Aarhus University Seal / Aarhus Universitets segl

Satrajit Ghosh

  1. 2019
  2. Published

    Secure Computation Based On Oblivious Linear Function Evaluation. / Ghosh, Satrajit.

    Aarhus Universitet, 2019.

    Research output: Book/anthology/dissertation/reportPh.D. thesisResearch

  3. Published

    An algebraic approach to maliciously secure private set intersection. / Ghosh, Satrajit; Nilges, Tobias.

    Advances in Cryptology – EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. ed. / Yuval Ishai; Vincent Rijmen. Springer VS, 2019. p. 154-185 (Lecture Notes in Computer Science, Vol. 11478).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  4. Published

    The Communication Complexity of Threshold Private Set Intersection. / Ghosh, Satrajit; Simkin, Mark.

    Advances in Cryptology – CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18–22, 2019, Proceedings. ed. / Alexandra Boldyreva; Daniele Micciancio. Vol. II Cham : Springer, 2019. p. 3-29 (Lecture Notes in Computer Science, Vol. 11693).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  5. 2017
  6. Published

    TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation. / Döttling, Nico Marcel; Ghosh, Satrajit; Nielsen, Jesper Buus; Nilges, Tobias; Trifiletti, Roberto.

    Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security : CCS '17. Association for Computing Machinery, 2017. p. 2263-2276.

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review

  7. Published

    Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead. / Ghosh, Satrajit; Nielsen, Jesper Buus; Nilges, Tobias.

    Advances in Cryptology -- ASIACRYPT 2017: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. ed. / Tsuyoshi Takagi; Thomas Peyrin. Vol. 10624 Cham : Springer VS, 2017. p. 629-659 (Lecture Notes in Computer Science, Vol. 10624).

    Research output: Contribution to book/anthology/report/proceedingArticle in proceedingsResearchpeer-review