Codebases
- Quadsquad codebase: https://github.com/cris-iisc/quadsquad
- Asterisk codebase: https://github.com/cris-coders-iisc/Asterisk
- QuickPool codebase: https://github.com/cris-coders-iisc/QuickPool
Videos
Publications and Preprints
search
2024
Compute, but Verify: Efficient Multiparty Computation over Authenticated Inputs
Moumita Dutta , Chaya Ganesh , Sikhar Patranabis and Nitin Singh
picture_as_pdf
Moumita Dutta , Chaya Ganesh , Sikhar Patranabis and Nitin Singh
picture_as_pdf
Perfect Asynchronous Agreement on a Core Set in Constant Expected Time
Ittai Abraham , Gilad Asharov , Arpita Patra and Gilad Stern
picture_as_pdf
Ittai Abraham , Gilad Asharov , Arpita Patra and Gilad Stern
picture_as_pdf
Batching-Efficient RAM using Updatable Lookup Arguments
Moumita Dutta , Chaya Ganesh , Sikhar Patranabis , Shubh Prakash and Nitin Singh
picture_as_pdf
Moumita Dutta , Chaya Ganesh , Sikhar Patranabis , Shubh Prakash and Nitin Singh
picture_as_pdf
Graphiti: Secure Graph Analysis Made More Scalable
Nishat Koti , Varsha Bhat Kukkala , Bhavish Raj Gopal and Arpita Patra
picture_as_pdf
Nishat Koti , Varsha Bhat Kukkala , Bhavish Raj Gopal and Arpita Patra
picture_as_pdf
Privadome: A Framework for Citizen Privacy in the Delivery Drone Era
Gokulnath Pillai , Eikansh Gupta , Ajith Suresh , Vinod Ganapathy and Arpita Patra
picture_as_pdf
Gokulnath Pillai , Eikansh Gupta , Ajith Suresh , Vinod Ganapathy and Arpita Patra
picture_as_pdf
Perfect Asynchronous MPC with Linear Communication Overhead
Ittai Abraham , Gilad Asharov , Shravani Patil and Arpita Patra
picture_as_pdf
Ittai Abraham , Gilad Asharov , Shravani Patil and Arpita Patra
picture_as_pdf
Asterisk: Super-fast MPC with a Friend
Banashri Karmakar , Nishat Koti , Arpita Patra , Sikhar Patranabis , Protik Paul and Divya Ravi
picture_as_pdf
Banashri Karmakar , Nishat Koti , Arpita Patra , Sikhar Patranabis , Protik Paul and Divya Ravi
picture_as_pdf
Succinct Verification of Compressed Sigma Protocols in the Updatable SRS setting
Moumita Dutta , Chaya Ganesh and Neha Jawalkar
picture_as_pdf
Moumita Dutta , Chaya Ganesh and Neha Jawalkar
picture_as_pdf
2023
MPClan: Protocol Suite for Privacy-Conscious Computations
Nishat Koti , Shravani Patil , Arpita Patra and Ajith Suresh
picture_as_pdf
Nishat Koti , Shravani Patil , Arpita Patra and Ajith Suresh
picture_as_pdf
Ruffle: Rapid 3-Party Shuffle Protocols
Pranav Shriram A , Nishat Koti , Varsha Bhat Kukkala , Arpita Patra , Bhavish Raj Gopal and Somya Sangal
picture_as_pdf
Pranav Shriram A , Nishat Koti , Varsha Bhat Kukkala , Arpita Patra , Bhavish Raj Gopal and Somya Sangal
picture_as_pdf
The Round Complexity of Statistical MPC with Optimal Resiliency
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time
Ittai Abraham , Gilad Asharov , Shravani Patil and Arpita Patra
picture_as_pdf
Ittai Abraham , Gilad Asharov , Shravani Patil and Arpita Patra
picture_as_pdf
Shield: Secure Allegation Escrow System with Stronger Guarantees
Nishat Koti , Varsha Bhat Kukkala , Arpita Patra and Bhavish Raj Gopal
picture_as_pdf
Nishat Koti , Varsha Bhat Kukkala , Arpita Patra and Bhavish Raj Gopal
picture_as_pdf
On the Communication Efficiency of Statistically-Secure Asynchronous MPC
Ashish Choudhury and Arpita Patra
picture_as_pdf
Ashish Choudhury and Arpita Patra
picture_as_pdf
Find Thy Neighbourhood: Privacy-Preserving Local Clustering
Pranav Shriram A , Nishat Koti , Varsha Bhat Kukkala , Arpita Patra and Bhavish Raj Gopal
picture_as_pdf
Pranav Shriram A , Nishat Koti , Varsha Bhat Kukkala , Arpita Patra and Bhavish Raj Gopal
picture_as_pdf
Vogue: Faster Computation of Private Heavy Hitters
Pranav Jangir , Nishat Koti , Varsha Bhat Kukkala , Arpita Patra , Bhavish Raj Gopal and Somya Sangal
picture_as_pdf
Pranav Jangir , Nishat Koti , Varsha Bhat Kukkala , Arpita Patra , Bhavish Raj Gopal and Somya Sangal
picture_as_pdf
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation
Arpita Patra and Divya Ravi
picture_as_pdf
Arpita Patra and Divya Ravi
picture_as_pdf
2022
Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Asymptotically Free Broadcast in Constant Expected Time via Packed VSS
Ittai Abraham , Gilad Asharov , Shravani Patil and Arpita Patra
picture_as_pdf
Ittai Abraham , Gilad Asharov , Shravani Patil and Arpita Patra
picture_as_pdf
Fully-Secure MPC with Minimal Trust
Yuval Ishai , Arpita Patra , Sikhar Patranabis , Divya Ravi and Akshayaram Srinivasan
picture_as_pdf
Yuval Ishai , Arpita Patra , Sikhar Patranabis , Divya Ravi and Akshayaram Srinivasan
picture_as_pdf
Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness
Bar Alon , Olga Nissenbaum , Eran Omri , Anat Paskin-Cherniavsky and Arpita Patra
picture_as_pdf
Bar Alon , Olga Nissenbaum , Eran Omri , Anat Paskin-Cherniavsky and Arpita Patra
picture_as_pdf
Attaining GOD Beyond Honest Majority with Friends and Foes
Aditya Hedge , Nishat Koti , Varsha Bhat Kukkala , Shravani Patil , Arpita Patra and Protik Paul
picture_as_pdf
Aditya Hedge , Nishat Koti , Varsha Bhat Kukkala , Shravani Patil , Arpita Patra and Protik Paul
picture_as_pdf
Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications
Benny Applebaum , Yuval Ishai , Orr Karni and Arpita Patra
picture_as_pdf
Benny Applebaum , Yuval Ishai , Orr Karni and Arpita Patra
picture_as_pdf
PentaGOD: Stepping beyond traditional GOD with five parties
Nishat Koti , Varsha Bhat Kukkala , Bhavish Raj Gopal and Arpita Patra
picture_as_pdf
Nishat Koti , Varsha Bhat Kukkala , Bhavish Raj Gopal and Arpita Patra
picture_as_pdf
A survey on Perfectly-Secure Verifiable Secret-Sharing
Anirudh C , Ashish Choudhury and Arpita Patra
picture_as_pdf
Anirudh C , Ashish Choudhury and Arpita Patra
picture_as_pdf
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols
Pankaj Dayama , Arpita Patra , Protik Paul , Nitin Singh and Dhinakaran Vinayagamurthy
picture_as_pdf
Pankaj Dayama , Arpita Patra , Protik Paul , Nitin Singh and Dhinakaran Vinayagamurthy
picture_as_pdf
Tetrad: Actively Secure 4PC for Secure Training and Inference
Nishat Koti , Arpita Patra , Rahul Rachuri and Ajith Suresh
picture_as_pdf
Nishat Koti , Arpita Patra , Rahul Rachuri and Ajith Suresh
picture_as_pdf
2021
SynCirc: Efficient Synthesis of Depth‐Optimized Circuits for Secure Computation
Arpita Patra , Thomas Schneider , Ajith Suresh and Hossein Yalame
picture_as_pdf
Arpita Patra , Thomas Schneider , Ajith Suresh and Hossein Yalame
picture_as_pdf
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
Arpita Patra and Akshayaram Srinivasan (TIFR)
picture_as_pdf
Arpita Patra and Akshayaram Srinivasan (TIFR)
picture_as_pdf
MPCLeague: Robust and Efficient Mixed-protocol Framework for 4-party Computation
Nishat Koti , Arpita Patra and Ajith Suresh
picture_as_pdf
Nishat Koti , Arpita Patra and Ajith Suresh
picture_as_pdf
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning
Nishat Koti , Mahak Pancholi , Arpita Patra and Ajith Suresh
picture_as_pdf
Nishat Koti , Mahak Pancholi , Arpita Patra and Ajith Suresh
picture_as_pdf
Optimal Extension Protocols for Byzantine Broadcast and Agreement
Chaya Ganesh and Arpita Patra
picture_as_pdf
Chaya Ganesh and Arpita Patra
picture_as_pdf
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Arpita Patra , Thomas Schneider , Ajith Suresh and Hossein Yalame
picture_as_pdf
Arpita Patra , Thomas Schneider , Ajith Suresh and Hossein Yalame
picture_as_pdf
2020
The Resiliency of MPC with Low Interaction: The Benefit of Making Errors
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation
Arpita Patra , Divya Ravi and Swati Singla
picture_as_pdf
Arpita Patra , Divya Ravi and Swati Singla
picture_as_pdf
The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
The Power of Shunning: Efficient Asynchronous Byzantine Agreement Revisited
Laasya Bangalore , Ashish Choudhury and Arpita Patra
picture_as_pdf
Laasya Bangalore , Ashish Choudhury and Arpita Patra
picture_as_pdf
BLAZE: Blazing Fast Privacy-Preserving Machine Learning
Arpita Patra and Ajith Suresh
picture_as_pdf
Arpita Patra and Ajith Suresh
picture_as_pdf
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning
Megha Byali , Harsh Chaudhari , Arpita Patra and Ajith Suresh
picture_as_pdf
Megha Byali , Harsh Chaudhari , Arpita Patra and Ajith Suresh
picture_as_pdf
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning
Harsh Chaudhari , Rahul Rachuri and Ajith Suresh
picture_as_pdf
Harsh Chaudhari , Rahul Rachuri and Ajith Suresh
picture_as_pdf
2019
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Harsh Chaudhari , Ashish Choudhury , Arpita Patra and Ajith Suresh
picture_as_pdf
Harsh Chaudhari , Ashish Choudhury , Arpita Patra and Ajith Suresh
picture_as_pdf
Fast Actively-Secure 5-Party Computation with Security Beyond Abort
Megha Byali , Carmit Hazay , Arpita Patra and Swati Singla
picture_as_pdf
Megha Byali , Carmit Hazay , Arpita Patra and Swati Singla
picture_as_pdf
2018
Fast Secure Computation for Small Population over the Internet
Megha Byali , Arun Joseph , Arpita Patra and Divya Ravi
picture_as_pdf
Megha Byali , Arun Joseph , Arpita Patra and Divya Ravi
picture_as_pdf
On the Exact Round complexity of Secure Three-party Computation
Arpita Patra and Divya Ravi
picture_as_pdf
Arpita Patra and Divya Ravi
picture_as_pdf
Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited
Laasya Bangalore , Ashish Choudhury and Arpita Patra
picture_as_pdf
Laasya Bangalore , Ashish Choudhury and Arpita Patra
picture_as_pdf
On the power of Hybrid Networks in Multi-party Computation
Arpita Patra and Divya Ravi
picture_as_pdf
Arpita Patra and Divya Ravi
picture_as_pdf
Crash-Tolerant Consensus in Directed Graph Revisited
Ashish Choudhury , Gayathri Garimella , Arpita Patra , Divya Ravi and Pratik Sarkar
picture_as_pdf
Ashish Choudhury , Gayathri Garimella , Arpita Patra , Divya Ravi and Pratik Sarkar
picture_as_pdf
Efficient Adaptively Secure Zero-knowledge from Garbled Circuits
Chaya Ganesh , Yashvanth Kondi , Arpita Patra and Pratik Sarkar
picture_as_pdf
Chaya Ganesh , Yashvanth Kondi , Arpita Patra and Pratik Sarkar
picture_as_pdf
2017
An Efficient Framework for Unconditionally-secure Multiparty Computation
Ashish Choudhary and Arpita Patra
picture_as_pdf
Ashish Choudhary and Arpita Patra
picture_as_pdf
Round and Communication Efficient Unconditionally-secure MPC with t < n/3 in Partially Synchronous Network.
Ashish Choudhury , Arpita Patra and Divya Ravi
picture_as_pdf
Ashish Choudhury , Arpita Patra and Divya Ravi
picture_as_pdf
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic
Yashvanth Kondi and Arpita Patra
picture_as_pdf
Yashvanth Kondi and Arpita Patra
picture_as_pdf
Fast Actively Secure OT Extension for Short Secrets
Arpita Patra , Pratik Sarkar and Ajith Suresh
picture_as_pdf
Arpita Patra , Pratik Sarkar and Ajith Suresh
picture_as_pdf
2016
Broadcast Extensions with Optimal Communication and Round Complexity
Chaya Ganesh and Arpita Patra
picture_as_pdf
Chaya Ganesh and Arpita Patra
picture_as_pdf
Linear Overhead Robust MPC with Honest Majority Using Preprocessing
Ashish Choudhury , Emmanuela Orsini , Arpita Patra and Nigel Smart
picture_as_pdf
Ashish Choudhury , Emmanuela Orsini , Arpita Patra and Nigel Smart
picture_as_pdf
2015
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
Ashish Choudhary , Arpita Patra and C. Pandu Rangan
picture_as_pdf
Ashish Choudhary , Arpita Patra and C. Pandu Rangan
picture_as_pdf
Selective Opening Security for Receivers
Carmit Hazay , Arpita Patra and Bogdan Warinschi
picture_as_pdf
Carmit Hazay , Arpita Patra and Bogdan Warinschi
picture_as_pdf
Adaptively Secure Computation with Partial Erasures
Carmit Hazay , Yehuda Lindell and Arpita Patra
picture_as_pdf
Carmit Hazay , Yehuda Lindell and Arpita Patra
picture_as_pdf
Optimally Resilient Asynchronous MPC with Linear Communication Complexity
Ashish Choudhury and Arpita Patra
picture_as_pdf
Ashish Choudhury and Arpita Patra
picture_as_pdf
2014
Efficient Asynchronous Byzantine Agreement with Optimal Resilience
Ashish Choudhary , Arpita Patra and C. Pandu Rangan
picture_as_pdf
Ashish Choudhary , Arpita Patra and C. Pandu Rangan
picture_as_pdf
Anonymous Authentication with Shared Secrets
Joel Alwen , Martin Hirt , Ueli Maurer , Arpita Patra and Pavel Raykov
picture_as_pdf
Joel Alwen , Martin Hirt , Ueli Maurer , Arpita Patra and Pavel Raykov
picture_as_pdf
Key-Indistinguishable Message Authentication Codes
Joel Alwen , Martin Hirt , Ueli Maurer , Arpita Patra and Pavel Raykov
picture_as_pdf
Joel Alwen , Martin Hirt , Ueli Maurer , Arpita Patra and Pavel Raykov
picture_as_pdf
Reducing the Overhead of MPC over a Large Population
Ashish Choudhury , Arpita Patra and Nigel P. Smart
picture_as_pdf
Ashish Choudhury , Arpita Patra and Nigel P. Smart
picture_as_pdf
Theses
2024 keyboard_arrow_right
Ankora: Notions of Multi-party Computation and Zero-knowledge Beyond Conventional Models
Doctoral
2023 keyboard_arrow_right
Secure Computation Protocol Suite for Privacy-Conscious Applications
Doctoral
2021 keyboard_arrow_right
MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning
Doctoral
2020 keyboard_arrow_right
A Robust PPML Framework for Three Servers
Masters
On the Round Complexity Landscape of Secure Multi-party Computation
Doctoral
Privacy Preserving Machine Learning via Multi-party Computation
Masters
2019 keyboard_arrow_right
Practically Efficient Secure Small Party Computation over the Internet
Masters
Honest Majority and Beyond: Efficient Secure Computation over Small Population
Masters
2018 keyboard_arrow_right
Adaptively Secure Primitives in the Random Oracle Model
Masters
A Framework for Efficient Secure Three-Party Computation
Masters
2017 keyboard_arrow_right
On Secure Computation in Hybrid Network
Masters
Fast Actively Secure OT Extension for Short Secrets
Masters
On the Authenticity of Garbling Schemes
Masters
2016 keyboard_arrow_right
On Scalable Secure Computation
Masters
2015 keyboard_arrow_right
On Verifiable Secret Sharing With Honest Majority
Masters
Posters
Computing on Private Data in High Latency Networks
Blazing Fast Actively Secure OT Extension Protocol
Graphiti: Secure Graph Computation Made More Scalable
On the Exact Round Complexity of Best-of-both-Worlds MPC
High Throughput Asymmetric 3PC: A Secure Prediction Framework
Fast Actively Secure Five Party Computation with Security Beyond Abort
Turing Award Winners in Cryptography
Distributed Consensus in Byzantine Failure Model
Secure MPC, Arpita Patra
Δ-EIG Protocol for Byzantine Agreement