Practical secure aggregation for privacy-preserving machine learning K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ... proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 1822 | 2017 |
Practical secure aggregation for federated learning on user-held data K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ... arXiv preprint arXiv:1611.04482, 2016 | 300 | 2016 |
Indistinguishability obfuscation from semantically-secure multilinear encodings R Pass, K Seth, S Telang Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 192 | 2014 |
Private intersection-sum protocol with applications to attributing aggregate ad conversions M Ion, B Kreuter, E Nergiz, S Patel, S Saxena, K Seth, D Shanahan, ... Cryptology ePrint Archive, 2017 | 81 | 2017 |
On deploying secure computing: Private intersection-sum-with-cardinality M Ion, B Kreuter, AE Nergiz, S Patel, S Saxena, K Seth, M Raykova, ... 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 370-389, 2020 | 67 | 2020 |
Indistinguishability obfuscation with non-trivial efficiency H Lin, R Pass, K Seth, S Telang Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 54 | 2016 |
On the impossibility of cryptography with tamperable randomness P Austrin, KM Chung, M Mahmoody, R Pass, K Seth Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 47 | 2014 |
Output-compressing randomized encodings and applications H Lin, R Pass, K Seth, S Telang Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015 | 46 | 2015 |
Non-black-box simulation from one-way functions and applications to resettable security KM Chung, R Pass, K Seth Proceedings of the forty-fifth annual ACM symposium on Theory of Computing …, 2013 | 43 | 2013 |
Communication-Computation Trade-offs in PIR. A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo IACR Cryptol. ePrint Arch. 2019, 1483, 2019 | 40 | 2019 |
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications. M Ion, B Kreuter, AE Nergiz, S Patel, M Raykova, S Saxena, K Seth, ... IACR Cryptol. ePrint Arch. 2019, 723, 2019 | 39 | 2019 |
Two-sided malicious security for private intersection-sum with cardinality P Miao, S Patel, M Raykova, K Seth, M Yung Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 32 | 2020 |
Practical secure aggregation for privacy-preserving machine learning A Segal, A Marcedone, B Kreuter, D Ramage, HB McMahan, K Seth, ... | 29 | 2017 |
Private join and compute from PIR with default T Lepoint, S Patel, M Raykova, K Seth, N Trieu Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 10 | 2021 |
Secure poisson regression M Kelkar, PH Le, M Raykova, K Seth 31st USENIX Security Symposium (USENIX Security 22), 791-808, 2022 | 5 | 2022 |
On the (Im) Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses. P Austrin, KM Chung, M Mahmoody, R Pass, K Seth IACR Cryptol. ePrint Arch. 2013, 194, 2013 | 4 | 2013 |
What's in a Name? Exploring CA Certificate Control. Z Ma, J Mason, M Antonakakis, Z Durumeric, M Bailey USENIX Security Symposium, 4383-4400, 2021 | 3 | 2021 |
On the impossibility of black-box transformations in mechanism design R Pass, K Seth Algorithmic Game Theory: 7th International Symposium, SAGT 2014, Haifa …, 2014 | 3 | 2014 |
Systems and methods for establishing a link between identifiers without disclosing specific identifying information S Saxena, B Kreuter, S Patel, K Seth US Patent App. 17/567,208, 2022 | 1 | 2022 |
Block Sensitivity versus Sensitivity K Seth | 1 | 2010 |