default search action
Aniket Kate
Person information
- affiliation: Purdue University, West Lafayette, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Nibesh Shrestha, Adithya Bhat, Aniket Kate, Kartik Nayak:
Synchronous Distributed Key Generation without Broadcasts. IACR Commun. Cryptol. 1(2): 19 (2024) - [j18]Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate:
Pepal: Penalizing multimedia breaches and partial leakages. Int. J. Inf. Sec. 23(1): 447-465 (2024) - [c80]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Divide and Funnel: A Scaling Technique for Mix-Networks. CSF 2024: 49-64 - [c79]Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate:
(Re)-envisioning Approximate Agreement for Distributed Cryptography and Oracles. DSN-S 2024: 62-64 - [c78]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, Michael K. Reiter:
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles. DSN 2024: 456-469 - [c77]Akhil Bandarupalli, Adithya Bhat, Somali Chaterji, Michael K. Reiter, Aniket Kate, Saurabh Bagchi:
SensorBFT: Fault-Tolerant Target Localization Using Voronoi Diagrams and Approximate Agreement. ICDCS 2024: 186-197 - [c76]Albert Yu, Hai H. Nguyen, Aniket Kate, Hemanta K. Maji:
Unconditional Security Using (Random) Anonymous Bulletin Board. ISIT 2024: 1866-1871 - [c75]Jianting Zhang, Wuhui Chen, Sifu Luo, Tiantian Gong, Zicong Hong, Aniket Kate:
Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus. NDSS 2024 - [c74]Zhongtang Luo, Adithya Bhat, Kartik Nayak, Aniket Kate:
Attacking and Improving the Tor Directory Protocol. SP 2024: 3221-3237 - [c73]Tiantian Gong, Ryan Henry, Alexandros Psomas, Aniket Kate:
More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR. SP 2024: 4348-4366 - [d2]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography. Version 1. Zenodo, 2024 [all versions] - [d1]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography. Version 2. Zenodo, 2024 [all versions] - [i81]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, Michael K. Reiter:
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles. CoRR abs/2405.02431 (2024) - [i80]Jianting Zhang, Zhongtang Luo, Raghavendra Ramesh, Aniket Kate:
Sharding SMR with Optimal-size Shards for Highly Scalable Blockchains. CoRR abs/2406.08252 (2024) - [i79]Tiantian Gong, Aniket Kate, Alexandros Psomas, Athina Terzoglou:
V3rified: Revelation vs Non-Revelation Mechanisms for Decentralized Verifiable Computation. CoRR abs/2408.07177 (2024) - [i78]Albert Yu, Hai H. Nguyen, Aniket Kate, Hemanta K. Maji:
Unconditional Security using (Random) Anonymous Bulletin Board. IACR Cryptol. ePrint Arch. 2024: 101 (2024) - [i77]Yanxue Jia, Varun Madathil, Aniket Kate:
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted. IACR Cryptol. ePrint Arch. 2024: 188 (2024) - [i76]Nibesh Shrestha, Aniket Kate, Kartik Nayak:
Sailfish: Towards Improving Latency of DAG-based BFT. IACR Cryptol. ePrint Arch. 2024: 472 (2024) - [i75]Zhongtang Luo, Yanxue Jia, Yaobin Shen, Aniket Kate:
Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability. IACR Cryptol. ePrint Arch. 2024: 733 (2024) - [i74]Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Pratik Sarkar, Sri Aravinda Krishnan Thyagarajan:
VRaaS: Verifiable Randomness as a Service on Blockchains. IACR Cryptol. ePrint Arch. 2024: 957 (2024) - [i73]Sanjam Garg, Aniket Kate, Pratyay Mukherjee, Rohit Sinha, Sriram Sridhar:
Insta-Pok3r: Real-time Poker on Blockchain. IACR Cryptol. ePrint Arch. 2024: 1061 (2024) - [i72]Jianting Zhang, Aniket Kate:
No Fish Is Too Big for Flash Boys! Frontrunning on DAG-based Blockchains. IACR Cryptol. ePrint Arch. 2024: 1496 (2024) - 2023
- [j17]Donghang Lu, Aniket Kate:
RPM: Robust Anonymity at Scale. Proc. Priv. Enhancing Technol. 2023(2): 347-360 (2023) - [c72]Aniket Kate, Easwar Vivek Mangipudi, Siva Maradana, Pratyay Mukherjee:
FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains. CCS 2023: 1776-1790 - [c71]Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate:
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets. CCS 2023: 3153-3167 - [c70]Easwar Vivek Mangipudi, Donghang Lu, Alexandros Psomas, Aniket Kate:
Collusion-Deterrent Threshold Information Escrow. CSF 2023: 584-599 - [c69]Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji:
SIM: Secure Interval Membership Testing and Applications to Secure Comparison. EuroS&P 2023: 757-772 - [c68]Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
The Unique Chain Rule and Its Applications. FC (1) 2023: 38-55 - [c67]Prasanth Chakka, Saurabh Joshi, Aniket Kate, Joshua Tobkin, David Yang:
Oracle Agreement: From an Honest Super Majority to Simple Majority. ICDCS 2023: 714-725 - [c66]Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
EESMR: Energy Efficient BFT - SMR for the masses. Middleware 2023: 1-14 - [c65]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Breaking and Fixing Virtual Channels: Domino Attack and Donner. NDSS 2023 - [c64]Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak:
OptRand: Optimistically Responsive Reconfigurable Distributed Randomness. NDSS 2023 - [i71]Tiantian Gong, Aniket Kate:
Order but Not Execute in Order. CoRR abs/2302.01177 (2023) - [i70]Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
EESMR: Energy Efficient BFT-SMR for the masses. CoRR abs/2304.04998 (2023) - [i69]Prasanth Chakka, Saurabh Joshi, Aniket Kate, Joshua Tobkin, David Yang:
DORA: Distributed Oracle Agreement with Simple Majority. CoRR abs/2305.03903 (2023) - [i68]Jianting Zhang, Wuhui Chen, Sifu Luo, Tiantian Gong, Zicong Hong, Aniket Kate:
Front-running Attack in Distributed Sharded Ledgers and Fair Cross-shard Consensus. CoRR abs/2306.06299 (2023) - [i67]Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan:
Non-interactive VSS using Class Groups and Application to DKG. IACR Cryptol. ePrint Arch. 2023: 451 (2023) - [i66]Aniket Kate, Easwar Vivek Mangipudi, Siva Maradana, Pratyay Mukherjee:
FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains. IACR Cryptol. ePrint Arch. 2023: 1339 (2023) - [i65]Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Easwar Vivek Mangipudi, Mohsen Minaei, Mainack Mondal:
SoK: Web3 Recovery Mechanisms. IACR Cryptol. ePrint Arch. 2023: 1575 (2023) - [i64]Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup. IACR Cryptol. ePrint Arch. 2023: 1755 (2023) - 2022
- [j16]Donghang Lu, Albert Yu, Aniket Kate, Hemanta K. Maji:
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications. Proc. Priv. Enhancing Technol. 2022(1): 396-416 (2022) - [j15]Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate:
OrgAn: Organizational Anonymity with Low Latency. Proc. Priv. Enhancing Technol. 2022(3): 582-605 (2022) - [c63]Easwar Vivek Mangipudi, Aniket Kate:
D-KODE: Distributed Mechanism to Manage a Billion Discrete-log Keys. AFT 2022: 308-325 - [c62]Tiantian Gong, Mohsen Minaei, Wenhai Sun, Aniket Kate:
Towards Overcoming the Undercutting Problem. Financial Cryptography 2022: 444-463 - [c61]Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller:
hbACSS: How to Robustly Share Many Secrets. NDSS 2022 - [c60]Zhongtang Luo, Rohan Murukutla, Aniket Kate:
Last Mile of Blockchains: RPC and Node-as-a-service. TPS-ISA 2022: 305-311 - [c59]Mohsen Minaei, Mainack Mondal, Aniket Kate:
Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures. USENIX Security Symposium 2022: 3415-3432 - [i63]Tiantian Gong, Ryan Henry, Alex Psomas, Aniket Kate:
Relax the Non-Collusion Assumption for Multi-Server PIR. CoRR abs/2201.07740 (2022) - [i62]Christiane Kuhn, Aniket Kate, Thorsten Strufe:
The Danger of Small Anonymity Sets in Privacy-Preserving Payment Systems. CoRR abs/2204.09282 (2022) - [i61]Zhongtang Luo, Rohan Murukutla, Aniket Kate:
Last Mile of Blockchains: RPC and Node-as-a-service. CoRR abs/2212.03383 (2022) - [i60]Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate:
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets. IACR Cryptol. ePrint Arch. 2022: 75 (2022) - [i59]Easwar Vivek Mangipudi, Aniket Kate:
D-KODE: Mechanism to Generate and Maintain a Billion Keys. IACR Cryptol. ePrint Arch. 2022: 161 (2022) - [i58]Adithya Bhat, Aniket Kate, Kartik Nayak, Nibesh Shrestha:
OptRand: Optimistically responsive distributed random beacons. IACR Cryptol. ePrint Arch. 2022: 193 (2022) - [i57]Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate:
OrgAn: Organizational Anonymity with Low Latency. IACR Cryptol. ePrint Arch. 2022: 488 (2022) - [i56]Albert Yu, Donghang Lu, Aniket Kate, Hemanta K. Maji:
SIM: Secure Interval Membership Testing and Applications to Secure Comparison. IACR Cryptol. ePrint Arch. 2022: 1023 (2022) - [i55]Donghang Lu, Aniket Kate:
RPM: Robust Anonymity at Scale. IACR Cryptol. ePrint Arch. 2022: 1037 (2022) - 2021
- [c58]Aniket Kate:
Blockchains + Network Privacy = A Nightmare. SBC@AsiaCCS 2021: 3 - [c57]Sri Aravinda Krishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder:
OpenSquare: Decentralized Repeated Modular Squaring Service. CCS 2021: 3447-3464 - [c56]Adithya Bhat, Nibesh Shrestha, Zhongtang Luo, Aniket Kate, Kartik Nayak:
RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication. CCS 2021: 3502-3524 - [c55]Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Bernardo Magri, Daniel Tschudi, Aniket Kate:
Reparo: Publicly Verifiable Layer to Repair Blockchains. Financial Cryptography (2) 2021: 37-56 - [c54]Yuyan Bao, Kirshanthan Sundararajah, Raghav Malik, Qianchuan Ye, Christopher Wagner, Nouraldin Jaber, Fei Wang, Mohammad Hassan Ameri, Donghang Lu, Alexander Seto, Benjamin Delaware, Roopsha Samanta, Aniket Kate, Christina Garman, Jeremiah Blocki, Pierre-David Letourneau, Benoît Meister, Jonathan Springer, Tiark Rompf, Milind Kulkarni:
HACCLE: metaprogramming for secure multi-party computation. GPCE 2021: 130-143 - [c53]Mohsen Minaei, S. Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate:
Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms. NDSS 2021 - [c52]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. USENIX Security Symposium 2021: 4043-4060 - [i54]Easwar Vivek Mangipudi, Donghang Lu, Aniket Kate:
Collusion-Deterrent Threshold Information Escrow. IACR Cryptol. ePrint Arch. 2021: 95 (2021) - [i53]Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew Miller:
hbACSS: How to Robustly Share Many Secrets. IACR Cryptol. ePrint Arch. 2021: 159 (2021) - [i52]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. IACR Cryptol. ePrint Arch. 2021: 176 (2021) - [i51]Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael K. Reiter:
Apollo - Optimistically Linear and Responsive SMR. IACR Cryptol. ePrint Arch. 2021: 180 (2021) - [i50]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Donner: UTXO-Based Virtual Channels Across Multiple Hops. IACR Cryptol. ePrint Arch. 2021: 855 (2021) - [i49]Donghang Lu, Albert Yu, Aniket Kate, Hemanta K. Maji:
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications. IACR Cryptol. ePrint Arch. 2021: 978 (2021) - [i48]Sri Aravinda Krishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder:
OpenSquare: Decentralized Repeated Modular Squaring Service. IACR Cryptol. ePrint Arch. 2021: 1273 (2021) - [i47]Nibesh Shrestha, Adithya Bhat, Aniket Kate, Kartik Nayak:
Synchronous Distributed Key Generation without Broadcasts. IACR Cryptol. ePrint Arch. 2021: 1635 (2021) - [i46]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Divide and Funnel: a Scaling Technique for Mix-Networks. IACR Cryptol. ePrint Arch. 2021: 1685 (2021) - 2020
- [j14]Duc Viet Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, Aniket Kate:
A Tale of Two Trees: One Writes, and Other Reads. Proc. Priv. Enhancing Technol. 2020(2): 519-536 (2020) - [j13]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Comprehensive Anonymity Trilemma: User Coordination is not enough. Proc. Priv. Enhancing Technol. 2020(3): 356-383 (2020) - [j12]Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate:
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies. Proc. Priv. Enhancing Technol. 2020(3): 404-424 (2020) - [c51]Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder:
Verifiable Timed Signatures Made Practical. CCS 2020: 1733-1750 - [c50]Pedro Moreno-Sanchez, Arthur Blue, Duc Viet Le, Sarang Noether, Brandon Goodell, Aniket Kate:
DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero. Financial Cryptography 2020: 325-345 - [c49]Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
Finding Safety in Numbers with Secure Allegation Escrows. NDSS 2020 - [i45]Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Bernardo Magri, Daniel Tschudi, Aniket Kate:
Reparo: Publicly Verifiable Layer to Repair Blockchains. CoRR abs/2001.00486 (2020) - [i44]Mohsen Minaei, S. Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate:
Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms. CoRR abs/2005.14113 (2020) - [i43]Tiantian Gong, Mohsen Minaei, Wenhai Sun, Aniket Kate:
Undercutting Bitcoin Is Not Profitable. CoRR abs/2007.11480 (2020) - [i42]Mohsen Minaei, Mainack Mondal, Aniket Kate:
"My Friend Wanted to Talk About It and I Didn't": Understanding Perceptions of Deletion Privacy in Social Platforms. CoRR abs/2008.11317 (2020) - [i41]Yuyan Bao, Kirshanthan Sundararajah, Raghav Malik, Qianchuan Ye, Christopher Wagner, Fei Wang, Mohammad Hassan Ameri, Donghang Lu, Alexander Seto, Benjamin Delaware, Roopsha Samanta, Aniket Kate, Christina Garman, Jeremiah Blocki, Pierre-David Letourneau, Benoît Meister, Jonathan Springer, Tiark Rompf, Milind Kulkarni:
HACCLE: An Ecosystem for Building Secure Multi-Party Computations. CoRR abs/2009.01489 (2020) - [i40]Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder:
Verifiable Timed Signatures Made Practical. IACR Cryptol. ePrint Arch. 2020: 1563 (2020) - [i39]Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak:
RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication. IACR Cryptol. ePrint Arch. 2020: 1590 (2020)
2010 – 2019
- 2019
- [j11]Mohsen Minaei, Mainack Mondal, Patrick Loiseau, Krishna P. Gummadi, Aniket Kate:
Lethe: Conceal Content Deletion from Persistent Observers. Proc. Priv. Enhancing Technol. 2019(1): 206-226 (2019) - [c48]Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Aniket Kate, Andrew Miller:
HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication. CCS 2019: 887-903 - [c47]Donghang Lu, Pedro Moreno-Sanchez, Amanuel Zeryihun, Shivam Bajpayi, Sihao Yin, Ken Feldman, Jason Kosofsky, Pramita Mitra, Aniket Kate:
Reducing Automotive Counterfeiting Using Blockchain: Benefits and Challenges. DAPPCON 2019: 39-48 - [c46]Duc Viet Le, Mahimna Kelkar, Aniket Kate:
Flexible Signatures: Making Authentication Suitable for Real-Time Environments. ESORICS (1) 2019: 173-193 - [c45]Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate:
Towards Automatically Penalizing Multimedia Breaches (Extended Abstract). EuroS&P Workshops 2019: 340-346 - [c44]Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li:
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification. NDSS 2019 - [c43]Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei:
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability. NDSS 2019 - [c42]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup. Public Key Cryptography (1) 2019: 286-313 - [i38]Aniket Kate, Andrew Miller, Tom Yurek:
Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead. CoRR abs/1902.06095 (2019) - [i37]Duc Viet Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, Aniket Kate:
A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains. CoRR abs/1909.01531 (2019) - [i36]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. CoRR abs/1911.09148 (2019) - [i35]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. IACR Cryptol. ePrint Arch. 2019: 63 (2019) - [i34]Pedro Moreno-Sanchez, RandomRun, Duc Viet Le, Sarang Noether, Brandon Goodell, Aniket Kate:
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero. IACR Cryptol. ePrint Arch. 2019: 595 (2019) - [i33]Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Rahul Mahadev, Aniket Kate, Andrew Miller:
HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication. IACR Cryptol. ePrint Arch. 2019: 883 (2019) - 2018
- [j10]Pedro Moreno-Sanchez, Uzair Mahmood, Aniket Kate:
ClearChart: Ensuring integrity of consumer ratings in online marketplaces. Comput. Secur. 78: 90-102 (2018) - [j9]Ryan Henry, Amir Herzberg, Aniket Kate:
Blockchain Access Privacy: Challenges and Directions. IEEE Secur. Priv. 16(4): 38-45 (2018) - [c41]Sze Yiu Chau, Bincheng Wang, Jianxiong Wang, Omar Chowdhury, Aniket Kate, Ninghui Li:
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps. ACSAC 2018: 236-251 - [c40]Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. NDSS 2018 - [c39]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. IEEE Symposium on Security and Privacy 2018: 108-126 - [c38]Pedro Moreno-Sanchez, Navin Modi, Raghuvir Songhela, Aniket Kate, Sonia Fahmy:
Mind Your Credit: Assessing the Health of the Ripple Credit Network. WWW 2018: 329-338 - [i32]Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
SATE: Robust and Private Allegation Escrows. CoRR abs/1810.10123 (2018) - [i31]Duc Viet Le, Mahimna Kelkar, Aniket Kate:
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments. IACR Cryptol. ePrint Arch. 2018: 343 (2018) - [i30]Mohsen Minaei, Pedro Moreno-Sanchez, Aniket Kate:
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies. IACR Cryptol. ePrint Arch. 2018: 454 (2018) - [i29]Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, Matteo Maffei:
Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks. IACR Cryptol. ePrint Arch. 2018: 472 (2018) - [i28]Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate:
Automated Penalization of Data Breaches using Crypto-augmented Smart Contracts. IACR Cryptol. ePrint Arch. 2018: 1050 (2018) - 2017
- [j8]Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate:
Longitudinal Privacy Management in Social Media: The Need for Better Controls. IEEE Internet Comput. 21(3): 48-55 (2017) - [j7]Pedro Moreno-Sanchez, Tim Ruffing, Aniket Kate:
PathShuffle: Credit Mixing and Anonymous Payments for Ripple. Proc. Priv. Enhancing Technol. 2017(3): 110 (2017) - [c37]David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations. ACNS 2017: 557-578 - [c36]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. CCS 2017: 455-471 - [c35]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. NDSS 2017 - [c34]Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate:
P2P Mixing and Unlinkable Bitcoin Transactions. NDSS 2017 - [c33]Sze Yiu Chau, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li:
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. IEEE Symposium on Security and Privacy 2017: 503-520 - [i27]Pedro Moreno-Sanchez, Navin Modi, Raghuvir Songhela, Aniket Kate, Sonia Fahmy:
Mind Your Credit: Assessing the Health of the Ripple Credit Network. CoRR abs/1706.02358 (2017) - [i26]Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. CoRR abs/1709.05748 (2017) - [i25]Mohsen Minaei, Mainack Mondal, Patrick Loiseau, Krishna P. Gummadi, Aniket Kate:
Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers. CoRR abs/1710.11271 (2017) - [i24]Sanjit Chatterjee, Deepak Garg, Aniket Kate, Tobias Theobald:
Encrypting Messages for Incomplete Chains of Certificates. IACR Cryptol. ePrint Arch. 2017: 777 (2017) - [i23]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. IACR Cryptol. ePrint Arch. 2017: 820 (2017) - [i22]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. IACR Cryptol. ePrint Arch. 2017: 954 (2017) - 2016
- [j6]Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework for Analyzing Anonymous Communication Protocols. J. Priv. Confidentiality 7(2) (2016) - [j5]Pedro Moreno-Sanchez, Muhammad Bilal Zafar, Aniket Kate:
Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network. Proc. Priv. Enhancing Technol. 2016(4): 436-453 (2016) - [j4]Michael Backes, Niklas Grimm, Aniket Kate:
Data Lineage in Malicious Environments. IEEE Trans. Dependable Secur. Comput. 13(2): 178-191 (2016) - [c32]Aniket Kate:
Introduction to Credit Networks: Security, Privacy, and Applications. CCS 2016: 1859-1860 - [c31]Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. ESORICS (1) 2016: 344-362 - [c30]Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate:
Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. SOUPS 2016: 287-299 - [i21]David Chaum, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Anonymization byHigh-Performance Scalable Mixing. IACR Cryptol. ePrint Arch. 2016: 8 (2016) - [i20]Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. IACR Cryptol. ePrint Arch. 2016: 678 (2016) - [i19]Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate:
P2P Mixing and Unlinkable Bitcoin Transactions. IACR Cryptol. ePrint Arch. 2016: 824 (2016) - [i18]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. IACR Cryptol. ePrint Arch. 2016: 1054 (2016) - 2015
- [c29]Satrajit Ghosh, Aniket Kate:
Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget). ACNS 2015: 263-286 - [c28]Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing:
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources. ACNS 2015: 675-695 - [c27]Tim Ruffing, Aniket Kate, Dominique Schröder:
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins. CCS 2015: 219-230 - [c26]Bimal Viswanath, Muhammad Ahmad Bashir, Muhammad Bilal Zafar, Simon Bouget, Saikat Guha, Krishna P. Gummadi, Aniket Kate, Alan Mislove:
Strength in Numbers: Robust Tamper Detection in Crowd Computations. COSN 2015: 113-124 - [c25]Daniel Porto, João Leitão, Cheng Li, Allen Clement, Aniket Kate, Flavio Paiva Junqueira, Rodrigo Rodrigues:
Visigoth fault tolerance. EuroSys 2015: 8:1-8:14 - [c24]Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Kim Pecina:
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces. NDSS 2015 - [i17]Satrajit Ghosh, Aniket Kate:
Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget). IACR Cryptol. ePrint Arch. 2015: 8 (2015) - 2014
- [c23]Michael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel:
BackRef: Accountability in Anonymous Communication Networks. ACNS 2014: 380-400 - [c22]Fabienne Eigner, Matteo Maffei, Ivan Pryvalov, Francesca Pampaloni, Aniket Kate:
Differentially private data aggregation with optimal utility. ACSAC 2014: 316-325 - [c21]Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. CCS 2014: 513-524 - [c20]Tim Ruffing, Pedro Moreno-Sanchez, Aniket Kate:
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin. ESORICS (2) 2014: 345-364 - [c19]Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate:
Asynchronous MPC with a strict honest majority using non-equivocation. PODC 2014: 10-19 - [c18]Michael Backes, Niklas Grimm, Aniket Kate:
Lime: Data Lineage in the Malicious Environment. STM 2014: 183-187 - [i16]Michael Backes, Niklas Grimm, Aniket Kate:
Lime: Data Lineage in the Malicious Environment. CoRR abs/1408.1076 (2014) - [i15]Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework For Analyzing Anonymous Communication Protocols. IACR Cryptol. ePrint Arch. 2014: 87 (2014) - [i14]Ivan Pryvalov, Aniket Kate:
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2014: 247 (2014) - [i13]Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov:
Privacy-preserving Data Aggregation with Optimal Utility. IACR Cryptol. ePrint Arch. 2014: 482 (2014) - [i12]Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. IACR Cryptol. ePrint Arch. 2014: 621 (2014) - 2013
- [j3]Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten:
Towards Practical Communication in Byzantine-Resistant DHTs. IEEE/ACM Trans. Netw. 21(1): 190-203 (2013) - [c17]Tim Ruffing, Jonas Schneider, Aniket Kate:
Identity-based steganography and its applications to censorship resistance. CCS 2013: 1461-1464 - [c16]Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework for Analyzing Anonymous Communication Protocols. CSF 2013: 163-178 - [c15]Michael Backes, Amit Datta, Aniket Kate:
Asynchronous Computational VSS with Reduced Communication Complexity. CT-RSA 2013: 259-276 - [i11]Michael Backes, Jeremy Clark, Peter Druschel, Aniket Kate, Milivoj Simeonovski:
Introducing Accountability to Anonymity Networks. CoRR abs/1311.3151 (2013) - [i10]Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate:
Asynchronous MPC with t<n/2 Using Non-equivocation. IACR Cryptol. ePrint Arch. 2013: 745 (2013) - [i9]Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing:
Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness. IACR Cryptol. ePrint Arch. 2013: 808 (2013) - 2012
- [c14]Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding query privacy to robust DHTs. AsiaCCS 2012: 30-31 - [c13]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. CSF 2012: 369-385 - [c12]Michael Backes, Fabian Bendun, Aniket Kate:
Brief announcement: distributed cryptography using trinc. PODC 2012: 91-92 - [c11]Allen Clement, Flavio Junqueira, Aniket Kate, Rodrigo Rodrigues:
On the (limited) power of non-equivocation. PODC 2012: 301-308 - [c10]Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina:
ObliviAd: Provably Secure and Practical Online Behavioral Advertising. IEEE Symposium on Security and Privacy 2012: 257-271 - [c9]Michael Backes, Aniket Kate, Esfandiar Mohammadi:
Ace: an efficient key-exchange protocol for onion routing. WPES 2012: 55-64 - [i8]Aniket Kate, Yizhou Huang, Ian Goldberg:
Distributed Key Generation in the Wild. IACR Cryptol. ePrint Arch. 2012: 377 (2012) - [i7]Michael Backes, Amit Datta, Aniket Kate:
Asynchronous Computational VSS with Reduced Communication Complexity. IACR Cryptol. ePrint Arch. 2012: 619 (2012) - 2011
- [j2]Aniket Kate, Ian Goldberg:
Generalizing cryptosystems based on the subset sum problem. Int. J. Inf. Sec. 10(3): 189-199 (2011) - [c8]Michael Backes, Aniket Kate, Arpita Patra:
Computational Verifiable Secret Sharing Revisited. ASIACRYPT 2011: 590-609 - [i6]Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding Query Privacy to Robust DHTs. CoRR abs/1107.1072 (2011) - [i5]Michael Backes, Aniket Kate, Arpita Patra:
Computational Verifiable Secret Sharing Revisited. IACR Cryptol. ePrint Arch. 2011: 281 (2011) - [i4]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. IACR Cryptol. ePrint Arch. 2011: 308 (2011) - 2010
- [b1]Aniket Kate:
Distributed Key Generation and Its Applications. University of Waterloo, Ontario, Canada, 2010 - [j1]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Pairing-Based Onion Routing with Improved Forward Secrecy. ACM Trans. Inf. Syst. Secur. 13(4): 29:1-29:32 (2010) - [c7]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Constant-Size Commitments to Polynomials and Their Applications. ASIACRYPT 2010: 177-194 - [c6]Aniket Kate, Ian Goldberg:
Using Sphinx to Improve Onion Routing Circuit Construction. Financial Cryptography 2010: 359-366 - [c5]Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten:
Practical Robust Communication in DHTs Tolerating a Byzantine Adversary. ICDCS 2010: 263-272 - [c4]Aniket Kate, Ian Goldberg:
Distributed Private-Key Generators for Identity-Based Cryptography. SCN 2010: 436-453
2000 – 2009
- 2009
- [c3]Aniket Kate, Ian Goldberg:
Distributed Key Generation for the Internet. ICDCS 2009: 119-128 - [i3]Aniket Kate, Ian Goldberg:
Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography. IACR Cryptol. ePrint Arch. 2009: 355 (2009) - [i2]Aniket Kate, Ian Goldberg:
Using Sphinx to Improve Onion Routing Circuit Construction. IACR Cryptol. ePrint Arch. 2009: 628 (2009) - 2008
- [i1]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Pairing-Based Onion Routing with Improved Forward Secrecy. IACR Cryptol. ePrint Arch. 2008: 80 (2008) - 2007
- [c2]Aniket Kate, Gregory M. Zaverucha, Ian Goldberg:
Pairing-Based Onion Routing. Privacy Enhancing Technologies 2007: 95-112 - [c1]Aniket Kate, Gregory M. Zaverucha, Urs Hengartner:
Anonymity and security in delay tolerant networks. SecureComm 2007: 504-513
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 23:02 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint