Esha Ghosh
Esha Ghosh
Microsoft Research
Verified email at microsoft.com
Title
Cited by
Cited by
Year
Hash first, argue later: Adaptive verifiable computations on outsourced data
D Fiore, C Fournet, E Ghosh, M Kohlweiss, O Ohrimenko, B Parno
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
572016
Faster parameterized algorithms for deletion to split graphs
E Ghosh, S Kolay, M Kumar, P Misra, F Panolan, A Rai, MS Ramanujan
Algorithmica 71 (4), 989-1006, 2015
382015
Faster parameterized algorithms for deletion to split graphs
E Ghosh, S Kolay, M Kumar, P Misra, F Panolan, A Rai, MS Ramanujan
Scandinavian Workshop on Algorithm Theory, 107-118, 2012
172012
Zero-knowledge accumulators and set algebra
E Ghosh, O Ohrimenko, D Papadopoulos, R Tamassia, N Triandopoulos
International Conference on the Theory and Application of Cryptology and …, 2016
152016
Zero-knowledge authenticated order queries and order statistics on a list
E Ghosh, O Ohrimenko, R Tamassia
International Conference on Applied Cryptography and Network Security, 149-171, 2015
142015
Zero-Knowledge Accumulators and Set Operations.
E Ghosh, O Ohrimenko, D Papadopoulos, R Tamassia, N Triandopoulos
IACR Cryptol. ePrint Arch. 2015, 404, 2015
122015
Seemless: Secure end-to-end encrypted messaging with less trust
M Chase, A Deshpande, E Ghosh, H Malvai
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
102019
Verifiable member and order queries on a list in zero-knowledge
E Ghosh, O Ohrimenko, R Tamassia
arXiv preprint arXiv:1408.3843, 2014
102014
Verifiable zero-knowledge order queries and updates for fully dynamic lists and trees
E Ghosh, MT Goodrich, O Ohrimenko, R Tamassia
International Conference on Security and Cryptography for Networks, 216-236, 2016
82016
Efficient Verifiable Range and Closest Point Queries in Zero-Knowledge.
E Ghosh, O Ohrimenko, R Tamassia
Proc. Priv. Enhancing Technol. 2016 (4), 373-388, 2016
82016
Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data.
E Ghosh, MT Goodrich, O Ohrimenko, R Tamassia
IACR Cryptol. ePrint Arch. 2015, 283, 2015
82015
Cryptographic key-generation with application to data deduplication
JL Camenisch, A De Caro, E Ghosh, A Sorniotti
US Patent 10,277,395, 2019
72019
Stateful multi-client verifiable computation
C Cachin, E Ghosh, D Papadopoulos, B Tackmann
International Conference on Applied Cryptography and Network Security, 637-656, 2018
52018
Verifiable order queries and order statistics on a list in zero-knowledge
E Ghosh, O Ohrimenko, R Tamassia
ePrint Report 632, 2014
52014
Privately computing set-maximal matches in genomic data
K Sotiraki, E Ghosh, H Chen
BMC Medical Genomics 13 (7), 1-8, 2020
42020
A polynomial time algorithm for longest paths in biconvex graphs
E Ghosh, NS Narayanaswamy, CP Rangan
International Workshop on Algorithms and Computation, 191-201, 2011
42011
Property Inference From Poisoning
M Chase, E Ghosh, S Mahloujifar
arXiv preprint arXiv:2101.11073, 2021
32021
Oblivious PRF on committed vector inputs and application to deduplication of encrypted data
J Camenisch, A De Caro, E Ghosh, A Sorniotti
International conference on financial cryptography and data security, 337-356, 2019
32019
Secret-Shared Shuffle
M Chase, E Ghosh, O Poburinnaya
International Conference on the Theory and Application of Cryptology and …, 2020
22020
Privacy Preserving Verifiable Key Directories.
M Chase, A Deshpande, E Ghosh
IACR Cryptol. ePrint Arch. 2018, 607, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20