Refereed Publications
(Papers written mainly as my startup efforts are tagged with [Industrial Research]. For the non-obvious cases,
talks given by me are indicated by ,
and papers co-led by me are indicated by .)
Preprints
-
Optimal Sharding for Scalable Blockchains with Deconstructed SMR
Jianting Zhang, Zhongtang Luo, Raghavendra Ramesh, and Aniket Kate.
-
V3rified: Revelation vs Non-Revelation Mechanisms for Decentralized Verifiable Computation
Tiantian Gong, Aniket Kate, Alexandros Psomas, and Athina Terzoglou.
-
Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability
Zhongtang Luo, Yanxue Jia, Yaobin Shen, and Aniket Kate.
- [Industrial Research]
SoK: Web3 Recovery Mechanisms
Panagiotis Chatzigiannis, Konstantinos Chalkias, Aniket Kate, Easwar Vivek Mangipudi, Mohsen Minaei, and Mainack Mondal.
-
Order but Not Execute in Order
Tiantian Gong and Aniket Kate.
...
2025
2024
-
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted
Yanxue Jia, Varun Madathil, and Aniket Kate.
To appear at 31th ACM Conference on Computer and Communications Security (CCS), 2024.
- [Industrial Research]
Non-interactive VSS using Class Groups and Application to DKG
Aniket Kate, Easwar Vivek Mangipudi, Pratyay Mukherjee, Hamza Saleem, and Sri Aravinda Krishnan Thyagarajan.
To appear at 31th ACM Conference on Computer and Communications Security (CCS), 2024.
-
HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup
Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, and Michael Reiter.
To appear at 31th ACM Conference on Computer and Communications Security (CCS), 2024.
-
Synchronous distributed key generation without broadcasts
Nibesh Shrestha, Adithya Bhat, Aniket Kate, and Kartik Nayak
IACR Communications in Cryptology, vol. 1, no. 2, Jul 08, 2024.
-
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles
Akhil Bandarupalli, Adithya Bhat, Saurabh Bagchi, Aniket Kate, Chen-Da Liu-Zhang, and Michael K. Reiter
54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2024.
-
Unconditional Security using (Random) Anonymous Bulletin Board
Albert Yu, Hai H. Nguyen, Aniket Kate, and Hemanta K. Maji.
2024 IEEE International Symposium on Information Theory (ISIT), 2024.
-
SensorBFT: Fault-Tolerant Target Localization Using Voronoi Diagrams and Approximate Agreement
Akhil Bandarupalli, Adithya Bhat, Somali Chaterji, Michael K. Reiter, Aniket Kate and Saurabh Bagchi
IEEE 44th International Conference on Distributed Computing Systems (ICDCS), 2024.
-
More is Merrier: Relax the Non-Collusion Assumption in
Multi-Server PIR
Tiantian Gong, Ryan Henry, Alexandros Psomas, and Aniket Kate.
45th IEEE Symposium on Security and Privacy (IEEE S&P), 2024.
-
Attacking and Improving the Tor Directory Protocol
Zhongtang Luo, Adithya Bhat, Kartik Nayak, and Aniket Kate
45th IEEE Symposium on Security and Privacy (IEEE S&P), 2024.
-
Divide and funnel: a scaling technique for mix-networks
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate
IEEE Computer Security Foundations Symposium (CSF), 2024.
-
Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus
Jianting Zhang, Wuhui Chen, Sifu Luo, Tiantian Gong, Zicong Hong, and Aniket Kate
Network and Distributed System Security Symposium (NDSS), 2024.
2023
-
EESMR: Energy Efficient BFT-SMR for the masses
Adithya Bhat, Akhil Bandarupalli, Manish Nagaraj, Saurabh Bagchi, Aniket Kate, and Michael K. Reiter
24th ACM/IFIP International Middleware Conference (Middleware) , 2023.
-
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets
Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, and Aniket Kate
30th ACM Conference on Computer and Communications Security (CCS), 2023.
- [Industrial Research]
Output Private (Distributed) VRFs and Application to Blockchains
Aniket Kate, Easwar V. Mangipudi, Siva Maradana, and Pratyay Mukherjee
30th ACM Conference on Computer and Communications Security (CCS), 2023.
-
Pepal: Penalizing multimedia breaches and partial leakages
Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark and Aniket Kate
International Journal of Information Security (IJIS), (Online) September 2023.
- [Industrial Research]
DORA: Distributed Oracle Agreement with Simple Majority
Prasanth Chakka, Saurabh Joshi, Aniket Kate, Joshua Tobkin and David Yang
43rd IEEE International Conference on Distributed Computing Systems (ICDCS) , 2023.
-
SIM: Secure Interval Membership Testing and Applications to Secure Comparison
Albert Yu, Donghang Lu, Aniket Kate, and Hemanta K. Maji
IEEE European Symposium on Security and Privacy (Euro IEEE S&P) , 2023.
-
RPM: Robust Anonymity at Scale
Donghang Lu, and Aniket Kate
Privacy Enhancing Technologies Symposium (PETS), 2023.
- Collusion-Deterrent Threshold Information Escrow
Easwar Mangipudi, Donghang Lu, Alexandros Psomas and Aniket Kate
IEEE Computer Security Foundations Symposium (CSF), 2023.
-
The Unique Chain Rule and its Applications
Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, and Michael K. Reiter
Financial Cryptography and Data Security (FC), 2023.
- OptRand: Optimistically Responsive Reconfigurable Distributed
Randomness
Adithya Bhat, Nibesh Shrestha, Aniket Kate, and Kartik Nayak
Network and Distributed System Security Symposium (NDSS), 2023.
- Breaking and Fixing Virtual Channels: Domino Attack and Donner
Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, and Matteo Maffei
Network and Distributed System Security Symposium (NDSS), 2023.
2022
- D-KODE: Distributed Mechanism to Manage a Billion Discrete-log Keys
Easwar Mangipudi and Aniket Kate
ACM Advances in Financial Technologies (AFT), 2022.
- Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures
Mohsen Minaei, Mainack Mondal, and Aniket Kate
USENIX Security Symposium (Usenix SEC), 2022.
-
OrgAn: Organizational Anonymity with Low Latency
Debajyoti Das, Easwar Vivek Mangipudi, and Aniket Kate
Privacy Enhancing Technologies Symposium (PETS), 2022.
-
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications
Donghang Lu, Albert Yu, Aniket Kate, and Hemanta Maji
Privacy Enhancing Technologies Symposium (PETS), 2022.
- hbACSS: How to Robustly Share Many Secrets
Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate and Andrew Miller
Network and Distributed System Security Symposium (NDSS), 2022.
-
Towards Overcoming the Undercutting Problem
Tiantian Gong, Mohsen Minaei, Wenhai Sun, and Aniket Kate
Financial Cryptography and Data Security (FC), 2022.
2021
-
OpenSquare: Decentralized Repeated Modular Squaring Service
Sri Aravinda Krishnan Thyagarajan,
Tiantian Gong,
Adithya Bhat,
Aniket Kate, and
Dominique Schröder
28th ACM Conference on Computer and Communications Security (CCS), 2021.
- RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication
Adithya Bhat, Nibesh Shrestha, Zhongtang Luo, Aniket Kate, and Kartik Nayak
28th ACM Conference on Computer and Communications Security (CCS), 2021.
- Blitz: Secure Multi-Hop Payments Without Two-Phase Commits
Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, and Matteo Maffei
USENIX Security Symposium (Usenix SEC), 2021.
- Cloaking Large-Scale Damaging Deletions on Social Platforms
Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, and Aniket Kate
Network and Distributed System Security Symposium (NDSS), 2021.
- Reparo: Publicly Verifiable Layer to Repair Blockchains
Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Bernardo Magri, Daniel Tschudi, and Aniket Kate
Financial Cryptography and Data Security (FC), 2021.
- HACCLE: Metaprogramming for Secure Multi-Party Computation
Yuyan Bao, Kirshanthan Sundararajah, etc.
20th International Conference on Generative Programming: Concepts & Experiences (GPCE), 2021.
- Toward Privacy-Aware Traceability for Automotive Supply Chains
Donghang Lu, Pedro Moreno-Sanchez, Pramita Mitra, Ken Feldman, Josh Fodale, Jason Kosofsky, and Aniket Kate
SAE International Journal of Transportation Cybersecurity and Privacy (4:2), 2021.
2020
-
Verifiable Timed Signatures Made Practical
Sri Aravinda Krishnan Thyagarajan,
Adithya Bhat,
Giulio Malavolta,
Nico Döttling,
Aniket Kate, and
Dominique Schröder
27th ACM Conference on Computer and Communications Security (CCS), 2020.
-
Comprehensive Anonymity Trilemma: User Coordination is not enough
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate
Privacy Enhancing Technologies Symposium (PETS), 2020.
- A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains
Duc V. Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, and Aniket Kate
Privacy Enhancing Technologies Symposium (PETS), 2020.
[Artifact]
[Scaling Bitcoin 2019]
-
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies
Mohsen Minaei, Pedro Moreno-Sanchez and Aniket Kate
Privacy Enhancing Technologies Symposium (PETS), 2020.
- Finding Safety in Numbers with Secure Allegation Escrows
Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, and Bobby Bhattacharjee
Network and Distributed System Security Symposium (NDSS), 2020.
- DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero
Pedro Moreno-Sanchez, Randomrun, Duc V. Le, Sarang Noether, Brandon Goodell and Aniket Kate
Financial Cryptography and Data Security (FC), 2020.
2019
- HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC
and its Application to Anonymous Communication
Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Aniket Kate, and Andrew Miller
26th ACM Conference on Computer and Communications Security (CCS), 2019.
-
Flexible Signatures: Making Authentication Suitable for Real-Time Environments
Duc V. Le, Mahimna Kelkar and Aniket Kate
European Symposium on Research in Computer Security (ESORICS), 2019.
-
Lethe: Conceal Content Deletion from Persistent Observers
Mohsen Minaei, Mainack Mondal, Patrick Loiseau, Krishna Gummadi, and Aniket Kate
Privacy Enhancing Technologies Symposium (PETS), 2019.
- Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup
Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, and Ivan Pryvalov
22nd International Conference on Practice and Theory of Public Key Cryptography (PKC), 2019
- Towards Automatically Penalizing Multimedia Breaches
Easwar Mangipudi, Krutarth Rao, Jeremy Clark and Aniket Kate
IEEE Security & Privacy on the Blockchain (IEEE S&B) Workshop, 2019.
[Full version: Cryptology ePrint Archive: Report 2018/1050].
-
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification
Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, and Ninghui Li
Network and Distributed System Security Symposium (NDSS), 2019.
[CVEs assigned:
CVE-2018-15836,
CVE-2018-16151,
CVE-2018-16152,
CVE-2018-16253,
CVE-2018-16150,
CVE-2018-16149]
-
Anonymous Multi-Hop Locks for Blockchain
Scalability and Interoperability
Giulio Malavolta*, Pedro Moreno-Sanchez*, Clara Schneidewind, Aniket Kate, and Matteo Maffei
Network and Distributed System Security Symposium (NDSS), 2019.
also presented at [Scaling Bitcoin 2018]
[Stanford Blockchain Conference 2019]
[Binary District Off-chain 2018]
2018
-
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps
Sze Yiu Chau, Bincheng Wang, Jianxiong Wang, Omar Chowdhury, Aniket Kate, and Ninghui Li
Annual Computer Security Applications Conference (ACSAC), December 2018.
- Blockchain Access Privacy: Challenges and Directions
Ryan Henry, Amir Herzberg, and Aniket Kate
IEEE Security and Privacy (IEEE S&P) Magazine, 2018.
- Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency---Choose Two
Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate
39th IEEE Symposium on Security and Privacy (IEEE S&P), 2018.
[Webpage]
- Mind Your Credit: Assessing the Health of the Ripple Credit Network
Pedro Moreno-Sanchez, Navin Modi, Raghuvir Songhela, Sonia Fahmy, and Aniket Kate
27th World Wide Web Conference (WWW), 2018.
[Media: MIT Technology Review]
-
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions
Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, and Ian Goldberg
Network and Distributed System Security Symposium (NDSS), 2018.
also presented at [Stanford BPASE '18]
[MIT Bitcoin Expo 2018]
[Binary District Off-chain Workshop 2018]
-
ClearChart: Ensuring Integrity of Consumer Ratings in Online Marketplaces
Pedro Moreno-Sanchez, Uzair Mahmood, and Aniket Kate
Computers & Security (CoSe) Journal, 2018.
2017
- Concurrency and Privacy with Payment-Channel Networks
Giulio Malavolta*, Pedro Moreno-Sanchez*, Aniket Kate, Matteo Maffei, and Srivatsan Ravi
24th ACM Conference on Computer and Communications Security (CCS), October 2017.
[Video]
also presented at [Scaling Bitcoin 2017]
-
SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations
Sze Yiu Chau, Omar Chowdhury, Endadul Hoque,
Huangyi Ge,
Aniket Kate,
Cristina Nita-Rotaru, and
Ninghui Li
38th IEEE Symposium on Security and Privacy (IEEE S&P), 2017.
[Video]
[CVEs assigned: CVE-2017-1000415,
CVE-2017-1000416,
CVE-2017-1000417]
-
P2P Mixing and Unlinkable Bitcoin Transactions: Anonymity of the people, by the people, and for the people
Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate
Network and Distributed System Security Symposium (NDSS), 2017.
[Video]
[Github]
-
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks
Giulio Malavolta*, Pedro Moreno-Sanchez*, Aniket Kate, and Matteo Maffei
Network and Distributed System Security Symposium (NDSS), 2017.
-
PathShuffle: Credit Mixing and Anonymous Payments for Ripple
Pedro Moreno-Sanchez, Tim Ruffing, and Aniket Kate
Privacy Enhancing Technologies Symposium (PETS), 2017.
[Video]
-
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations
David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, and Alan T. Sherman:
15th International Conference on Applied Cryptography and Network Security (ACNS), 2017.
IACR Cryptology ePrint Archive: Report 2016/008.
[Media: Wired]
-
Longitudinal Privacy Management in Social Media: The Need for Better Controls
Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, and Aniket Kate
IEEE Internet Computing (IC) magazine, 2017.
[local copy]
[Twitter App: Secondary Digital Footprint]
2016
-
Anonymous RAM
Michael Backes, Amir Herzberg, Aniket Kate and Ivan Pryvalov
21st European Symposium on Research in Computer Security (ESORICS), 2016.
IACR Cryptology ePrint Archive: Report 2016/678.
- Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions
in the Ripple Network
Pedro Moreno-Sanchez, Muhammad Bilal Zafar, and Aniket Kate
Privacy Enhancing Technologies Symposium (PETS), 2016.
[video]
also presented at [Real World Crypto (RWC) conference 2017]
-
Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data
Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, and Aniket Kate
USENIX Symposium on Usable Privacy and Security (SOUPS), 2016.
- Data Lineage in Malicious Environments
Michael Backes, Niklas Grimm, and Aniket Kate
IEEE Transactions on Dependable and Secure Computing (TDSC), 13(2): 178-191, 2016.
An extended abstract appeared at 10th International Workshop on Security and Trust Management (STM 2014), September 2014.
A preliminary full version available as CoRR arXiv: 1408.1076, August 2014.
-
AnoA: A Framework for Analyzing Anonymous Communication Protocols
Michael Backes, Aniket Kate, Praveen Manoharan,
Sebastian Meiser, and Esfandiar Mohammadi
Journal of Privacy and Confidentiality (JPC), Vol 7 (2), 5, 2016.
2015
- Strength in Numbers: Robust Tamper Detection in Crowd Computations ***Best Paper Award***
Bimal Viswanath,
Muhammad Ahmad Bashir,
Muhammad Bilal Zafar,
Simon Bouget,
Saikat Guha,
Krishna P. Gummadi,
Aniket Kate, and Alan Mislove
ACM Conference on Online Social Networks (COSN), November 2015.
-
Liar, Liar, Coins on Fire! -- Penalizing Equivocation By Loss of Bitcoins
Tim Ruffing, Aniket Kate, and Dominique Schroeder
22nd ACM Conference on Computer and Communications Security (CCS), October 2015.
- Post-Quantum Forward Secure Onion Routing (Future Anonymity in Today's Budget)
Satrajit Ghosh and Aniket Kate
13th International Conference on Applied Cryptography and Network Security (ACNS 2015), June 2015.
also presented at NIST Workshop on Cybersecurity in a Post-Quantum World. April 2015.
- Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
Michael Backes, Aniket Kate, Sebastian Meiser, and Tim Ruffing
13th International Conference on Applied Cryptography and Network Security (ACNS), June 2015.
- Visigoth Fault Tolerance
Daniel Porto, Joao Leitao, Cheng Li, Allen Clement, Aniket Kate, Flavio Junqueira, and Rodrigo Rodrigues
European Conference on Computer Systems (EuroSys), February 2015.
- Privacy Preserving Payments in Credit Networks
Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, and Kim Pecina
Network and Distributed System Security Symposium (NDSS), February 2015.
2014
- Privacy-preserving Data Aggregation with Optimal Utility
Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, and Ivan Pryvalov
Annual Computer Security Applications Conference (ACSAC), December 2014.
Media: [ScienceDaily]
[Wireless Design]
- (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
Michael Backes, Aniket Kate, Sebastian Meiser, and Esfandiar Mohammadi
21st ACM Conference on Computer and Communications Security (CCS), November 2014.
- CoinShuffle: Practical Decrentralized Coin Mixing for Bitcoin
Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate
19th European Symposium on Research in Computer Security (ESORICS), September 2014.
A preliminary version appeared at
6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), July 2014.
Employed by several cryptocurrency systems such as CashShuffle,
Shufflepuff, and Nxt along others.
- Asynchronous MPC with a Strict Honest Majority Using Non-equivocation
Michael Backes, Fabian Bendun, Ashish Choudhury, and Aniket Kate
33rd ACM Symposium on Principles of Distributed Computing (PODC), July 2014.
- BackRef: Accountability in Anonymous Communication Networks
Michael Backes, Jeremy Clark, Peter Druschel, Aniket Kate, and Milivoj Simeonovski
12th International Conference on Applied Cryptography and Network Security (ACNS), June 2014.
2013
- AnoA: A Framework For Analyzing Anonymous Communication Protocols
Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, and Esfandiar Mohammadi
26th IEEE Computer Security Foundations Symposium (CSF), June 2013.
- Towards Practical Communication in Byzantine-Resistant DHTs
Maxwell Young, Aniket Kate, Ian Goldberg, and Martin Karsten
IEEE/ACM Transactions on Networking (ToN), 21(1): 190-203, 2013.
- Asynchronous Computational VSS with Reduced Communication Complexity
Michael Backes, Amit Datta, and Aniket Kate
Cryptographers' Track - RSA Conference (CT-RSA), February 2013.
2012
- Ace: An Efficient Key-Exchange Protocol for Onion Routing
Michael Backes, Aniket Kate, and Esfandiar Mohammadi
11th Workshop on Privacy in the Electronic Society (WPES), October 2012.
- On the (Limited) Power of Non-Equivocation
Allen Clement, Flavio Junqueira, Aniket Kate, and Rodrigo Rodrigues.
31st ACM Symposium on Principles of Distributed Computing (PODC), July 2012.
- Provably Secure and Practical Onion Routing
Michael Backes, Ian Goldberg, Aniket Kate, and Esfandiar Mohammadi
25th IEEE Computer Security Foundations Symposium (CSF), June 2012.
- ObliviAd: Provably Secure and Practical Online Behavioral Advertising
Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina
33rd IEEE Symposium on Security & Privacy (S&P),
May 2012.
- Adding Query Privacy to Robust DHTs
Michael Backes, Ian Goldberg, Aniket Kate, and Tomas Toft
7th ACM Symposium on Information, Computer and Communications Security (ASIACCS), May 2012.
2011
2010 and Before
- Pairing-Based Onion Routing with Improved Forward Secrecy
Aniket Kate, Gregory M. Zaverucha, and Ian Goldberg
ACM Transactions on Information and System Security (TISSec) Vol. 13 Iss. 4 (29),
December 2010.
The construction with asymmetric bilinear pairing appears in my thesis.
- Constant-Size Commitments to Polynomials and
Their Applications
Aniket Kate, Gregory M. Zaverucha and Ian Goldberg
16th International Conference on the Theory and Application of Cryptology (ASIACRYPT),
December 2010.
- Distributed Private-Key Generators for Identity-Based Cryptography
Aniket Kate and Ian Goldberg
7th Conference on Security and Cryptography for Networks (SCN), September 2010.
-
Practical Robust Communication in DHTs Tolerating a Byzantine Adversary
Maxwell Young, Aniket Kate, Ian Goldberg and Martin Karsten
30th International Conference on Distributed Computing Systems (ICDCS), June 2010.
-
Using Sphinx to Improve Onion Routing Circuit Construction
Aniket Kate and Ian Goldberg
14th International Conference on Financial Cryptography and Data Security (FC), January 2010.
- Distributed Key Generation for the Internet
Aniket Kate and Ian Goldberg
29th International Conference on Distributed Computing Systems (ICDCS), June 2009.
Employed by several distributed cryptosystems such as Helium and
POA Network along others.
- Anonymity and Security in Delay Tolerant Networks
Aniket Kate, Gregory M. Zaverucha, and Urs Hengartner
3rd International Conference on Security and Privacy in Communication Networks (SecureComm),
Sept 2007.
- Pairing-Based Onion Routing
Aniket Kate, Gregory M. Zaverucha, and Ian Goldberg
7th Privacy Enhancing Technologies Symposium (PET), June 2007.
|