Arpita Patra
Arpita Patra
Associate Professor, Dept. of Computer Science & Automation, Indian Institute of Science
Verified email at iisc.ac.in - Homepage
Title
Cited by
Cited by
Year
Computational verifiable secret sharing revisited
M Backes, A Kate, A Patra
International Conference on the Theory and Application of Cryptology and …, 2011
622011
The round complexity of verifiable secret sharing revisited
A Patra, A Choudhary, T Rabin, CP Rangan
Annual International Cryptology Conference, 487-504, 2009
572009
Indoor versus outdoor scene classification using probabilistic neural network
L Gupta, V Pathangay, A Patra, A Dyana, S Das
EURASIP Journal on Advances in Signal Processing 2007, 1-10, 2006
422006
Unconditionally reliable and secure message transmission in undirected synchronous networks: Possibility, feasibility and optimality
A Patra, A Choudhury, C Pandu Rangan, K Srinathan
International Journal of Applied Cryptography 2 (2), 159-197, 2010
412010
The round complexity of verifiable secret sharing: The statistical case
R Kumaresan, A Patra, CP Rangan
International Conference on the Theory and Application of Cryptology and …, 2010
402010
Multi party distributed private matching, set disjointness and cardinality of set intersection with information theoretic security
GS Narayanan, T Aishwarya, A Agrawal, A Patra, A Choudhary, ...
International Conference on Cryptology and Network Security, 21-40, 2009
402009
Constant phase bit optimal protocols for perfectly reliable and secure message transmission
A Patra, A Choudhary, K Srinathan, CP Rangan
International Conference on Cryptology in India, 221-235, 2006
342006
Error-free multi-valued broadcast and Byzantine agreement with optimal communication complexity
A Patra
International Conference On Principles Of Distributed Systems, 34-49, 2011
302011
Between a Rock and a Hard Place: Interpolating between MPC and FHE
A Choudhury, J Loftus, E Orsini, A Patra, NP Smart
International Conference on the Theory and Application of Cryptology and …, 2013
292013
Simple and efficient asynchronous byzantine agreement with optimal resilience
A Patra, A Choudhary, C Pandu Rangan
Proceedings of the 28th ACM symposium on Principles of distributed computing …, 2009
292009
On the exact round complexity of secure three-party computation
A Patra, D Ravi
Annual International Cryptology Conference, 425-458, 2018
262018
Perfectly secure message transmission in directed networks tolerating threshold and non threshold adversary
A Patra, B Shankar, A Choudhary, K Srinathan, CP Rangan
International Conference on Cryptology and Network Security, 80-101, 2007
242007
Asynchronous multiparty computation with linear communication complexity
A Choudhury, M Hirt, A Patra
International Symposium on Distributed Computing, 388-402, 2013
232013
Probabilistic perfectly reliable and secure message transmission–possibility, feasibility and optimality
K Srinathan, A Patra, A Choudhary, CP Rangan
International Conference on Cryptology in India, 101-122, 2007
222007
Selective opening security for receivers
C Hazay, A Patra, B Warinschi
International Conference on the Theory and Application of Cryptology and …, 2015
212015
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary
K Srinathan, A Patra, A Choudhary, CP Rangan
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
202009
Constant phase efficient protocols for secure message transmission in directed networks
A Patra, A Choudhary, CP Rangan
Proceedings of the twenty-sixth annual ACM symposium on Principles of …, 2007
202007
Efficient statistical asynchronous verifiable secret sharing with optimal resilience
A Patra, A Choudhary, CP Rangan
International Conference on Information Theoretic Security, 74-92, 2009
192009
On minimal connectivity requirement for secure message transmission in asynchronous networks
A Choudhary, A Patra, BV Ashwinkumar, K Srinathan, CP Rangan
International Conference on Distributed Computing and Networking, 148-162, 2009
192009
Astra: High throughput 3pc over rings with application to secure prediction
H Chaudhari, A Choudhury, A Patra, A Suresh
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
182019
The system can't perform the operation now. Try again later.
Articles 1–20