Hash first, argue later: Adaptive verifiable computations on outsourced data D Fiore, C Fournet, E Ghosh, M Kohlweiss, O Ohrimenko, B Parno Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 94 | 2016 |
Seemless: Secure end-to-end encrypted messaging with less trust M Chase, A Deshpande, E Ghosh, H Malvai Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 64 | 2019 |
Property inference from poisoning S Mahloujifar, E Ghosh, M Chase 2022 IEEE Symposium on Security and Privacy (SP), 1120-1137, 2022 | 58 | 2022 |
Faster parameterized algorithms for deletion to split graphs E Ghosh, S Kolay, M Kumar, P Misra, F Panolan, A Rai, MS Ramanujan Algorithmica 71 (4), 989-1006, 2015 | 49 | 2015 |
Secret-shared shuffle M Chase, E Ghosh, O Poburinnaya Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 41 | 2020 |
Membership inference on word embedding and beyond S Mahloujifar, HA Inan, M Chase, E Ghosh, M Hasegawa arXiv preprint arXiv:2106.11384, 2021 | 34 | 2021 |
Zero-knowledge accumulators and set algebra E Ghosh, O Ohrimenko, D Papadopoulos, R Tamassia, N Triandopoulos Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 34 | 2016 |
Efficient graph encryption scheme for shortest path queries E Ghosh, S Kamara, R Tamassia Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 26 | 2021 |
Property inference from poisoning M Chase, E Ghosh, S Mahloujifar arXiv preprint arXiv:2101.11073, 2021 | 25 | 2021 |
Parakeet: Practical key transparency for end-to-end encrypted messaging H Malvai, L Kokoris-Kogias, A Sonnino, E Ghosh, E Oztürk, K Lewi, ... Cryptology ePrint Archive, 2023 | 22 | 2023 |
Zero-knowledge authenticated order queries and order statistics on a list E Ghosh, O Ohrimenko, R Tamassia International Conference on Applied Cryptography and Network Security, 149-171, 2015 | 21 | 2015 |
Faster parameterized algorithms for deletion to split graphs E Ghosh, S Kolay, M Kumar, P Misra, F Panolan, A Rai, MS Ramanujan Scandinavian Workshop on Algorithm Theory, 107-118, 2012 | 19 | 2012 |
Verifiable and provably secure machine unlearning T Eisenhofer, D Riepel, V Chandrasekaran, E Ghosh, O Ohrimenko, ... arXiv preprint arXiv:2210.09126, 2022 | 18 | 2022 |
Fastver: Making data integrity a commodity A Arasu, B Chandramouli, J Gehrke, E Ghosh, D Kossmann, J Protzenko, ... Proceedings of the 2021 International Conference on Management of Data, 89-101, 2021 | 14 | 2021 |
Zero-knowledge accumulators and set operations E Ghosh, O Ohrimenko, D Papadopoulos, R Tamassia, N Triandopoulos Cryptology ePrint Archive, 2015 | 14 | 2015 |
Fully-dynamic verifiable zero-knowledge order queries for network data E Ghosh, MT Goodrich, O Ohrimenko, R Tamassia Cryptology ePrint Archive, 2015 | 13 | 2015 |
Rotatable zero knowledge sets: Post compromise secure auditable dictionaries with application to key transparency B Chen, Y Dodis, E Ghosh, E Goldin, B Kesavan, A Marcedone, ME Mou International Conference on the Theory and Application of Cryptology and …, 2022 | 11 | 2022 |
Verifiable member and order queries on a list in zero-knowledge E Ghosh, O Ohrimenko, R Tamassia arXiv preprint arXiv:1408.3843, 2014 | 11 | 2014 |
Privately computing set-maximal matches in genomic data K Sotiraki, E Ghosh, H Chen BMC Medical Genomics 13, 1-8, 2020 | 10 | 2020 |
Cryptographic key-generation with application to data deduplication JL Camenisch, A De Caro, E Ghosh, A Sorniotti US Patent 10,277,395, 2019 | 10 | 2019 |