Codebases
- Quadsquad codebase: https://github.com/cris-iisc/quadsquad
- Asterisk codebase: https://github.com/cris-coders-iisc/Asterisk
Publications and Preprints
search
2024
Privadome: A Framework for Citizen Privacy in the Delivery Drone Era
Gokulnath Pillai , Eikansh Gupta , Ajith Suresh , Vinod Ganapathy and Arpita Patra
picture_as_pdf
Gokulnath Pillai , Eikansh Gupta , Ajith Suresh , Vinod Ganapathy and Arpita Patra
picture_as_pdf
Perfect Asynchronous MPC with Linear Communication Overhead
Ittai Abraham , Gilad Asharov , Shravani Patil and Arpita Patra
picture_as_pdf
Ittai Abraham , Gilad Asharov , Shravani Patil and Arpita Patra
picture_as_pdf
Asterisk: Super-fast MPC with a Friend
Banashri Karmakar , Nishat Koti , Arpita Patra , Sikhar Patranabis , Protik Paul and Divya Ravi
picture_as_pdf
Banashri Karmakar , Nishat Koti , Arpita Patra , Sikhar Patranabis , Protik Paul and Divya Ravi
picture_as_pdf
Succinct Verification of Compressed Sigma Protocols in the Updatable SRS setting
Moumita Dutta , Chaya Ganesh and Neha Jawalkar
picture_as_pdf
Moumita Dutta , Chaya Ganesh and Neha Jawalkar
picture_as_pdf
2023
MPClan: Protocol Suite for Privacy-Conscious Computations
Nishat Koti , Shravani Patil , Arpita Patra and Ajith Suresh
picture_as_pdf
Nishat Koti , Shravani Patil , Arpita Patra and Ajith Suresh
picture_as_pdf
Ruffle: Rapid 3-Party Shuffle Protocols
Pranav Shriram A , Nishat Koti , Varsha Bhat Kukkala , Arpita Patra , Bhavish Raj Gopal and Somya Sangal
picture_as_pdf
Pranav Shriram A , Nishat Koti , Varsha Bhat Kukkala , Arpita Patra , Bhavish Raj Gopal and Somya Sangal
picture_as_pdf
The Round Complexity of Statistical MPC with Optimal Resiliency
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time
Ittai Abraham , Gilad Asharov , Shravani Patil and Arpita Patra
picture_as_pdf
Ittai Abraham , Gilad Asharov , Shravani Patil and Arpita Patra
picture_as_pdf
Shield: Secure Allegation Escrow System with Stronger Guarantees
Nishat Koti , Varsha Bhat Kukkala , Arpita Patra and Bhavish Raj Gopal
picture_as_pdf
Nishat Koti , Varsha Bhat Kukkala , Arpita Patra and Bhavish Raj Gopal
picture_as_pdf
On the Communication Efficiency of Statistically-Secure Asynchronous MPC
Ashish Choudhury and Arpita Patra
picture_as_pdf
Ashish Choudhury and Arpita Patra
picture_as_pdf
Find Thy Neighbourhood: Privacy-Preserving Local Clustering
Pranav Shriram A , Nishat Koti , Varsha Bhat Kukkala , Arpita Patra and Bhavish Raj Gopal
picture_as_pdf
Pranav Shriram A , Nishat Koti , Varsha Bhat Kukkala , Arpita Patra and Bhavish Raj Gopal
picture_as_pdf
Vogue: Faster Computation of Private Heavy Hitters
Pranav Jangir , Nishat Koti , Varsha Bhat Kukkala , Arpita Patra , Bhavish Raj Gopal and Somya Sangal
picture_as_pdf
Pranav Jangir , Nishat Koti , Varsha Bhat Kukkala , Arpita Patra , Bhavish Raj Gopal and Somya Sangal
picture_as_pdf
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation
Arpita Patra and Divya Ravi
picture_as_pdf
Arpita Patra and Divya Ravi
picture_as_pdf
2022
Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Asymptotically Free Broadcast in Constant Expected Time via Packed VSS
Ittai Abraham , Gilad Asharov , Shravani Patil and Arpita Patra
picture_as_pdf
Ittai Abraham , Gilad Asharov , Shravani Patil and Arpita Patra
picture_as_pdf
Fully-Secure MPC with Minimal Trust
Yuval Ishai , Arpita Patra , Sikhar Patranabis , Divya Ravi and Akshayaram Srinivasan
picture_as_pdf
Yuval Ishai , Arpita Patra , Sikhar Patranabis , Divya Ravi and Akshayaram Srinivasan
picture_as_pdf
Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness
Bar Alon , Olga Nissenbaum , Eran Omri , Anat Paskin-Cherniavsky and Arpita Patra
picture_as_pdf
Bar Alon , Olga Nissenbaum , Eran Omri , Anat Paskin-Cherniavsky and Arpita Patra
picture_as_pdf
Attaining GOD Beyond Honest Majority with Friends and Foes
Aditya Hedge , Nishat Koti , Varsha Bhat Kukkala , Shravani Patil , Arpita Patra and Protik Paul
picture_as_pdf
Aditya Hedge , Nishat Koti , Varsha Bhat Kukkala , Shravani Patil , Arpita Patra and Protik Paul
picture_as_pdf
Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications
Benny Applebaum , Yuval Ishai , Orr Karni and Arpita Patra
picture_as_pdf
Benny Applebaum , Yuval Ishai , Orr Karni and Arpita Patra
picture_as_pdf
PentaGOD: Stepping beyond traditional GOD with five parties
Nishat Koti , Varsha Bhat Kukkala , Bhavish Raj Gopal and Arpita Patra
picture_as_pdf
Nishat Koti , Varsha Bhat Kukkala , Bhavish Raj Gopal and Arpita Patra
picture_as_pdf
A survey on Perfectly-Secure Verifiable Secret-Sharing
Anirudh C , Ashish Choudhury and Arpita Patra
picture_as_pdf
Anirudh C , Ashish Choudhury and Arpita Patra
picture_as_pdf
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols
Pankaj Dayama , Arpita Patra , Protik Paul , Nitin Singh and Dhinakaran Vinayagamurthy
picture_as_pdf
Pankaj Dayama , Arpita Patra , Protik Paul , Nitin Singh and Dhinakaran Vinayagamurthy
picture_as_pdf
Tetrad: Actively Secure 4PC for Secure Training and Inference
Nishat Koti , Arpita Patra , Rahul Rachuri and Ajith Suresh
picture_as_pdf
Nishat Koti , Arpita Patra , Rahul Rachuri and Ajith Suresh
picture_as_pdf
2021
SynCirc: Efficient Synthesis of Depth‐Optimized Circuits for Secure Computation
Arpita Patra , Thomas Schneider , Ajith Suresh and Hossein Yalame
picture_as_pdf
Arpita Patra , Thomas Schneider , Ajith Suresh and Hossein Yalame
picture_as_pdf
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
Arpita Patra and Akshayaram Srinivasan (TIFR)
picture_as_pdf
Arpita Patra and Akshayaram Srinivasan (TIFR)
picture_as_pdf
MPCLeague: Robust and Efficient Mixed-protocol Framework for 4-party Computation
Nishat Koti , Arpita Patra and Ajith Suresh
picture_as_pdf
Nishat Koti , Arpita Patra and Ajith Suresh
picture_as_pdf
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning
Nishat Koti , Mahak Pancholi , Arpita Patra and Ajith Suresh
picture_as_pdf
Nishat Koti , Mahak Pancholi , Arpita Patra and Ajith Suresh
picture_as_pdf
Optimal Extension Protocols for Byzantine Broadcast and Agreement
Chaya Ganesh and Arpita Patra
picture_as_pdf
Chaya Ganesh and Arpita Patra
picture_as_pdf
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation
Arpita Patra , Thomas Schneider , Ajith Suresh and Hossein Yalame
picture_as_pdf
Arpita Patra , Thomas Schneider , Ajith Suresh and Hossein Yalame
picture_as_pdf
2020
The Resiliency of MPC with Low Interaction: The Benefit of Making Errors
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation
Arpita Patra , Divya Ravi and Swati Singla
picture_as_pdf
Arpita Patra , Divya Ravi and Swati Singla
picture_as_pdf
The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
Benny Applebaum , Eliran Kachlon and Arpita Patra
picture_as_pdf
The Power of Shunning: Efficient Asynchronous Byzantine Agreement Revisited
Laasya Bangalore , Ashish Choudhury and Arpita Patra
picture_as_pdf
Laasya Bangalore , Ashish Choudhury and Arpita Patra
picture_as_pdf
BLAZE: Blazing Fast Privacy-Preserving Machine Learning
Arpita Patra and Ajith Suresh
picture_as_pdf
Arpita Patra and Ajith Suresh
picture_as_pdf
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning
Megha Byali , Harsh Chaudhari , Arpita Patra and Ajith Suresh
picture_as_pdf
Megha Byali , Harsh Chaudhari , Arpita Patra and Ajith Suresh
picture_as_pdf
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning
Harsh Chaudhari , Rahul Rachuri and Ajith Suresh
picture_as_pdf
Harsh Chaudhari , Rahul Rachuri and Ajith Suresh
picture_as_pdf
2019
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction
Harsh Chaudhari , Ashish Choudhury , Arpita Patra and Ajith Suresh
picture_as_pdf
Harsh Chaudhari , Ashish Choudhury , Arpita Patra and Ajith Suresh
picture_as_pdf
Fast Actively-Secure 5-Party Computation with Security Beyond Abort
Megha Byali , Carmit Hazay , Arpita Patra and Swati Singla
picture_as_pdf
Megha Byali , Carmit Hazay , Arpita Patra and Swati Singla
picture_as_pdf
2018
Fast Secure Computation for Small Population over the Internet
Megha Byali , Arun Joseph , Arpita Patra and Divya Ravi
picture_as_pdf
Megha Byali , Arun Joseph , Arpita Patra and Divya Ravi
picture_as_pdf
On the Exact Round complexity of Secure Three-party Computation
Arpita Patra and Divya Ravi
picture_as_pdf
Arpita Patra and Divya Ravi
picture_as_pdf
Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited
Laasya Bangalore , Ashish Choudhury and Arpita Patra
picture_as_pdf
Laasya Bangalore , Ashish Choudhury and Arpita Patra
picture_as_pdf
On the power of Hybrid Networks in Multi-party Computation
Arpita Patra and Divya Ravi
picture_as_pdf
Arpita Patra and Divya Ravi
picture_as_pdf
Crash-Tolerant Consensus in Directed Graph Revisited
Ashish Choudhury , Gayathri Garimella , Arpita Patra , Divya Ravi and Pratik Sarkar
picture_as_pdf
Ashish Choudhury , Gayathri Garimella , Arpita Patra , Divya Ravi and Pratik Sarkar
picture_as_pdf
Efficient Adaptively Secure Zero-knowledge from Garbled Circuits
Chaya Ganesh , Yashvanth Kondi , Arpita Patra and Pratik Sarkar
picture_as_pdf
Chaya Ganesh , Yashvanth Kondi , Arpita Patra and Pratik Sarkar
picture_as_pdf
2017
An Efficient Framework for Unconditionally-secure Multiparty Computation
Ashish Choudhary and Arpita Patra
picture_as_pdf
Ashish Choudhary and Arpita Patra
picture_as_pdf
Round and Communication Efficient Unconditionally-secure MPC with t < n/3 in Partially Synchronous Network.
Ashish Choudhury , Arpita Patra and Divya Ravi
picture_as_pdf
Ashish Choudhury , Arpita Patra and Divya Ravi
picture_as_pdf
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic
Yashvanth Kondi and Arpita Patra
picture_as_pdf
Yashvanth Kondi and Arpita Patra
picture_as_pdf
Fast Actively Secure OT Extension for Short Secrets
Arpita Patra , Pratik Sarkar and Ajith Suresh
picture_as_pdf
Arpita Patra , Pratik Sarkar and Ajith Suresh
picture_as_pdf
2016
Broadcast Extensions with Optimal Communication and Round Complexity
Chaya Ganesh and Arpita Patra
picture_as_pdf
Chaya Ganesh and Arpita Patra
picture_as_pdf
Linear Overhead Robust MPC with Honest Majority Using Preprocessing
Ashish Choudhury , Emmanuela Orsini , Arpita Patra and Nigel Smart
picture_as_pdf
Ashish Choudhury , Emmanuela Orsini , Arpita Patra and Nigel Smart
picture_as_pdf
2015
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
Ashish Choudhary , Arpita Patra and C. Pandu Rangan
picture_as_pdf
Ashish Choudhary , Arpita Patra and C. Pandu Rangan
picture_as_pdf
Selective Opening Security for Receivers
Carmit Hazay , Arpita Patra and Bogdan Warinschi
picture_as_pdf
Carmit Hazay , Arpita Patra and Bogdan Warinschi
picture_as_pdf
Adaptively Secure Computation with Partial Erasures
Carmit Hazay , Yehuda Lindell and Arpita Patra
picture_as_pdf
Carmit Hazay , Yehuda Lindell and Arpita Patra
picture_as_pdf
Optimally Resilient Asynchronous MPC with Linear Communication Complexity
Ashish Choudhury and Arpita Patra
picture_as_pdf
Ashish Choudhury and Arpita Patra
picture_as_pdf
2014
Efficient Asynchronous Byzantine Agreement with Optimal Resilience
Ashish Choudhary , Arpita Patra and C. Pandu Rangan
picture_as_pdf
Ashish Choudhary , Arpita Patra and C. Pandu Rangan
picture_as_pdf
Anonymous Authentication with Shared Secrets
Joel Alwen , Martin Hirt , Ueli Maurer , Arpita Patra and Pavel Raykov
picture_as_pdf
Joel Alwen , Martin Hirt , Ueli Maurer , Arpita Patra and Pavel Raykov
picture_as_pdf
Key-Indistinguishable Message Authentication Codes
Joel Alwen , Martin Hirt , Ueli Maurer , Arpita Patra and Pavel Raykov
picture_as_pdf
Joel Alwen , Martin Hirt , Ueli Maurer , Arpita Patra and Pavel Raykov
picture_as_pdf
Reducing the Overhead of MPC over a Large Population
Ashish Choudhury , Arpita Patra and Nigel P. Smart
picture_as_pdf
Ashish Choudhury , Arpita Patra and Nigel P. Smart
picture_as_pdf
Theses
2023 keyboard_arrow_right
Secure Computation Protocol Suite for Privacy-Conscious Applications
Doctoral
2021 keyboard_arrow_right
MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning
Doctoral
2020 keyboard_arrow_right
A Robust PPML Framework for Three Servers
Masters
On the Round Complexity Landscape of Secure Multi-party Computation
Doctoral
Privacy Preserving Machine Learning via Multi-party Computation
Masters
2019 keyboard_arrow_right
Practically Efficient Secure Small Party Computation over the Internet
Masters
Honest Majority and Beyond: Efficient Secure Computation over Small Population
Masters
2018 keyboard_arrow_right
Adaptively Secure Primitives in the Random Oracle Model
Masters
A Framework for Efficient Secure Three-Party Computation
Masters
2017 keyboard_arrow_right
On Secure Computation in Hybrid Network
Masters
Fast Actively Secure OT Extension for Short Secrets
Masters
On the Authenticity of Garbling Schemes
Masters
2016 keyboard_arrow_right
On Scalable Secure Computation
Masters
2015 keyboard_arrow_right
On Verifiable Secret Sharing With Honest Majority
Masters
Posters
Computing on Private Data in High Latency Networks
Blazing Fast Actively Secure OT Extension Protocol
On the Exact Round Complexity of Best-of-both-Worlds MPC
High Throughput Asymmetric 3PC: A Secure Prediction Framework
Fast Actively Secure Five Party Computation with Security Beyond Abort
Turing Award Winners in Cryptography
Distributed Consensus in Byzantine Failure Model
Secure MPC, Arpita Patra
Δ-EIG Protocol for Byzantine Agreement