default search action
Elaine Shi
Elaine Runting Shi
Person information
- affiliation: Carnegie Mellon University, USA
- affiliation (former): Cornell University, Ithaca, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j22]Wei Dong, Zijun Chen, Qiyao Luo, Elaine Shi, Ke Yi:
Continual Observation of Joins under Differential Privacy. Proc. ACM Manag. Data 2(3): 128 (2024) - [j21]Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, Tucker Balch:
MicroSecAgg: Streamlined Single-Server Secure Aggregation. Proc. Priv. Enhancing Technol. 2024(3): 246-275 (2024) - [j20]Pengzhi Huang, Thang Hoang, Yueying Li, Elaine Shi, G. Edward Suh:
Efficient Privacy-Preserving Machine Learning with Lightweight Trusted Hardware. Proc. Priv. Enhancing Technol. 2024(4): 327-348 (2024) - [c157]Yuval Ishai, Elaine Shi, Daniel Wichs:
PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds. CRYPTO (9) 2024: 148-182 - [c156]Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi:
Efficient Pre-processing PIR Without Public-Key Cryptography. EUROCRYPT (6) 2024: 210-240 - [c155]Ke Wu, Elaine Shi, Hao Chung:
Maximizing Miner Revenue in Transaction Fee Mechanism Design. ITCS 2024: 98:1-98:23 - [c154]Mingxun Zhou, Mengshi Zhao, T.-H. Hubert Chan, Elaine Shi:
Advanced Composition Theorems for Differential Obliviousness. ITCS 2024: 103:1-103:24 - [c153]Mingxun Zhou, Andrew Park, Wenting Zheng, Elaine Shi:
Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation. SP 2024: 4296-4314 - [c152]Alireza Farhadi, Sixue Cliff Liu, Elaine Shi:
Connected Components in Linear Work and Near-Optimal Time. SPAA 2024: 395-402 - [i141]Hao Chung, Tim Roughgarden, Elaine Shi:
Collusion-Resilience in Transaction Fee Mechanism Design. CoRR abs/2402.09321 (2024) - [i140]T.-H. Hubert Chan, Ke Wu, Elaine Shi:
Mechanism Design for Automated Market Makers. CoRR abs/2402.09357 (2024) - [i139]Wei Dong, Qiyao Luo, Giulia Fanti, Elaine Shi, Ke Yi:
Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy. CoRR abs/2403.10116 (2024) - [i138]Jacob D. Leshno, Elaine Shi, Rafael Pass:
On the Viability of Open-Source Financial Rails: Economic Security of Permissionless Consensus. CoRR abs/2409.08951 (2024) - [i137]Hao Chung, Tim Roughgarden, Elaine Shi:
Collusion-Resilience in Transaction Fee Mechanism Design. IACR Cryptol. ePrint Arch. 2024: 237 (2024) - [i136]Ashrujit Ghoshal, Baitian Li, Yaohua Ma, Chenxin Dai, Elaine Shi:
Information-Theoretic Multi-Server PIR with Global Preprocessing. IACR Cryptol. ePrint Arch. 2024: 765 (2024) - [i135]Yuval Ishai, Elaine Shi, Daniel Wichs:
PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds. IACR Cryptol. ePrint Arch. 2024: 976 (2024) - [i134]Mingxun Zhou, Elaine Shi, Giulia Fanti:
Pacmann: Efficient Private Approximate Nearest Neighbor Search. IACR Cryptol. ePrint Arch. 2024: 1600 (2024) - 2023
- [j19]Ittai Abraham, T.-H. Hubert Chan, Danny Dolev, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Communication complexity of byzantine agreement, revisited. Distributed Comput. 36(1): 3-28 (2023) - [j18]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, Elaine Shi:
OptORAMa: Optimal Oblivious RAM. J. ACM 70(1): 4:1-4:70 (2023) - [j17]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi:
Oblivious RAM with Worst-Case Logarithmic Overhead. J. Cryptol. 36(2): 7 (2023) - [j16]Sarabjeet Singh, Xiong Fan, Ananth Krishna Prasad, Lin Jia, Anirban Nag, Rajeev Balasubramonian, Mahdi Nazm Bojnordi, Elaine Shi:
XCRYPT: Accelerating Lattice-Based Cryptography With Memristor Crossbar Arrays. IEEE Micro 43(5): 45-54 (2023) - [j15]Joshua Gancher, Kristina Sojakova, Xiong Fan, Elaine Shi, Greg Morrisett:
A Core Calculus for Equational Proofs of Cryptographic Protocols. Proc. ACM Program. Lang. 7(POPL): 866-892 (2023) - [c151]Mingxun Zhou, Elaine Shi, T.-H. Hubert Chan, Shir Maimon:
A Theory of Composition for Differential Obliviousness. EUROCRYPT (3) 2023: 3-34 - [c150]Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi:
Optimal Single-Server Private Information Retrieval. EUROCRYPT (1) 2023: 395-425 - [c149]Andrew Park, Wei-Kai Lin, Elaine Shi:
NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead. EUROCRYPT (1) 2023: 456-486 - [c148]Elaine Shi, Hao Chung, Ke Wu:
What Can Cryptography Do for Decentralized Mechanism Design? ITCS 2023: 97:1-97:22 - [c147]Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang:
Efficient Dynamic Proof of Retrievability for Cold Storage. NDSS 2023 - [c146]Elaine Shi, Nikhil Vanjani:
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. Public Key Cryptography (1) 2023: 622-651 - [c145]Jun Wan, Atsuki Momose, Ling Ren, Elaine Shi, Zhuolun Xiang:
On the Amortized Communication Complexity of Byzantine Broadcast. PODC 2023: 253-261 - [c144]Hao Chung, Elaine Shi:
Foundations of Transaction Fee Mechanism Design. SODA 2023: 3856-3899 - [c143]Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani, Brent Waters:
Non-Interactive Anonymous Router with Quasi-Linear Router Computation. TCC (3) 2023: 62-92 - [c142]Sourav Das, Rex Fernando, Ilan Komargodski, Elaine Shi, Pratik Soni:
Distributed-Prover Interactive Proofs. TCC (1) 2023: 91-120 - [c141]Afonso Tinoco, Sixiang Gao, Elaine Shi:
EnigMap: External-Memory Oblivious Map for Secure Enclaves. USENIX Security Symposium 2023: 4033-4050 - [i133]Sarabjeet Singh, Xiong Fan, Ananth Krishna Prasad, Lin Jia, Anirban Nag, Rajeev Balasubramonian, Mahdi Nazm Bojnordi, Elaine Shi:
XCRYPT: Accelerating Lattice Based Cryptography with Memristor Crossbar Arrays. CoRR abs/2302.00095 (2023) - [i132]Ke Wu, Elaine Shi, Hao Chung:
Maximizing Miner Revenue in Transaction Fee Mechanism Design. CoRR abs/2302.12895 (2023) - [i131]Alireza Farhadi, S. Cliff Liu, Elaine Shi:
Connected Components in Linear Work and Near-Optimal Time. CoRR abs/2312.02332 (2023) - [i130]Atsuki Momose, Ling Ren, Elaine Shi, Jun Wan, Zhuolun Xiang:
On the Amortized Communication Complexity of Byzantine Broadcast. IACR Cryptol. ePrint Arch. 2023: 38 (2023) - [i129]Ke Wu, Elaine Shi, Hao Chung:
Maximizing Miner Revenue in Transaction Fee Mechanism Design. IACR Cryptol. ePrint Arch. 2023: 283 (2023) - [i128]Mingxun Zhou, Andrew Park, Elaine Shi, Wenting Zheng:
Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation. IACR Cryptol. ePrint Arch. 2023: 452 (2023) - [i127]Elaine Shi, Nikhil Vanjani:
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles. IACR Cryptol. ePrint Arch. 2023: 615 (2023) - [i126]Mingxun Zhou, Mengshi Zhao, T.-H. Hubert Chan, Elaine Shi:
Advanced Composition Theorems for Differential Obliviousness. IACR Cryptol. ePrint Arch. 2023: 842 (2023) - [i125]Tianyao Gu, Yilei Wang, Bingnan Chen, Afonso Tinoco, Elaine Shi, Ke Yi:
Efficient Oblivious Sorting and Shuffling for Hardware Enclaves. IACR Cryptol. ePrint Arch. 2023: 1258 (2023) - [i124]Jacob D. Leshno, Rafael Pass, Elaine Shi:
Can open decentralized ledgers be economically secure? IACR Cryptol. ePrint Arch. 2023: 1516 (2023) - [i123]Ashrujit Ghoshal, Mingxun Zhou, Elaine Shi:
Efficient Pre-processing PIR Without Public-Key Cryptography. IACR Cryptol. ePrint Arch. 2023: 1574 (2023) - [i122]Mingxun Zhou, Elaine Shi, Giulia Fanti:
Proof of Compliance for Anonymous, Unlinkable Messages. IACR Cryptol. ePrint Arch. 2023: 1900 (2023) - 2022
- [j14]T.-H. Hubert Chan, Kai-Min Chung, Bruce M. Maggs, Elaine Shi:
Foundations of Differentially Oblivious Algorithms. J. ACM 69(4): 27:1-27:49 (2022) - [j13]Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Locality-Preserving Oblivious RAM. J. Cryptol. 35(2): 6 (2022) - [j12]Lianke Qin, Rajesh Jayaram, Elaine Shi, Zhao Song, Danyang Zhuo, Shumo Chu:
Differentially Oblivious Relational Database Operators. Proc. VLDB Endow. 16(4): 842-855 (2022) - [j11]Gilad Asharov, Wei-Kai Lin, Elaine Shi:
Sorting Short Keys in Circuits of Size ${o(n \log n)}$. SIAM J. Comput. 51(3): 424-466 (2022) - [c140]Alireza Farhadi, MohammadTaghi Hajiaghayi, Elaine Shi:
Differentially Private Densest Subgraph. AISTATS 2022: 11581-11597 - [c139]Ilan Komargodski, Shin'ichiro Matsuo, Elaine Shi, Ke Wu:
log *-Round Game-Theoretically-Fair Leader Election. CRYPTO (3) 2022: 409-438 - [c138]Rex Fernando, Yuval Gelles, Ilan Komargodski, Elaine Shi:
Maliciously Secure Massively Parallel Computation for All-but-One Corruptions. CRYPTO (1) 2022: 688-718 - [c137]Ke Wu, Gilad Asharov, Elaine Shi:
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss. EUROCRYPT (1) 2022: 120-149 - [c136]Naama Ben-David, Benjamin Y. Chan, Elaine Shi:
Revisiting the Power of Non-Equivocation in Distributed Protocols. PODC 2022: 450-459 - [c135]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi:
Optimal Oblivious Parallel RAM. SODA 2022: 2459-2521 - [c134]Wei-Kai Lin, Elaine Shi:
Optimal Sorting Circuits for Short Keys. SODA 2022: 3583-3629 - [c133]Mingxun Zhou, Tianhao Wang, T.-H. Hubert Chan, Giulia Fanti, Elaine Shi:
Locally Differentially Private Sparse Vector Aggregation. SP 2022: 422-439 - [c132]Jiaheng Zhang, Tiancheng Xie, Thang Hoang, Elaine Shi, Yupeng Zhang:
Polynomial Commitment with a One-to-Many Prover and Applications. USENIX Security Symposium 2022: 2965-2982 - [e6]Heng Yin, Angelos Stavrou, Cas Cremers, Elaine Shi:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, CCS 2022, Los Angeles, CA, USA, November 7-11, 2022. ACM 2022, ISBN 978-1-4503-9450-5 [contents] - [i121]Elaine Shi, Hao Chung, Ke Wu:
What Can Cryptography Do For Decentralized Mechanism Design. CoRR abs/2209.14462 (2022) - [i120]Pengzhi Huang, Thang Hoang, Yueying Li, Elaine Shi, G. Edward Suh:
STAMP: Lightweight TEE-Assisted MPC for Efficient Privacy-Preserving Machine Learning. CoRR abs/2210.10133 (2022) - [i119]Lianke Qin, Rajesh Jayaram, Elaine Shi, Zhao Song, Danyang Zhuo, Shumo Chu:
Adore: Differentially Oblivious Relational Database Operators. CoRR abs/2212.05176 (2022) - [i118]Mingxun Zhou, Elaine Shi:
The Power of the Differentially Oblivious Shuffle in Distributed Privacy Mechanisms. IACR Cryptol. ePrint Arch. 2022: 177 (2022) - [i117]Andrew Park, Wei-Kai Lin, Elaine Shi:
NanoGRAM: Garbled RAM with $\widetilde{O}(\log N)$ Overhead. IACR Cryptol. ePrint Arch. 2022: 191 (2022) - [i116]Hao Chung, Elisaweta Masserova, Elaine Shi, Sri Aravinda Krishnan Thyagarajan:
Ponyta: Foundations of Side-Contract-Resilient Fair Exchange. IACR Cryptol. ePrint Arch. 2022: 582 (2022) - [i115]Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, Elaine Shi:
Optimal Single-Server Private Information Retrieval. IACR Cryptol. ePrint Arch. 2022: 609 (2022) - [i114]Yue Guo, Antigoni Polychroniadou, Elaine Shi, David Byrd, Tucker Balch:
MicroFedML: Privacy Preserving Federated Learning for Small Weights. IACR Cryptol. ePrint Arch. 2022: 714 (2022) - [i113]Ilan Komargodski, Shin'ichiro Matsuo, Elaine Shi, Ke Wu:
log*-Round Game-Theoretically-Fair Leader Election. IACR Cryptol. ePrint Arch. 2022: 791 (2022) - [i112]Ilan Komargodski, Elaine Shi:
Differentially Oblivious Turing Machines. IACR Cryptol. ePrint Arch. 2022: 883 (2022) - [i111]Rex Fernando, Yuval Gelles, Ilan Komargodski, Elaine Shi:
Maliciously Secure Massively Parallel Computation for All-but-One Corruptions. IACR Cryptol. ePrint Arch. 2022: 1027 (2022) - [i110]Hao Chung, Elisaweta Masserova, Elaine Shi, Sri Aravinda Krishnan Thyagarajan:
Rapidash: Improved Constructions for Side-Contract-Resilient Fair Exchange. IACR Cryptol. ePrint Arch. 2022: 1063 (2022) - [i109]Afonso Tinoco, Sixiang Gao, Elaine Shi:
EnigMap: Signal Should Use Oblivious Algorithms for Private Contact Discovery. IACR Cryptol. ePrint Arch. 2022: 1083 (2022) - [i108]Elaine Shi, Hao Chung, Ke Wu:
What Can Cryptography Do For Decentralized Mechanism Design? IACR Cryptol. ePrint Arch. 2022: 1294 (2022) - [i107]Mingxun Zhou, Elaine Shi, T.-H. Hubert Chan, Shir Maimon:
A Theory of Composition for Differential Obliviousness. IACR Cryptol. ePrint Arch. 2022: 1357 (2022) - [i106]Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani:
Non-Interactive Anonymous Router with Quasi-Linear Router Computation. IACR Cryptol. ePrint Arch. 2022: 1395 (2022) - [i105]Tung Le, Pengzhi Huang, Attila A. Yavuz, Elaine Shi, Thang Hoang:
Efficient Dynamic Proof of Retrievability for Cold Storage. IACR Cryptol. ePrint Arch. 2022: 1417 (2022) - 2021
- [c131]Elaine Shi:
Streamlet: An Absurdly Simple, Textbook Blockchain Protocol. AsiaCCS 2021: 320 - [c130]T.-H. Hubert Chan, Elaine Shi, Wei-Kai Lin, Kartik Nayak:
Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions. ITC 2021: 8:1-8:23 - [c129]Shumo Chu, Danyang Zhuo, Elaine Shi, T.-H. Hubert Chan:
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms. ITC 2021: 19:1-19:24 - [c128]Kai-Min Chung, T.-H. Hubert Chan, Ting Wen, Elaine Shi:
Game-Theoretic Fairness Meets Multi-party Protocols: The Case of Leader Election. CRYPTO (2) 2021: 3-32 - [c127]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi:
Oblivious RAM with Worst-Case Logarithmic Overhead. CRYPTO (4) 2021: 610-640 - [c126]Elaine Shi, Waqar Aqeel, Balakrishnan Chandrasekaran, Bruce M. Maggs:
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time. CRYPTO (4) 2021: 641-669 - [c125]Elaine Shi, Ke Wu:
Non-Interactive Anonymous Router. EUROCRYPT (3) 2021: 489-520 - [c124]Yoko Shibuya, Go Yamamoto, Fuhito Kojima, Elaine Shi, Shin'ichiro Matsuo, Aron Laszka:
Selfish Mining Attacks Exacerbated by Elastic Hash Supply. Financial Cryptography (2) 2021: 269-276 - [c123]Ilan Komargodski, Elaine Shi:
Differentially Oblivious Turing Machines. ITCS 2021: 68:1-68:19 - [c122]Cosku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi:
Viaduct: an extensible, optimizing compiler for secure distributed programs. PLDI 2021: 740-755 - [c121]Gilad Asharov, Wei-Kai Lin, Elaine Shi:
Sorting Short Keys in Circuits of Size o(n log n). SODA 2021: 2249-2268 - [c120]Vijaya Ramachandran, Elaine Shi:
Data Oblivious Algorithms for Multicores. SPAA 2021: 373-384 - [e5]Yongdae Kim, Jong Kim, Giovanni Vigna, Elaine Shi:
CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021. ACM 2021, ISBN 978-1-4503-8454-4 [contents] - [i104]Wei-Kai Lin, Elaine Shi:
Optimal Sorting Circuits for Short Keys. CoRR abs/2102.11489 (2021) - [i103]Yoko Shibuya, Go Yamamoto, Fuhito Kojima, Elaine Shi, Shin'ichiro Matsuo, Aron Laszka:
Selfish Mining Attacks Exacerbated by Elastic Hash Supply. CoRR abs/2103.08007 (2021) - [i102]Alireza Farhadi, MohammadTaghi Hajiaghayi, Elaine Shi:
Differentially Private Densest Subgraph. CoRR abs/2106.00508 (2021) - [i101]Hao Chung, Elaine Shi:
Foundations of Transaction Fee Mechanism Design. CoRR abs/2111.03151 (2021) - [i100]Mingxun Zhou, Tianhao Wang, T.-H. Hubert Chan, Giulia Fanti, Elaine Shi:
Locally Differentially Private Sparse Vector Aggregation. CoRR abs/2112.03449 (2021) - [i99]Greg Morrisett, Elaine Shi, Kristina Sojakova, Xiong Fan, Joshua Gancher:
IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols. IACR Cryptol. ePrint Arch. 2021: 147 (2021) - [i98]Elaine Shi, Ke Wu:
Non-Interactive Anonymous Router. IACR Cryptol. ePrint Arch. 2021: 435 (2021) - [i97]Cosku Acay, Rolph Recto, Joshua Gancher, Andrew C. Myers, Elaine Shi:
Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report). IACR Cryptol. ePrint Arch. 2021: 468 (2021) - [i96]Shumo Chu, Danyang Zhuo, Elaine Shi, T.-H. Hubert Chan:
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms. IACR Cryptol. ePrint Arch. 2021: 593 (2021) - [i95]Ke Wu, Gilad Asharov, Elaine Shi:
A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss. IACR Cryptol. ePrint Arch. 2021: 748 (2021) - [i94]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Elaine Shi:
Oblivious RAM with Worst-Case Logarithmic Overhead. IACR Cryptol. ePrint Arch. 2021: 1123 (2021) - [i93]Benedikt Bünz, Yuncong Hu, Shin'ichiro Matsuo, Elaine Shi:
Non-Interactive Differentially Anonymous Router. IACR Cryptol. ePrint Arch. 2021: 1242 (2021) - [i92]Hao Chung, Elaine Shi:
Foundations of Transaction Fee Mechanism Design. IACR Cryptol. ePrint Arch. 2021: 1474 (2021) - 2020
- [j10]Alireza Farhadi, Mohammad Taghi Hajiaghayi, Kasper Green Larsen, Elaine Shi:
Lower bounds for external memory integer sorting via network coding. Commun. ACM 63(10): 97-105 (2020) - [j9]Dana Dachman-Soled, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:
Locally Decodable and Updatable Non-malleable Codes and Their Applications. J. Cryptol. 33(1): 319-355 (2020) - [j8]Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas:
A Retrospective on Path ORAM. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(8): 1572-1576 (2020) - [c119]Benjamin Y. Chan, Elaine Shi:
Streamlet: Textbook Streamlined Blockchains. AFT 2020: 1-11 - [c118]Andrew Morgan, Rafael Pass, Elaine Shi:
On the Adaptive Security of MACs and PRFs. ASIACRYPT (1) 2020: 724-753 - [c117]Pan Zhang, Chengyu Song, Heng Yin, Deqing Zou, Elaine Shi, Hai Jin:
Klotski: Efficient Obfuscated Execution against Controlled-Channel Attacks. ASPLOS 2020: 1263-1276 - [c116]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, Elaine Shi:
OptORAMa: Optimal Oblivious RAM. EUROCRYPT (2) 2020: 403-432 - [c115]Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Enoch Peserico, Elaine Shi:
Oblivious Parallel Tight Compaction. ITC 2020: 11:1-11:23 - [c114]T.-H. Hubert Chan, Kai-Min Chung, Wei-Kai Lin, Elaine Shi:
MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture. ITCS 2020: 75:1-75:52 - [c113]T.-H. Hubert Chan, Rafael Pass, Elaine Shi:
Sublinear-Round Byzantine Agreement Under Corrupt Majority. Public Key Cryptography (2) 2020: 246-265 - [c112]Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Bucket Oblivious Sort: An Extremely Simple Oblivious Sort. SOSA 2020: 8-14 - [c111]T.-H. Hubert Chan, Zhibin Liang, Antigoni Polychroniadou, Elaine Shi:
Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels. SODA 2020: 2349-2365 - [c110]Elaine Shi:
Path Oblivious Heap: Optimal and Practical Oblivious Priority Queue. SP 2020: 842-858 - [c109]Rex Fernando, Ilan Komargodski, Yanyi Liu, Elaine Shi:
Secure Massively Parallel Computation for Dishonest Majority. TCC (2) 2020: 379-409 - [c108]Jun Wan, Hanshen Xiao, Elaine Shi, Srinivas Devadas:
Expected Constant Round Byzantine Broadcast Under Dishonest Majority. TCC (1) 2020: 381-411 - [c107]Jun Wan, Hanshen Xiao, Srinivas Devadas, Elaine Shi:
Round-Efficient Byzantine Broadcast Under Strongly Adaptive and Majority Corruptions. TCC (1) 2020: 412-456 - [c106]Kartik Nayak, Ling Ren, Elaine Shi, Nitin H. Vaidya, Zhuolun Xiang:
Improved Extension Protocols for Byzantine Broadcast and Agreement. DISC 2020: 28:1-28:17 - [i91]Kartik Nayak, Ling Ren, Elaine Shi, Nitin H. Vaidya, Zhuolun Xiang:
Improved Extension Protocols for Byzantine Broadcast and Agreement. CoRR abs/2002.11321 (2020) - [i90]Vijaya Ramachandran, Elaine Shi:
Data Oblivious Algorithms for Multicores. CoRR abs/2008.00332 (2020) - [i89]Gilad Asharov, T.-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren, Elaine Shi:
Bucket Oblivious Sort: An Extremely Simple Oblivious Sort. CoRR abs/2008.01765 (2020) - [i88]Gilad Asharov, Wei-Kai Lin, Elaine Shi:
Sorting Short Keys in Circuits of Size o(n log n). CoRR abs/2010.09884 (2020) - [i87]Elaine Shi:
Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey). IACR Cryptol. ePrint Arch. 2020: 87 (2020) - [i86]Benjamin Y. Chan,