Aniket Kate

Orcid: 0000-0003-2246-8416

Affiliations:
  • Purdue University, West Lafayette, USA


According to our database1, Aniket Kate authored at least 147 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography.
Dataset, May, 2024

Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography.
Dataset, April, 2024

Pepal: Penalizing multimedia breaches and partial leakages.
Int. J. Inf. Sec., February, 2024

No Fish Is Too Big for Flash Boys! Frontrunning on DAG-based Blockchains.
IACR Cryptol. ePrint Arch., 2024

Unconditional Security using (Random) Anonymous Bulletin Board.
IACR Cryptol. ePrint Arch., 2024

Sailfish: Towards Improving Latency of DAG-based BFT.
IACR Cryptol. ePrint Arch., 2024

Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability.
IACR Cryptol. ePrint Arch., 2024

HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted.
IACR Cryptol. ePrint Arch., 2024

VRaaS: Verifiable Randomness as a Service on Blockchains.
IACR Cryptol. ePrint Arch., 2024

Insta-Pok3r: Real-time Poker on Blockchain.
IACR Cryptol. ePrint Arch., 2024

Concretely Efficient Asynchronous MPC from Lightweight Cryptography.
IACR Cryptol. ePrint Arch., 2024

V3rified: Revelation vs Non-Revelation Mechanisms for Decentralized Verifiable Computation.
CoRR, 2024

Sharding SMR with Optimal-size Shards for Highly Scalable Blockchains.
CoRR, 2024

Synchronous Distributed Key Generation without Broadcasts.
IACR Commun. Cryptol., 2024

Attacking and Improving the Tor Directory Protocol.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

SensorBFT: Fault-Tolerant Target Localization Using Voronoi Diagrams and Approximate Agreement.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

(Re)-envisioning Approximate Agreement for Distributed Cryptography and Oracles.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
RPM: Robust Anonymity at Scale.
Proc. Priv. Enhancing Technol., April, 2023

Non-interactive VSS using Class Groups and Application to DKG.
IACR Cryptol. ePrint Arch., 2023

FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains.
IACR Cryptol. ePrint Arch., 2023

SoK: Web3 Recovery Mechanisms.
IACR Cryptol. ePrint Arch., 2023

HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup.
IACR Cryptol. ePrint Arch., 2023

Front-running Attack in Distributed Sharded Ledgers and Fair Cross-shard Consensus.
CoRR, 2023

DORA: Distributed Oracle Agreement with Simple Majority.
CoRR, 2023

Order but Not Execute in Order.
CoRR, 2023

OptRand: Optimistically Responsive Reconfigurable Distributed Randomness.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Breaking and Fixing Virtual Channels: Domino Attack and Donner.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

EESMR: Energy Efficient BFT - SMR for the masses.
Proceedings of the 24th International Middleware Conference, 2023

Oracle Agreement: From an Honest Super Majority to Simple Majority.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

The Unique Chain Rule and Its Applications.
Proceedings of the Financial Cryptography and Data Security, 2023

Collusion-Deterrent Threshold Information Escrow.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023

2022
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications.
Proc. Priv. Enhancing Technol., 2022

OrgAn: Organizational Anonymity with Low Latency.
Proc. Priv. Enhancing Technol., 2022

SIM: Secure Interval Membership Testing and Applications to Secure Comparison.
IACR Cryptol. ePrint Arch., 2022

D-KODE: Mechanism to Generate and Maintain a Billion Keys.
IACR Cryptol. ePrint Arch., 2022

Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets.
IACR Cryptol. ePrint Arch., 2022

OptRand: Optimistically responsive distributed random beacons.
IACR Cryptol. ePrint Arch., 2022

The Danger of Small Anonymity Sets in Privacy-Preserving Payment Systems.
CoRR, 2022

Relax the Non-Collusion Assumption for Multi-Server PIR.
CoRR, 2022

Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures.
Proceedings of the 31st USENIX Security Symposium, 2022

Last Mile of Blockchains: RPC and Node-as-a-service.
Proceedings of the 4th IEEE International Conference on Trust, 2022

Towards Overcoming the Undercutting Problem.
Proceedings of the Financial Cryptography and Data Security, 2022

D-KODE: Distributed Mechanism to Manage a Billion Discrete-log Keys.
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022

2021
hbACSS: How to Robustly Share Many Secrets.
IACR Cryptol. ePrint Arch., 2021

OpenSquare: Decentralized Repeated Modular Squaring Service.
IACR Cryptol. ePrint Arch., 2021

Collusion-Deterrent Threshold Information Escrow.
IACR Cryptol. ePrint Arch., 2021

Divide and Funnel: a Scaling Technique for Mix-Networks.
IACR Cryptol. ePrint Arch., 2021

Apollo - Optimistically Linear and Responsive SMR.
IACR Cryptol. ePrint Arch., 2021

Donner: UTXO-Based Virtual Channels Across Multiple Hops.
IACR Cryptol. ePrint Arch., 2021

Blitz: Secure Multi-Hop Payments Without Two-Phase Commits.
IACR Cryptol. ePrint Arch., 2021

Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021


Reparo: Publicly Verifiable Layer to Repair Blockchains.
Proceedings of the Financial Cryptography and Data Security, 2021

RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Blockchains + Network Privacy = A Nightmare.
Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021

2020
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies.
Proc. Priv. Enhancing Technol., 2020

A Tale of Two Trees: One Writes, and Other Reads.
Proc. Priv. Enhancing Technol., 2020

Comprehensive Anonymity Trilemma: User Coordination is not enough.
Proc. Priv. Enhancing Technol., 2020

Verifiable Timed Signatures Made Practical.
IACR Cryptol. ePrint Arch., 2020

RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication.
IACR Cryptol. ePrint Arch., 2020

HACCLE: An Ecosystem for Building Secure Multi-Party Computations.
CoRR, 2020

"My Friend Wanted to Talk About It and I Didn't": Understanding Perceptions of Deletion Privacy in Social Platforms.
CoRR, 2020

Undercutting Bitcoin Is Not Profitable.
CoRR, 2020

Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms.
CoRR, 2020

Finding Safety in Numbers with Secure Allegation Escrows.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
Lethe: Conceal Content Deletion from Persistent Observers.
Proc. Priv. Enhancing Technol., 2019

DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero.
IACR Cryptol. ePrint Arch., 2019

HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication.
IACR Cryptol. ePrint Arch., 2019

Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
IACR Cryptol. ePrint Arch., 2019

A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains.
CoRR, 2019

Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead.
CoRR, 2019

Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Towards Automatically Penalizing Multimedia Breaches (Extended Abstract).
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Flexible Signatures: Making Authentication Suitable for Real-Time Environments.
Proceedings of the Computer Security - ESORICS 2019, 2019

Reducing Automotive Counterfeiting Using Blockchain: Benefits and Challenges.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019

HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Blockchain Access Privacy: Challenges and Directions.
IEEE Secur. Priv., 2018

R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2018

Automated Penalization of Data Breaches using Crypto-augmented Smart Contracts.
IACR Cryptol. ePrint Arch., 2018

Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks.
IACR Cryptol. ePrint Arch., 2018

Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments.
IACR Cryptol. ePrint Arch., 2018

SATE: Robust and Private Allegation Escrows.
CoRR, 2018

ClearChart: Ensuring integrity of consumer ratings in online marketplaces.
Comput. Secur., 2018

Mind Your Credit: Assessing the Health of the Ripple Credit Network.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
PathShuffle: Credit Mixing and Anonymous Payments for Ripple.
Proc. Priv. Enhancing Technol., 2017

Longitudinal Privacy Management in Social Media: The Need for Better Controls.
IEEE Internet Comput., 2017

Concurrency and Privacy with Payment-Channel Networks.
IACR Cryptol. ePrint Arch., 2017

Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two.
IACR Cryptol. ePrint Arch., 2017

Encrypting Messages for Incomplete Chains of Certificates.
IACR Cryptol. ePrint Arch., 2017

Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers.
CoRR, 2017

SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Data Lineage in Malicious Environments.
IEEE Trans. Dependable Secur. Comput., 2016

Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network.
Proc. Priv. Enhancing Technol., 2016

AnoA: A Framework for Analyzing Anonymous Communication Protocols.
J. Priv. Confidentiality, 2016

P2P Mixing and Unlinkable Bitcoin Transactions.
IACR Cryptol. ePrint Arch., 2016

SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.
IACR Cryptol. ePrint Arch., 2016

cMix: Anonymization byHigh-Performance Scalable Mixing.
IACR Cryptol. ePrint Arch., 2016

Anonymous RAM.
IACR Cryptol. ePrint Arch., 2016

Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Introduction to Credit Networks: Security, Privacy, and Applications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget).
IACR Cryptol. ePrint Arch., 2015

Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Visigoth fault tolerance.
Proceedings of the Tenth European Conference on Computer Systems, 2015

Strength in Numbers: Robust Tamper Detection in Crowd Computations.
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015

Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget).
Proceedings of the Applied Cryptography and Network Security, 2015

Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2014

Privacy-preserving Data Aggregation with Optimal Utility.
IACR Cryptol. ePrint Arch., 2014

(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
IACR Cryptol. ePrint Arch., 2014

Lime: Data Lineage in the Malicious Environment.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Asynchronous MPC with a strict honest majority using non-equivocation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014

CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
Proceedings of the Computer Security - ESORICS 2014, 2014

Differentially private data aggregation with optimal utility.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

BackRef: Accountability in Anonymous Communication Networks.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Towards Practical Communication in Byzantine-Resistant DHTs.
IEEE/ACM Trans. Netw., 2013

Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness.
IACR Cryptol. ePrint Arch., 2013

Asynchronous MPC with t<n/2 Using Non-equivocation.
IACR Cryptol. ePrint Arch., 2013

Introducing Accountability to Anonymity Networks.
CoRR, 2013

Identity-based steganography and its applications to censorship resistance.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Distributed Key Generation in the Wild.
IACR Cryptol. ePrint Arch., 2012

Asynchronous Computational VSS with Reduced Communication Complexity.
IACR Cryptol. ePrint Arch., 2012

Ace: an efficient key-exchange protocol for onion routing.
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

On the (limited) power of non-equivocation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012

Brief announcement: distributed cryptography using trinc.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012

Adding query privacy to robust DHTs.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Generalizing cryptosystems based on the subset sum problem.
Int. J. Inf. Sec., 2011

Computational Verifiable Secret Sharing Revisited.
IACR Cryptol. ePrint Arch., 2011

Provably Secure and Practical Onion Routing.
IACR Cryptol. ePrint Arch., 2011

2010
Distributed Key Generation and Its Applications.
PhD thesis, 2010

Pairing-Based Onion Routing with Improved Forward Secrecy.
ACM Trans. Inf. Syst. Secur., 2010

Distributed Private-Key Generators for Identity-Based Cryptography.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Practical Robust Communication in DHTs Tolerating a Byzantine Adversary.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Constant-Size Commitments to Polynomials and Their Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Using Sphinx to Improve Onion Routing Circuit Construction.
IACR Cryptol. ePrint Arch., 2009

Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography.
IACR Cryptol. ePrint Arch., 2009

Distributed Key Generation for the Internet.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2007
Anonymity and security in delay tolerant networks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Pairing-Based Onion Routing.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007


  Loading...