default search action
Esha Ghosh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c19]Bargav Jayaraman, Esha Ghosh, Melissa Chase, Sambuddha Roy, Wei Dai, David Evans:
Combing for Credentials: Active Pattern Extraction from Smart Reply. SP 2024: 1443-1461 - [c18]Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno:
OPTIKS: An Optimized Key Transparency System. USENIX Security Symposium 2024 - [i27]Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, Antonio Marcedone:
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency. IACR Cryptol. ePrint Arch. 2024: 107 (2024) - [i26]Esha Ghosh, Melissa Chase:
Weak Consistency mode in Key Transparency: OPTIKS. IACR Cryptol. ePrint Arch. 2024: 796 (2024) - [i25]Francesca Falzon, Esha Ghosh, Kenneth G. Paterson, Roberto Tamassia:
PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries. IACR Cryptol. ePrint Arch. 2024: 845 (2024) - [i24]Dana Dachman-Soled, Esha Ghosh, Mingyu Liang, Ian Miers, Michael Rosenberg:
Anonymous Outsourced Statekeeping with Reduced Server Storage. IACR Cryptol. ePrint Arch. 2024: 1139 (2024) - 2023
- [c17]Julia Len, Melissa Chase, Esha Ghosh, Daniel Jost, Balachandar Kesavan, Antonio Marcedone:
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency. CCS 2023: 2915-2929 - [c16]Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean F. Lawlor:
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging. NDSS 2023 - [i23]Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine:
Does Prompt-Tuning Language Model Ensure Privacy? CoRR abs/2304.03472 (2023) - [i22]Harjasleen Malvai, Lefteris Kokoris-Kogias, Alberto Sonnino, Esha Ghosh, Ercan Oztürk, Kevin Lewi, Sean F. Lawlor:
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging. IACR Cryptol. ePrint Arch. 2023: 81 (2023) - [i21]Julia Len, Esha Ghosh, Paul Grubbs, Paul Rösler:
Interoperability in End-to-End Encrypted Messaging. IACR Cryptol. ePrint Arch. 2023: 386 (2023) - [i20]Julia Len, Melissa Chase, Esha Ghosh, Kim Laine, Radames Cruz Moreno:
OPTIKS: An Optimized Key Transparency System. IACR Cryptol. ePrint Arch. 2023: 1515 (2023) - 2022
- [c15]Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou:
Rotatable Zero Knowledge Sets - Post Compromise Secure Auditable Dictionaries with Application to Key Transparency. ASIACRYPT (3) 2022: 547-580 - [c14]Melissa Chase, Georg Fuchsbauer, Esha Ghosh, Antoine Plouviez:
Credential Transparency System. SCN 2022: 313-335 - [c13]Saeed Mahloujifar, Esha Ghosh, Melissa Chase:
Property Inference from Poisoning. SP 2022: 1120-1137 - [i19]Bargav Jayaraman, Esha Ghosh, Huseyin A. Inan, Melissa Chase, Sambuddha Roy, Wei Dai:
Active Data Pattern Extraction Attacks on Generative Language Models. CoRR abs/2207.10802 (2022) - [i18]Thorsten Eisenhofer, Doreen Riepel, Varun Chandrasekaran, Esha Ghosh, Olga Ohrimenko, Nicolas Papernot:
Verifiable and Provably Secure Machine Unlearning. CoRR abs/2210.09126 (2022) - [i17]Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou:
Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency. IACR Cryptol. ePrint Arch. 2022: 1264 (2022) - [i16]Melissa Chase, Hannah Davis, Esha Ghosh, Kim Laine:
Acsesor: A New Framework for Auditable Custodial Secret Storage and Recovery. IACR Cryptol. ePrint Arch. 2022: 1729 (2022) - 2021
- [c12]Esha Ghosh, Seny Kamara, Roberto Tamassia:
Efficient Graph Encryption Scheme for Shortest Path Queries. AsiaCCS 2021: 516-525 - [c11]Arvind Arasu, Badrish Chandramouli, Johannes Gehrke, Esha Ghosh, Donald Kossmann, Jonathan Protzenko, Ravi Ramamurthy, Tahina Ramananandro, Aseem Rastogi, Srinath T. V. Setty, Nikhil Swamy, Alexander van Renen, Min Xu:
FastVer: Making Data Integrity a Commodity. SIGMOD Conference 2021: 89-101 - [i15]Melissa Chase, Esha Ghosh, Saeed Mahloujifar:
Property Inference From Poisoning. CoRR abs/2101.11073 (2021) - [i14]Saeed Mahloujifar, Huseyin A. Inan, Melissa Chase, Esha Ghosh, Marcello Hasegawa:
Membership Inference on Word Embedding and Beyond. CoRR abs/2106.11384 (2021) - [i13]Melissa Chase, Esha Ghosh, Saeed Mahloujifar:
Property Inference from Poisoning. IACR Cryptol. ePrint Arch. 2021: 99 (2021) - [i12]Erik Anderson, Melissa Chase, F. Betül Durak, Esha Ghosh, Kim Laine, Chenkai Weng:
Aggregate Measurement via Oblivious Shuffling. IACR Cryptol. ePrint Arch. 2021: 1490 (2021) - 2020
- [c10]Melissa Chase, Esha Ghosh, Oxana Poburinnaya:
Secret-Shared Shuffle. ASIACRYPT (3) 2020: 342-372
2010 – 2019
- 2019
- [c9]Melissa Chase, Apoorvaa Deshpande, Esha Ghosh, Harjasleen Malvai:
SEEMless: Secure End-to-End Encrypted Messaging with less</> Trust. CCS 2019: 1639-1656 - [c8]Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti:
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data. Financial Cryptography 2019: 337-356 - [i11]Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti:
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data. IACR Cryptol. ePrint Arch. 2019: 438 (2019) - [i10]Melissa Chase, Esha Ghosh, Oxana Poburinnaya:
Secret Shared Shuffle. IACR Cryptol. ePrint Arch. 2019: 1340 (2019) - 2018
- [b1]Esha Ghosh:
Integrity and Privacy in the Cloud: Efficient algorithms for secure and privacy-preserving processing of outsourced data. Brown University, USA, 2018 - [c7]Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann:
Stateful Multi-client Verifiable Computation. ACNS 2018: 637-656 - [i9]Melissa Chase, Apoorvaa Deshpande, Esha Ghosh:
Privacy Preserving Verifiable Key Directories. IACR Cryptol. ePrint Arch. 2018: 607 (2018) - 2017
- [i8]Christian Cachin, Esha Ghosh, Dimitrios Papadopoulos, Björn Tackmann:
Stateful Multi-Client Verifiable Computation. IACR Cryptol. ePrint Arch. 2017: 901 (2017) - 2016
- [j2]Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge. Proc. Priv. Enhancing Technol. 2016(4): 373-388 (2016) - [c6]Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos:
Zero-Knowledge Accumulators and Set Algebra. ASIACRYPT (2) 2016: 67-100 - [c5]Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno:
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data. CCS 2016: 1304-1316 - [c4]Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia:
Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees. SCN 2016: 216-236 - [i7]Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno:
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data. IACR Cryptol. ePrint Arch. 2016: 985 (2016) - 2015
- [j1]Esha Ghosh, Sudeshna Kolay, Mrinal Kumar, Pranabendu Misra, Fahad Panolan, Ashutosh Rai, M. S. Ramanujan:
Faster Parameterized Algorithms for Deletion to Split Graphs. Algorithmica 71(4): 989-1006 (2015) - [c3]Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Zero-Knowledge Authenticated Order Queries and Order Statistics on a List. ACNS 2015: 149-171 - [i6]Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia:
Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data. IACR Cryptol. ePrint Arch. 2015: 283 (2015) - [i5]Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos:
Zero-Knowledge Accumulators and Set Operations. IACR Cryptol. ePrint Arch. 2015: 404 (2015) - [i4]Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Authenticated Range \& Closest Point Queries in Zero-Knowledge. IACR Cryptol. ePrint Arch. 2015: 1183 (2015) - 2014
- [i3]Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Verifiable Member and Order Queries on a List in Zero-Knowledge. CoRR abs/1408.3843 (2014) - [i2]Esha Ghosh, Olga Ohrimenko, Roberto Tamassia:
Verifiable Member and Order Queries on a List in Zero-Knowledge. IACR Cryptol. ePrint Arch. 2014: 632 (2014) - 2012
- [c2]Esha Ghosh, Sudeshna Kolay, Mrinal Kumar, Pranabendu Misra, Fahad Panolan, Ashutosh Rai, M. S. Ramanujan:
Faster Parameterized Algorithms for Deletion to Split Graphs. SWAT 2012: 107-118 - 2011
- [c1]Esha Ghosh, N. S. Narayanaswamy, C. Pandu Rangan:
A Polynomial Time Algorithm for Longest Paths in Biconvex Graphs. WALCOM 2011: 191-201 - [i1]Esha Ghosh, Subhas Kumar Ghosh, C. Pandu Rangan:
On the Fault Tolerance and Hamiltonicity of the Optical Transpose Interconnection System of Non-Hamiltonian Base Graphs. CoRR abs/1109.1706 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint