Spremljaj
Esha Ghosh
Esha Ghosh
Microsoft Research
Preverjeni e-poštni naslov na microsoft.com
Naslov
Navedeno
Navedeno
Leto
Hash first, argue later: Adaptive verifiable computations on outsourced data
D Fiore, C Fournet, E Ghosh, M Kohlweiss, O Ohrimenko, B Parno
Proceedings of the 2016 ACM SIGSAC Conference on computer and Communications …, 2016
802016
Faster parameterized algorithms for deletion to split graphs
E Ghosh, S Kolay, M Kumar, P Misra, F Panolan, A Rai, MS Ramanujan
Algorithmica 71 (4), 989-1006, 2015
452015
Seemless: Secure end-to-end encrypted messaging with less trust
M Chase, A Deshpande, E Ghosh, H Malvai
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
352019
Zero-knowledge accumulators and set algebra
E Ghosh, O Ohrimenko, D Papadopoulos, R Tamassia, N Triandopoulos
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
212016
Property inference from poisoning
S Mahloujifar, E Ghosh, M Chase
2022 IEEE Symposium on Security and Privacy (SP), 1120-1137, 2022
192022
Faster Parameterized Algorithms for Deletion to Split Graphs.
E Ghosh, S Kolay, M Kumar, P Misra, F Panolan, A Rai, MS Ramanujan
SWAT 7357, 107-118, 2012
182012
Property inference from poisoning
M Chase, E Ghosh, S Mahloujifar
arXiv preprint arXiv:2101.11073, 2021
172021
Zero-knowledge authenticated order queries and order statistics on a list
E Ghosh, O Ohrimenko, R Tamassia
Applied Cryptography and Network Security: 13th International Conference …, 2016
172016
Secret-shared shuffle
M Chase, E Ghosh, O Poburinnaya
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
162020
Zero-knowledge accumulators and set operations
E Ghosh, O Ohrimenko, D Papadopoulos, R Tamassia, N Triandopoulos
Cryptology ePrint Archive, 2015
142015
Fully-dynamic verifiable zero-knowledge order queries for network data
E Ghosh, MT Goodrich, O Ohrimenko, R Tamassia
Cryptology ePrint Archive, 2015
112015
Verifiable member and order queries on a list in zero-knowledge
E Ghosh, O Ohrimenko, R Tamassia
arXiv preprint arXiv:1408.3843, 2014
102014
Efficient graph encryption scheme for shortest path queries
E Ghosh, S Kamara, R Tamassia
Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021
92021
Privately computing set-maximal matches in genomic data
K Sotiraki, E Ghosh, H Chen
BMC Medical Genomics 13 (7), 1-8, 2020
92020
Cryptographic key-generation with application to data deduplication
JL Camenisch, A De Caro, E Ghosh, A Sorniotti
US Patent 10,277,395, 2019
92019
Verifiable zero-knowledge order queries and updates for fully dynamic lists and trees
E Ghosh, MT Goodrich, O Ohrimenko, R Tamassia
Security and Cryptography for Networks: 10th International Conference, SCN …, 2016
82016
Membership inference on word embedding and beyond
S Mahloujifar, HA Inan, M Chase, E Ghosh, M Hasegawa
arXiv preprint arXiv:2106.11384, 2021
72021
Stateful multi-client verifiable computation
C Cachin, E Ghosh, D Papadopoulos, B Tackmann
Applied Cryptography and Network Security: 16th International Conference …, 2018
72018
Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge.
E Ghosh, O Ohrimenko, R Tamassia
Proc. Priv. Enhancing Technol. 2016 (4), 373-388, 2016
72016
Oblivious PRF on committed vector inputs and application to deduplication of encrypted data
J Camenisch, A De Caro, E Ghosh, A Sorniotti
Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019
52019
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20