghosh, O Ohrimenko, ...
arXiv preprint arXiv:2210.09126, 2022
132022
Fastver: Making data integrity a commodity
A Arasu, B Chandramouli, J Gehrke, E Ghosh, D Kossmann, J Protzenko, ...
Proceedings of the 2021 International Conference on Management of Data, 89-101, 2021
132021
Fully-dynamic verifiable zero-knowledge order queries for network data
E Ghosh, MT Goodrich, O Ohrimenko, R Tamassia
Cryptology ePrint Archive, 2015
112015
Verifiable member and order queries on a list in zero-knowledge
E Ghosh, O Ohrimenko, R Tamassia
arXiv preprint arXiv:1408.3843, 2014
112014
Rotatable zero knowledge sets: Post compromise secure auditable dictionaries with application to key transparency
B Chen, Y Dodis, E Ghosh, E Goldin, B Kesavan, A Marcedone, ME Mou
International Conference on the Theory and Application of Cryptology and …, 2022
102022
Privately computing set-maximal matches in genomic data
K Sotiraki, E Ghosh, H Chen
BMC Medical Genomics 13, 1-8, 2020
102020
Aggregate Measurement via Oblivious Shuffling.
E Anderson, M Chase, FB Durak, E Ghosh, K Laine, C Weng
IACR Cryptol. ePrint Arch. 2021, 1490, 2021
92021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20