Arpita Patra
Arpita Patra
Associate Professor, Dept. of Computer Science & Automation, Indian Institute of Science
Verified email at iisc.ac.in - Homepage
Title
Cited by
Cited by
Year
Computational verifiable secret sharing revisited
M Backes, A Kate, A Patra
International Conference on the Theory and Application of Cryptology and …, 2011
662011
The round complexity of verifiable secret sharing revisited
A Patra, A Choudhary, T Rabin, CP Rangan
Annual International Cryptology Conference, 487-504, 2009
562009
The round complexity of verifiable secret sharing: The statistical case
R Kumaresan, A Patra, CP Rangan
International Conference on the Theory and Application of Cryptology and …, 2010
432010
Multi party distributed private matching, set disjointness and cardinality of set intersection with information theoretic security
GS Narayanan, T Aishwarya, A Agrawal, A Patra, A Choudhary, ...
International Conference on Cryptology and Network Security, 21-40, 2009
432009
Indoor versus outdoor scene classification using probabilistic neural network
L Gupta, V Pathangay, A Patra, A Dyana, S Das
EURASIP Journal on Advances in Signal Processing 2007, 1-10, 2006
422006
Unconditionally reliable and secure message transmission in undirected synchronous networks: Possibility, feasibility and optimality
A Patra, A Choudhury, C Pandu Rangan, K Srinathan
International Journal of Applied Cryptography 2 (2), 159-197, 2010
412010
Constant phase bit optimal protocols for perfectly reliable and secure message transmission
A Patra, A Choudhary, K Srinathan, CP Rangan
International Conference on Cryptology in India, 221-235, 2006
312006
Between a Rock and a Hard Place: Interpolating between MPC and FHE
A Choudhury, J Loftus, E Orsini, A Patra, NP Smart
International Conference on the Theory and Application of Cryptology and …, 2013
302013
Simple and efficient asynchronous byzantine agreement with optimal resilience
A Patra, A Choudhary, C Pandu Rangan
Proceedings of the 28th ACM symposium on Principles of distributed computing …, 2009
302009
On the exact round complexity of secure three-party computation
A Patra, D Ravi
Annual International Cryptology Conference, 425-458, 2018
292018
Error-free multi-valued broadcast and Byzantine agreement with optimal communication complexity
A Patra
International Conference On Principles Of Distributed Systems, 34-49, 2011
282011
Asynchronous multiparty computation with linear communication complexity
A Choudhury, M Hirt, A Patra
International Symposium on Distributed Computing, 388-402, 2013
252013
Astra: High throughput 3pc over rings with application to secure prediction
H Chaudhari, A Choudhury, A Patra, A Suresh
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security …, 2019
222019
Probabilistic perfectly reliable and secure message transmission–possibility, feasibility and optimality
K Srinathan, A Patra, A Choudhary, CP Rangan
International Conference on Cryptology in India, 101-122, 2007
222007
Perfectly secure message transmission in directed networks tolerating threshold and non threshold adversary
A Patra, B Shankar, A Choudhary, K Srinathan, CP Rangan
International Conference on Cryptology and Network Security, 80-101, 2007
222007
Selective opening security for receivers
C Hazay, A Patra, B Warinschi
International Conference on the Theory and Application of Cryptology and …, 2015
212015
Asynchronous byzantine agreement with optimal resilience
A Patra, A Choudhury, CP Rangan
Distributed computing 27 (2), 111-146, 2014
212014
Efficient statistical asynchronous verifiable secret sharing with optimal resilience
A Patra, A Choudhary, CP Rangan
International Conference on Information Theoretic Security, 74-92, 2009
212009
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary
K Srinathan, A Patra, A Choudhary, CP Rangan
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
212009
Efficient asynchronous verifiable secret sharing and multiparty computation
A Patra, A Choudhury, CP Rangan
Journal of Cryptology 28 (1), 49-109, 2015
202015
The system can't perform the operation now. Try again later.
Articles 1–20