Karn Seth
Karn Seth
Google LLC
Geverifieerd e-mailadres voor google.com
Titel
Geciteerd door
Geciteerd door
Jaar
Practical secure aggregation for privacy-preserving machine learning
K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
5052017
Indistinguishability obfuscation from semantically-secure multilinear encodings
R Pass, K Seth, S Telang
Annual Cryptology Conference, 500-517, 2014
1652014
Practical secure aggregation for federated learning on user-held data
K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ...
arXiv preprint arXiv:1611.04482, 2016
922016
On the impossibility of cryptography with tamperable randomness
P Austrin, KM Chung, M Mahmoody, R Pass, K Seth
Annual Cryptology Conference, 462-479, 2014
372014
Indistinguishability obfuscation with non-trivial efficiency
H Lin, R Pass, K Seth, S Telang
Public-Key Cryptography--PKC 2016, 447-462, 2016
362016
Non-black-box simulation from one-way functions and applications to resettable security
KM Chung, R Pass, K Seth
SIAM Journal on Computing 45 (2), 415-458, 2016
362016
Output-compressing randomized encodings and applications
H Lin, R Pass, K Seth, S Telang
Theory of Cryptography Conference, 96-124, 2016
322016
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions.
M Ion, B Kreuter, E Nergiz, S Patel, S Saxena, K Seth, D Shanahan, ...
IACR Cryptol. ePrint Arch. 2017, 738, 2017
302017
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications.
M Ion, B Kreuter, AE Nergiz, S Patel, M Raykova, S Saxena, K Seth, ...
IACR Cryptol. ePrint Arch. 2019, 723, 2019
172019
Practical secure aggregation for privacy-preserving machine learning
A Segal, A Marcedone, B Kreuter, D Ramage, HB McMahan, K Seth, ...
62017
Communication-Computation Trade-offs in PIR.
A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo
IACR Cryptol. ePrint Arch. 2019, 1483, 2019
42019
On the (Im) Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses.
P Austrin, KM Chung, M Mahmoody, R Pass, K Seth
IACR Cryptol. ePrint Arch. 2013, 194, 2013
42013
On the impossibility of black-box transformations in mechanism design
R Pass, K Seth
International Symposium on Algorithmic Game Theory, 279-290, 2014
32014
Block Sensitivity versus Sensitivity
K Seth
Dartmouth Computer Science Technical Report TR2010-673, 2010
12010
Systems and methods for establishing a link between identifiers without disclosing specific identifying information
S Saxena, B Kreuter, S Patel, K Seth
US Patent 10,764,041, 2020
2020
Private Join and Compute from PIR with Default
T Lepoint, S Patel, M Raykova, K Seth, N Trieu
2020
Establishing a link between identifiers without disclosing specific identifying information
V Goel, P McDonnell, S Kulkarni, A Gupta, S Saxena, P McDonald, ...
US Patent 10,558,817, 2020
2020
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.
P Miao, S Patel, M Raykova, K Seth, M Yung
IACR Cryptol. ePrint Arch. 2020, 385, 2020
2020
Non-Black Box Use Of Code In Cryptography
K Seth
2016
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality
M Ion, B Kreuter, AE Nergiz, S Patel, S Saxena, K Seth, M Raykova, ...
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20