• Login
    Search 
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    •   etd@IISc
    • Division of Electrical, Electronics, and Computer Science (EECS)
    • Computer Science and Automation (CSA)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-7 of 7

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Advancing the Communication Complexity Landscape of Perfectly Secure Multiparty Computation 

    Patil, Shravani Mahesh
    Secure multiparty computation (MPC) allows n distrustful parties to jointly compute a function on their inputs while keeping their inputs private. The distrust is modelled as an adversary that controls up to t parties and ...

    Secure Computation Protocol Suite for Privacy-Conscious Applications 

    Saipanmuluk, Koti Nishat
    As an alternative to performing analytics in the clear, there is an increasing demand for developing privacy-preserving solutions that aim to protect sensitive data while still allowing for its efficient analysis. Among ...

    Ankora: Notions of Multi-party Computation and Zero-knowledge Beyond Conventional Models 

    Paul, Protik Kumar
    In the era of digitalization, data privacy and integrity are of utmost importance. Secure multiparty computation (MPC) and zero-knowledge (ZK) facilitate data privacy and integrity. MPC enables privacy-preserving collaborative ...

    Locally Reconstructable Non-malleable Secret Sharing 

    Tomy, Jenit
    Non-malleable secret sharing (NMSS) schemes, introduced by Goyal and Kumar (STOC 2018), ensure that a secret m can be distributed into shares m1,...,mn (for some n), such that any t (a parameter <= n) shares can be ...

    Zero Knowledge Proofs: Succinct Verification, Distributed Proofs and Lookup Arguments 

    Dutta, Moumita
    Zero-Knowledge Proofs (ZKPs) are fundamental cryptographic tools enabling a prover to convince a verifier about the knowledge of a secret witness related to a public statement, without revealing any information beyond the ...

    Enhancing Privacy and Efficiency of Distributed Encryption 

    Chakrabarti, Anirban
    The primary objective of a distributed system is to eliminate reliance on a central authority. In a distributed encryption scheme, users should be able to generate their key materials independently while securely sharing ...

    Secure Auctions with Rational Parties 

    Shankar, Girisha
    Sealed bid auctions are used to allocate a resource among a set of interested parties. Traditionally, auctions need the presence of a trusted auctioneer to whom the bidders provide their private bid values. Existence of ...

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV
     

     

    Browse

    All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission DateThis CollectionTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

    My Account

    LoginRegister

    Discover

    AuthorChakrabarti, Anirban (1)Dutta, Moumita (1)Patil, Shravani Mahesh (1)Paul, Protik Kumar (1)Saipanmuluk, Koti Nishat (1)Shankar, Girisha (1)Tomy, Jenit (1)Subject
    Cryptography (7)
    TECHNOLOGY (7)
    Secure multiparty computation (3)MPC (2)anonymous broadcast (1)Auctions (1)blockchain (1)Committed Index Lookup Arguments (1)Communication Complexity (1)dark pools (1)... View MoreHas File(s)
    Yes (7)

    etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
    Contact Us | Send Feedback | Thesis Templates
    Theme by 
    Atmire NV