Author of the publication

Zero-Knowledge Accumulators and Set Algebra.

, , , , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 67-100. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage.. Brown University, USA, (2014)Randomize the Future: Asymptotically Optimal Locally Private Frequency Estimation Protocol for Longitudinal Data., , and . PODS, page 237-249. ACM, (2022)Efficient Oblivious Permutation via the Waksman Network., , and . AsiaCCS, page 771-783. ACM, (2022)Authenticating Email Search Results., , and . STM, volume 7783 of Lecture Notes in Computer Science, page 225-240. Springer, (2012)An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors., , , , , and . NeurIPS, page 13635-13646. (2019)Leakage of Dataset Properties in Multi-Party Machine Learning., , and . USENIX Security Symposium, page 2687-2704. USENIX Association, (2021)Analyzing Information Leakage of Updates to Natural Language Models., , , , , , , and . CCS, page 363-375. ACM, (2020)Propagation = Lazy Clause Generation., , and . CP, volume 4741 of Lecture Notes in Computer Science, page 544-558. Springer, (2007)Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees., , , and . SCN, volume 9841 of Lecture Notes in Computer Science, page 216-236. Springer, (2016)Contamination Attacks and Mitigation in Multi-Party Machine Learning., and . NeurIPS, page 6604-6616. (2018)