


Остановите войну!
for scientists:


default search action
Abhi Shelat
Person information

- affiliation: Northeastern University, Khoury College of Computer Sciences, Boston, MA, USA
- affiliation: University of Virginia, Charlottesville, VA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j9]Ran Cohen, Abhi Shelat, Daniel Wichs:
Adaptively Secure MPC with Sublinear Communication Complexity. J. Cryptol. 36(2): 11 (2023) - [c67]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner:
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. SP 2023: 773-789 - [i39]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat, LaKyah Tyner:
Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance. IACR Cryptol. ePrint Arch. 2023: 602 (2023) - [i38]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Threshold ECDSA in Three Rounds. IACR Cryptol. ePrint Arch. 2023: 765 (2023) - [i37]Ran Cohen, Jack Doerner, Yashvanth Kondi, Abhi Shelat:
Secure Multiparty Computation with Identifiable Abort from Vindicating Release. IACR Cryptol. ePrint Arch. 2023: 1136 (2023) - 2022
- [j8]Megan Chen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, Abhi Shelat, Ran Cohen:
Multiparty Generation of an RSA Modulus. J. Cryptol. 35(2): 12 (2022) - [c66]Yashvanth Kondi, Abhi Shelat:
Improved Straight-Line Extraction in the Random Oracle Model with Applications to Signature Aggregation. ASIACRYPT (2) 2022: 279-309 - [c65]Ran Cohen, Jack Doerner, Yashvanth Kondi, Abhi Shelat:
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols. EUROCRYPT (1) 2022: 241-271 - [i36]Ran Cohen, Jack Doerner, Yashvanth Kondi, Abhi Shelat:
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols. IACR Cryptol. ePrint Arch. 2022: 257 (2022) - [i35]Yashvanth Kondi, Abhi Shelat:
Improved Straight-Line Extraction in the Random Oracle Model With Applications to Signature Aggregation. IACR Cryptol. ePrint Arch. 2022: 393 (2022) - [i34]Lucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat:
A Better Method to Analyze Blockchain Consistency. IACR Cryptol. ePrint Arch. 2022: 601 (2022) - 2021
- [c64]Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, Abhi Shelat, Muthu Venkitasubramaniam, Ruihan Wang:
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority. SP 2021: 590-607 - 2020
- [c63]Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, Abhi Shelat:
Multiparty Generation of an RSA Modulus. CRYPTO (3) 2020: 64-93 - [c62]Carmit Hazay, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam:
Going Beyond Dual Execution: MPC for Functions with Efficient Verification. Public Key Cryptography (2) 2020: 328-356 - [i33]Carmit Hazay, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam:
Going Beyond Dual Execution: MPC for Functions with Efficient Verification. IACR Cryptol. ePrint Arch. 2020: 139 (2020) - [i32]Megan Chen, Ran Cohen, Jack Doerner, Yashvanth Kondi, Eysa Lee, Schuyler Rosefield, Abhi Shelat:
Multiparty Generation of an RSA Modulus. IACR Cryptol. ePrint Arch. 2020: 370 (2020) - [i31]Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam, Ruihan Wang:
Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority. IACR Cryptol. ePrint Arch. 2020: 374 (2020)
2010 – 2019
- 2019
- [c61]Jeffrey Champion, Abhi Shelat, Jonathan R. Ullman:
Securely Sampling Biased Coins with Applications to Differential Privacy. CCS 2019: 603-614 - [c60]Ran Cohen, Abhi Shelat, Daniel Wichs:
Adaptively Secure MPC with Sublinear Communication Complexity. CRYPTO (2) 2019: 30-60 - [c59]Antonio Marcedone, Rafael Pass
, Abhi Shelat:
Minimizing Trust in Hardware Wallets with Two Factor Signatures. Financial Cryptography 2019: 407-425 - [c58]Liang Wang, Gilad Asharov
, Rafael Pass
, Thomas Ristenpart, Abhi Shelat:
Blind Certificate Authorities. IEEE Symposium on Security and Privacy 2019: 1015-1032 - [c57]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. IEEE Symposium on Security and Privacy 2019: 1051-1066 - [i30]Antonio Marcedone, Rafael Pass, Abhi Shelat:
Minimizing Trust in Hardware Wallets with Two Factor Signatures. IACR Cryptol. ePrint Arch. 2019: 6 (2019) - [i29]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case. IACR Cryptol. ePrint Arch. 2019: 523 (2019) - [i28]Jeffrey Champion, Abhi Shelat, Jonathan R. Ullman:
Securely Sampling Biased Coins with Applications to Differential Privacy. IACR Cryptol. ePrint Arch. 2019: 823 (2019) - 2018
- [c56]Lucianna Kiffer, Rajmohan Rajaraman, Abhi Shelat:
A Better Method to Analyze Blockchain Consistency. CCS 2018: 729-744 - [c55]Ariel Hamlin, Abhi Shelat, Mor Weiss, Daniel Wichs:
Multi-Key Searchable Encryption, Revisited. Public Key Cryptography (1) 2018: 95-124 - [c54]Riad S. Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, Michael Walfish:
Doubly-Efficient zkSNARKs Without Trusted Setup. IEEE Symposium on Security and Privacy 2018: 926-943 - [c53]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Secure Two-party Threshold ECDSA from ECDSA Assumptions. IEEE Symposium on Security and Privacy 2018: 980-997 - [i27]Ariel Hamlin, Abhi Shelat, Mor Weiss, Daniel Wichs:
Multi-Key Searchable Encryption, Revisited. IACR Cryptol. ePrint Arch. 2018: 18 (2018) - [i26]Jack Doerner, Yashvanth Kondi, Eysa Lee, Abhi Shelat:
Secure Two-party Threshold ECDSA from ECDSA Assumptions. IACR Cryptol. ePrint Arch. 2018: 499 (2018) - [i25]Liang Wang, Gilad Asharov, Rafael Pass, Thomas Ristenpart, Abhi Shelat:
Blind Certificate Authorities. IACR Cryptol. ePrint Arch. 2018: 1022 (2018) - [i24]Ran Cohen, Abhi Shelat, Daniel Wichs:
Adaptively Secure MPC with Sublinear Communication Complexity. IACR Cryptol. ePrint Arch. 2018: 1161 (2018) - 2017
- [c52]Jack Doerner, Abhi Shelat:
Scaling ORAM for Secure Computation. CCS 2017: 523-535 - [c51]Riad S. Wahby, Ye Ji, Andrew J. Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, Thomas Wies:
Full Accounting for Verifiable Outsourcing. CCS 2017: 2071-2086 - [c50]Rafael Pass
, Lior Seeman, Abhi Shelat:
Analysis of the Blockchain Protocol in Asynchronous Networks. EUROCRYPT (2) 2017: 643-673 - [c49]Ben Fisch, Rafael Pass
, Abhi Shelat:
Socially Optimal Mining Pools. WINE 2017: 205-218 - [i23]Ben A. Fisch, Rafael Pass, Abhi Shelat:
Socially Optimal Mining Pools. CoRR abs/1703.03846 (2017) - [i22]Riad S. Wahby, Ye Ji, Andrew J. Blumberg, Abhi Shelat, Justin Thaler, Michael Walfish, Thomas Wies:
Full accounting for verifiable outsourcing. IACR Cryptol. ePrint Arch. 2017: 242 (2017) - [i21]Jack Doerner, Abhi Shelat:
Scaling ORAM for Secure Computation. IACR Cryptol. ePrint Arch. 2017: 827 (2017) - [i20]Riad S. Wahby, Ioanna Tzialla, Abhi Shelat, Justin Thaler, Michael Walfish:
Doubly-efficient zkSNARKs without trusted setup. IACR Cryptol. ePrint Arch. 2017: 1132 (2017) - 2016
- [c48]Jack Doerner, David Evans, Abhi Shelat:
Secure Stable Matching at Scale. CCS 2016: 1602-1613 - [c47]Antonio Marcedone, Rafael Pass
, Abhi Shelat:
Bounded KDM Security from iO and OWF. SCN 2016: 571-586 - [c46]Riad S. Wahby, Max Howald, Siddharth Garg, Abhi Shelat, Michael Walfish:
Verifiable ASICs. IEEE Symposium on Security and Privacy 2016: 759-778 - [c45]Rafael Pass
, Abhi Shelat:
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings. TCC (A1) 2016: 3-17 - [c44]Mohammad Mahmoody
, Ameer Mohammed, Soheil Nematihaji, Rafael Pass
, Abhi Shelat:
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation. TCC (A1) 2016: 49-66 - [c43]Ruiyu Zhu, Yan Huang, Jonathan Katz, Abhi Shelat:
The Cut-and-Choose Game and Its Application to Cryptographic Protocols. USENIX Security Symposium 2016: 1085-1100 - [i19]Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, Abhi Shelat:
A Note on Black-Box Complexity of Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2016: 316 (2016) - [i18]Rafael Pass, Abhi Shelat:
Micropayments for Decentralized Currencies. IACR Cryptol. ePrint Arch. 2016: 332 (2016) - [i17]Rafael Pass, Lior Seeman, Abhi Shelat:
Analysis of the Blockchain Protocol in Asynchronous Networks. IACR Cryptol. ePrint Arch. 2016: 454 (2016) - [i16]Antonio Marcedone, Rafael Pass, Abhi Shelat:
Bounded KDM Security from iO and OWF. IACR Cryptol. ePrint Arch. 2016: 688 (2016) - [i15]Jack Doerner, David Evans, Abhi Shelat:
Secure Stable Matching at Scale. IACR Cryptol. ePrint Arch. 2016: 861 (2016) - [i14]Liang Wang, Rafael Pass, Abhi Shelat, Thomas Ristenpart:
Secure Channel Injection and Anonymous Proofs of Account Ownership. IACR Cryptol. ePrint Arch. 2016: 925 (2016) - 2015
- [j7]Susan Hohenberger, Steven A. Myers, Rafael Pass
, Abhi Shelat:
An Overview of ANONIZE: A Large-Scale Anonymous Survey System. IEEE Secur. Priv. 13(2): 22-29 (2015) - [j6]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. J. Cryptol. 28(2): 351-395 (2015) - [c42]Abhi Shelat, Muthuramakrishnan Venkitasubramaniam:
Secure Computation from Millionaire. ASIACRYPT (1) 2015: 736-757 - [c41]Rafael Pass
, Abhi Shelat:
Micropayments for Decentralized Currencies. CCS 2015: 207-218 - [c40]Nathan Brunelle, Gabriel Robins, Abhi Shelat:
Compression-Aware Algorithms for Massive Datasets. DCC 2015: 441 - [i13]Rafael Pass, Abhi Shelat:
Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings. IACR Cryptol. ePrint Arch. 2015: 383 (2015) - [i12]Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
ANONIZE: A Large-Scale Anonymous Survey System. IACR Cryptol. ePrint Arch. 2015: 681 (2015) - [i11]Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, Abhi Shelat:
Lower Bounds on Assumptions behind Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2015: 1062 (2015) - [i10]Ahmed E. Kosba, Zhichao Zhao, Andrew Miller, Yi Qian, T.-H. Hubert Chan, Charalampos Papamanthou, Rafael Pass, Abhi Shelat, Elaine Shi:
How to Use SNARKs in Universally Composable Protocols. IACR Cryptol. ePrint Arch. 2015: 1093 (2015) - [i9]Riad S. Wahby, Max Howald, Siddharth Garg, Abhi Shelat, Michael Walfish:
Verifiable ASICs. IACR Cryptol. ePrint Arch. 2015: 1243 (2015) - 2014
- [c39]Xiao Shaun Wang
, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi:
SCORAM: Oblivious RAM for Secure Computation. CCS 2014: 191-202 - [c38]Susan Hohenberger, Steven A. Myers, Rafael Pass
, Abhi Shelat:
ANONIZE: A Large-Scale Anonymous Survey System. IEEE Symposium on Security and Privacy 2014: 375-389 - [i8]Xiao Shaun Wang, Yan Huang, T.-H. Hubert Chan, Abhi Shelat, Elaine Shi:
SCORAM: Oblivious RAM for Secure Computation. IACR Cryptol. ePrint Arch. 2014: 671 (2014) - 2013
- [j5]Steven A. Myers, Mona Sergi, Abhi Shelat:
Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness. J. Comput. Secur. 21(5): 721-748 (2013) - [c37]Nathaniel Husted, Steven A. Myers, Abhi Shelat, Paul Grubbs:
GPU and CPU parallelization of honest-but-curious secure two-party computation. ACSAC 2013: 169-178 - [c36]Benjamin Kreuter, Abhi Shelat:
Lessons learned with PCF: scaling secure computation. PETShop@CCS 2013: 7-10 - [c35]Abhi Shelat, Chih-Hao Shen:
Fast two-party secure computation with minimal assumptions. CCS 2013: 523-534 - [c34]Nathan Brunelle, Gabriel Robins, Abhi Shelat:
Algorithms for Compressed Inputs. DCC 2013: 478 - [c33]Steven A. Myers, Mona Sergi, Abhi Shelat:
Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead. TCC 2013: 397-417 - [c32]Ben Kreuter, Abhi Shelat, Benjamin Mood, Kevin R. B. Butler:
PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation. USENIX Security Symposium 2013: 321-336 - [i7]Abhi Shelat, Chih-Hao Shen:
Fast Two-Party Secure Computation with Minimal Assumptions. IACR Cryptol. ePrint Arch. 2013: 196 (2013) - 2012
- [c31]Steven A. Myers, Mona Sergi, Abhi Shelat:
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness. SCN 2012: 149-165 - [c30]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. TCC 2012: 1-20 - [c29]Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen:
Billion-Gate Secure Computation with Malicious Adversaries. USENIX Security Symposium 2012: 285-300 - [i6]Benjamin Kreuter, Abhi Shelat, Chih-Hao Shen:
Towards Billion-Gate Secure Computation with Malicious Adversaries. IACR Cryptol. ePrint Arch. 2012: 179 (2012) - 2011
- [j4]Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan:
Securely Obfuscating Re-Encryption. J. Cryptol. 24(4): 694-719 (2011) - [c28]Abhi Shelat, Chih-Hao Shen:
Two-Output Secure Computation with Malicious Adversaries. EUROCRYPT 2011: 386-405 - [c27]Yan Huang, Chih-Hao Shen, David Evans, Jonathan Katz, Abhi Shelat:
Efficient Secure Computation with Garbled Circuits. ICISS 2011: 28-48 - [c26]Rafael Pass, Abhi Shelat:
Renegotiation-Safe Protocols. ICS 2011: 61-78 - [i5]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. IACR Cryptol. ePrint Arch. 2011: 96 (2011) - [i4]Steven A. Myers, Mona Sergi, Abhi Shelat:
Threshold Fully Homomorphic Encryption and Secure Computation. IACR Cryptol. ePrint Arch. 2011: 454 (2011) - [i3]Abhi Shelat, Chih-Hao Shen:
Two-Output Secure Computation with Malicious Adversaries. IACR Cryptol. ePrint Arch. 2011: 533 (2011) - 2010
- [c25]Rafik Chaabouni, Helger Lipmaa
, Abhi Shelat:
Additive Combinatorics and Discrete Logarithm Based Range Protocols. ACISP 2010: 336-351 - [c24]Alon Rosen, Abhi Shelat:
Optimistic Concurrent Zero Knowledge. ASIACRYPT 2010: 359-376 - [c23]Abhi Shelat:
Collusion-free protocols. BQGT 2010: 91:1
2000 – 2009
- 2009
- [c22]Joël Alwen, Jonathan Katz, Yehuda Lindell
, Giuseppe Persiano, Abhi Shelat, Ivan Visconti:
Collusion-Free Multiparty Computation in the Mediated Model. CRYPTO 2009: 524-540 - [c21]Steven A. Myers, Abhi Shelat:
Bit Encryption Is Complete. FOCS 2009: 607-616 - [c20]Silvio Micali, Abhi Shelat:
Purely Rational Secret Sharing (Extended Abstract). TCC 2009: 54-71 - [i2]Rafik Chaabouni, Helger Lipmaa, Abhi Shelat:
Additive Combinatorics and Discrete Logarithm Based Range Protocols. IACR Cryptol. ePrint Arch. 2009: 469 (2009) - 2008
- [c19]Jan Camenisch, Rafik Chaabouni, Abhi Shelat:
Efficient Protocols for Set Membership and Range Proofs. ASIACRYPT 2008: 234-252 - [c18]Joël Alwen, Abhi Shelat, Ivan Visconti:
Collusion-Free Protocols in the Mediated Model. CRYPTO 2008: 497-514 - [i1]Jan Camenisch, Gregory Neven, Abhi Shelat:
Simulatable Adaptive Oblivious Transfer. IACR Cryptol. ePrint Arch. 2008: 14 (2008) - 2007
- [c17]Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz
, Rafael Pass
, Abhi Shelat, Vinod Vaikuntanathan:
Bounded CCA2-Secure Encryption. ASIACRYPT 2007: 502-518 - [c16]Rafael Pass
, Abhi Shelat, Vinod Vaikuntanathan:
Relations Among Notions of Non-malleability for Encryption. ASIACRYPT 2007: 519-535 - [c15]Jan Camenisch, Gregory Neven, Abhi Shelat:
Simulatable Adaptive Oblivious Transfer. EUROCRYPT 2007: 573-590 - [c14]Ran Canetti, Rafael Pass, Abhi Shelat:
Cryptography from Sunspots: How to Use an Imperfect Reference String. FOCS 2007: 249-259 - [c13]Christian Cachin, Abhi Shelat, Alexander Shraer:
Efficient fork-linearizable access to untrusted shared memory. PODC 2007: 129-138 - [c12]Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan:
Securely Obfuscating Re-encryption. TCC 2007: 233-252 - 2006
- [c11]Rafael Pass
, Abhi Shelat, Vinod Vaikuntanathan:
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One. CRYPTO 2006: 271-289 - [c10]Jan Camenisch, Abhi Shelat, Dieter Sommer, Roger Zimmermann:
Securing user inputs for the web. Digital Identity Management 2006: 33-44 - 2005
- [b1]Abhi Shelat:
Études in non-interactive zero-knowledge. Massachusetts Institute of Technology, Cambridge, MA, USA, 2005 - [j3]Moses Charikar, Eric Lehman, Ding Liu, Rina Panigrahy, Manoj Prabhakaran, Amit Sahai, Abhi Shelat:
The smallest grammar problem. IEEE Trans. Inf. Theory 51(7): 2554-2576 (2005) - [c9]Rafael Pass, Abhi Shelat:
Unconditional Characterizations of Non-interactive Zero-Knowledge. CRYPTO 2005: 118-134 - [c8]Jan Camenisch, Abhi Shelat, Dieter Sommer, Simone Fischer-Hübner, Marit Hansen, Henry Krasemann, Gérard Lacoste, Ronald Leenes, Jimmy C. Tseng:
Privacy and identity management for everyone. Digital Identity Management 2005: 20-27 - [c7]Matt Lepinski, Silvio Micali, Abhi Shelat:
Collusion-free protocols. STOC 2005: 543-552 - [c6]Matt Lepinski, Silvio Micali, Abhi Shelat:
Fair-Zero Knowledge. TCC 2005: 245-263 - 2004
- [c5]Andrew J. Blumberg, Abhi Shelat:
Searching for Stable Mechanisms: Automated Design for Imperfect Players. AAAI 2004: 8-13 - [c4]Matt Lepinski, Silvio Micali, Chris Peikert, Abhi Shelat:
Completely fair SFE and coalition-safe cheap talk. PODC 2004: 1-10 - 2003
- [j2]Simson L. Garfinkel, Abhi Shelat:
IEEE Security & Privacy: Data Forensics - Rememberance of Data Passed: A Study of Disk Sanitization Practices. IEEE Distributed Syst. Online 4(2) (2003) - [j1]Simson L. Garfinkel, Abhi Shelat:
Remembrance of Data Passed: A Study of Disk Sanitization Practices. IEEE Secur. Priv. 1(1): 17-27 (2003) - [c3]Chris Peikert, Abhi Shelat, Adam D. Smith:
Lower bounds for collusion-secure fingerprinting. SODA 2003: 472-479 - 2002
- [c2]Eric Lehman, Abhi Shelat:
Approximation algorithms for grammar-based compression. SODA 2002: 205-212 - [c1]Moses Charikar, Eric Lehman, Ding Liu, Rina Panigrahy, Manoj Prabhakaran, April Rasala, Amit Sahai, Abhi Shelat:
Approximating the smallest grammar: Kolmogorov complexity in natural models. STOC 2002: 792-801