Elaine Shi
Orcid: 0000-0002-5605-1048Affiliations:
- Carnegie Mellon University, USA
- Cornell University, Ithaca, NY, USA (former)
According to our database1,
Elaine Shi
authored at least 228 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2023, "For contributions to the scientific foundation of oblivious computation and decentralized blockchains".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
Proc. Priv. Enhancing Technol., 2024
Proc. ACM Manag. Data, 2024
IACR Cryptol. ePrint Arch., 2024
PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
On the Viability of Open-Source Financial Rails: Economic Security of Permissionless Consensus.
CoRR, 2024
Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy.
CoRR, 2024
Proceedings of the 36th ACM Symposium on Parallelism in Algorithms and Architectures, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Distributed Comput., March, 2023
Proc. ACM Program. Lang., January, 2023
IEEE Micro, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Multi-Client Inner Product Encryption: Function-Hiding Instantiations Without Random Oracles.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
STAMP: Lightweight TEE-Assisted MPC for Efficient Privacy-Preserving Machine Learning.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM-SIAM Symposium on Discrete Algorithms, 2022
Proceedings of the PODC '22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms.
IACR Cryptol. ePrint Arch., 2021
Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report).
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021
Proceedings of the PLDI '21: 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and Time.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
J. Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions.
IACR Cryptol. ePrint Arch., 2020
Puncturable Pseudorandom Sets and Private Information Retrieval with Polylogarithmic Bandwidth and Sublinear Time.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Game-Theoretically Fair Leader Election in O(log log n) Rounds under Majority Coalitions.
IACR Cryptol. ePrint Arch., 2020
Perfectly Secure Oblivious Parallel RAM with O(log<sup>3</sup> N/ log log N) Overhead.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Commun. ACM, 2020
Proceedings of the 34th International Symposium on Distributed Computing, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Small Memory Robust Simulation of Client-Server Interactive Protocols over Oblivious Noisy Channels.
Proceedings of the 2020 ACM-SIAM Symposium on Discrete Algorithms, 2020
Proceedings of the 3rd Symposium on Simplicity in Algorithms, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020
2019
J. Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Snow White: Robustly Reconfigurable Consensus and Applications to Provably Secure Proof of Stake.
Proceedings of the Financial Cryptography and Data Security, 2019
Towards Attribute-Based Encryption for RAMs from LWE: Sub-linear Decryption, and More.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
2017
ACM Trans. Algorithms, 2017
IACR Cryptol. ePrint Arch., 2017
Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th International Conference on World Wide Web, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
Proceedings of the Understanding Social Engineering Based Scams, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
2014
ACM Trans. Intell. Syst. Technol., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the third workshop on Hot topics in software defined networking, 2014
Proceedings of the 41st Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 7th USENIX Workshop on Hot Topics in Security, 2012
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 10th International Conference on Mobile Systems, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
CoRR, 2011
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
Proceedings of the Network and Distributed System Security Symposium, 2011
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011
Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
2009
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
IACR Cryptol. ePrint Arch., 2008
2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007
2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005
2004
Proceedings of the Third International Symposium on Information Processing in Sensor Networks, 2004