Follow
Karn Seth
Karn Seth
Verified email at google.com
Title
Cited by
Cited by
Year
Practical secure aggregation for privacy-preserving machine learning
K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ...
proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
14922017
Practical secure aggregation for federated learning on user-held data
K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ...
arXiv preprint arXiv:1611.04482, 2016
2512016
Indistinguishability obfuscation from semantically-secure multilinear encodings
R Pass, K Seth, S Telang
Annual Cryptology Conference, 500-517, 2014
1852014
On deploying secure computing: Private intersection-sum-with-cardinality
M Ion, B Kreuter, AE Nergiz, S Patel, S Saxena, K Seth, M Raykova, ...
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 370-389, 2020
792020
Private intersection-sum protocol with applications to attributing aggregate ad conversions
M Ion, B Kreuter, E Nergiz, S Patel, S Saxena, K Seth, D Shanahan, ...
Cryptology ePrint Archive, 2017
692017
Indistinguishability obfuscation with non-trivial efficiency
H Lin, R Pass, K Seth, S Telang
Public-Key Cryptography--PKC 2016, 447-462, 2016
492016
On the impossibility of cryptography with tamperable randomness
P Austrin, KM Chung, M Mahmoody, R Pass, K Seth
Annual Cryptology Conference, 462-479, 2014
472014
Output-compressing randomized encodings and applications
H Lin, R Pass, K Seth, S Telang
Theory of Cryptography Conference, 96-124, 2016
432016
Non-black-box simulation from one-way functions and applications to resettable security
KM Chung, R Pass, K Seth
SIAM Journal on Computing 45 (2), 415-458, 2016
422016
{Communication–Computation} Trade-offs in {PIR}
A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo
30th USENIX Security Symposium (USENIX Security 21), 1811-1828, 2021
292021
Two-sided malicious security for private intersection-sum with cardinality
P Miao, S Patel, M Raykova, K Seth, M Yung
Annual International Cryptology Conference, 3-33, 2020
262020
Practical secure aggregation for privacy-preserving machine learning
A Segal, A Marcedone, B Kreuter, D Ramage, HB McMahan, K Seth, ...
212017
Private join and compute from PIR with default
T Lepoint, S Patel, M Raykova, K Seth, N Trieu
International Conference on the Theory and Application of Cryptology and …, 2021
52021
Systems and methods for establishing a link between identifiers without disclosing specific identifying information
S Saxena, B Kreuter, S Patel, K Seth
US Patent 10,764,041, 2020
52020
Establishing a link between identifiers without disclosing specific identifying information
V Goel, P McDonnell, S Kulkarni, A Gupta, S Saxena, P McDonald, ...
US Patent 10,558,817, 2020
52020
Secure Poisson Regression.
M Kelkar, PH Le, M Raykova, K Seth
IACR Cryptol. ePrint Arch. 2021, 208, 2021
42021
On the (Im) Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses.
P Austrin, KM Chung, M Mahmoody, R Pass, K Seth
IACR Cryptol. ePrint Arch. 2013, 194, 2013
42013
What's in a Name? Exploring {CA} Certificate Control
Z Ma, J Mason, S Patel, M Antonakakis, M Raykova, Z Durumeric, ...
30th USENIX Security Symposium (USENIX Security 21), 4383-4400, 2021
32021
On the impossibility of black-box transformations in mechanism design
R Pass, K Seth
International Symposium on Algorithmic Game Theory, 279-290, 2014
32014
Security measures for determination of private set intersections
S Patel, MMM Yung, K Seth, B Kreuter
US Patent App. 16/486,281, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20