Aniket Kate's Publications

Back to my Academic Webpage.

Refereed Publications

(For the non-obvious cases, talks given by me are indicated by (Speaker), and papers co-led by me are indicated by (Co-lead).)

2018

  • Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency---Choose Two
    Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, and Aniket Kate
    To appear at 39th IEEE Symposium on Security and Privacy (S&P (Oakland)), 2018.
    IACR Cryptology ePrint Archive: Report 2017/954, Oct 2017.

  • Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions
    Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, and Ian Goldberg
    To appear at Network and Distributed System Security Symposium (NDSS), 2018.
    arXiv [cs.CR] 1709.05748, Sep 2017.

2017

2016

2015

  • Strength in Numbers: Robust Tamper Detection in Crowd Computations ***Best Paper Award***
    Bimal Viswanath, Muhammad Ahmad Bashir, Muhammad Bilal Zafar, Simon Bouget, Saikat Guha, Krishna P. Gummadi, Aniket Kate, and Alan Mislove
    ACM Conference on Online Social Networks (COSN 2015), November 2015.
    A local copy is available.

  • Liar, Liar, Coins on Fire! -- Penalizing Equivocation By Loss of Bitcoins
    Tim Ruffing, Aniket Kate, and Dominique Schroeder
    22nd ACM Conference on Computer and Communications Security (CCS 2015), October 2015.
    A local copy is available.

  • Post-Quantum Forward Secure Onion Routing (Future Anonymity in Today's Budget)
    Satrajit Ghosh and Aniket Kate
    13th International Conference on Applied Cryptography and Network Security (ACNS 2015), June 2015. (Speaker)
    Also appeared at NIST Workshop on Cybersecurity in a Post-Quantum World, Gaithersburg, USA. April 2015.
    Available as IACR Cryptology ePrint Archive 2015/008, January 2015.

  • Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources
    Michael Backes, Aniket Kate, Sebastian Meiser, and Tim Ruffing
    13th International Conference on Applied Cryptography and Network Security (ACNS 2015), June 2015.
    Available as IACR Cryptology ePrint Archive 2013/808, December 2013.

  • Visigoth Fault Tolerance
    Daniel Porto, Joao Leitao, Cheng Li, Allen Clement, Aniket Kate, Flavio Junqueira, and Rodrigo Rodrigues
    European Conference on Computer Systems (EuroSys 2015), February 2015.
    A local copy will be available soon.

  • Privacy Preserving Payments in Credit Networks
    Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, and Kim Pecina
    Network and Distributed System Security Symposium (NDSS 2015), February 2015.
    A local copy is available on the project webpage.

2014

  • Privacy-preserving Data Aggregation with Optimal Utility
    Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, and Ivan Pryvalov
    Annual Computer Security Applications Conference (ACSAC 2014), December 2014.
    An extended abstract appeared at Workshop on Usable and Efficient Secure Multiparty Computation, A satellite event of ESORICS 2014, September 2014
    IACR Cryptology ePrint Archive: Report 2014/482, June 2014.

    Press Coverage: [ScienceDaily] [Wireless Design]

  • (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection
    Michael Backes, Aniket Kate, Sebastian Meiser, and Esfandiar Mohammadi
    21st ACM Conference on Computer and Communications Security (CCS 2014), November 2014.
    IACR Cryptology ePrint Archive: Report 2014/621, August 2014.

  • CoinShuffle: Practical Decrentralized Coin Mixing for Bitcoin
    Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate
    19th European Symposium on Research in Computer Security (ESORICS 2014), September 2014.
    A preliminary version appeared at 6th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2014), July 2014.
    A copy is available on the project webpage.

    Press Coverage: [Deutschlandfunk (German)]

  • Asynchronous MPC with a Strict Honest Majority Using Non-equivocation
    Michael Backes, Fabian Bendun, Ashish Choudhury, and Aniket Kate
    33rd ACM Symposium on Principles of Distributed Computing (PODC 2014), July 2014. (Speaker)
    IACR Cryptology ePrint Archive 2013/745, November 2013.

  • BackRef: Accountability in Anonymous Communication Networks
    Michael Backes, Jeremy Clark, Peter Druschel, Aniket Kate, and Milivoj Simeonovski
    12th International Conference on Applied Cryptography and Network Security (ACNS 2014), June 2014. (Co-lead)
    Available as CoRR arXiv: 1311.3151, November 2013.

2013

  • AnoA: A Framework For Analyzing Anonymous Communication Protocols
    Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, and Esfandiar Mohammadi
    26th IEEE Computer Security Foundations Symposium (CSF 2013), June 2013.
    An extended version available as IACR Cryptology ePrint Archive: Report 2014/087, February 2014.

  • Towards Practical Communication in Byzantine-Resistant DHTs
    Maxwell Young, Aniket Kate, Ian Goldberg, and Martin Karsten
    IEEE/ACM Transactions on Networking (ToN), 21(1): 190-203, 2013. (Co-lead)
    A local copy is available.

  • Asynchronous Computational VSS with Reduced Communication Complexity
    Michael Backes, Amit Datta, and Aniket Kate
    Cryptographers' Track - RSA Conference (CT-RSA 2013), February 2013. (Speaker)
    Available as IACR Cryptology ePrint Archive: Report 2012/619, November 2012.

2012

  • Ace: An Efficient Key-Exchange Protocol for Onion Routing
    Michael Backes, Aniket Kate, and Esfandiar Mohammadi
    11th Workshop on Privacy in the Electronic Society (WPES 2012), October 2012.
    Available as a techreport, August 2012.

  • On the (Limited) Power of Non-Equivocation
    Allen Clement, Flavio Junqueira, Aniket Kate, and Rodrigo Rodrigues.
    31st ACM Symposium on Principles of Distributed Computing (PODC 2012), July 2012. (Speaker)
    A local copy is available.

  • Provably Secure and Practical Onion Routing
    Michael Backes, Ian Goldberg, Aniket Kate, and Esfandiar Mohammadi
    25th IEEE Computer Security Foundations Symposium (CSF 2012), June 2012. (Co-lead)
    Available as IACR Cryptology ePrint Archive: Report 2011/308, June 2011.

  • ObliviAd: Provably Secure and Practical Online Behavioral Advertising
    Michael Backes, Aniket Kate, Matteo Maffei, and Kim Pecina
    33rd IEEE Symposium on Security & Privacy (Oakland 2012), May 2012. (Speaker)
    A local copy is available.

  • Adding Query Privacy to Robust DHTs
    Michael Backes, Ian Goldberg, Aniket Kate, and Tomas Toft
    7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012), May 2012. (Speaker)
    Available as CoRR arXiv: 1107.1072, July 2011.

2011

  • Computational Verifiable Secret Sharing Revisited
    Michael Backes, Aniket Kate and Arpita Patra
    17th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2011), December 2011. (Co-lead)
    Available as IACR Cryptology ePrint Archive: Report 2011/281, May 2011.

  • Generalizing Cryptosystems Based on the Subset Sum Problem
    Aniket Kate and Ian Goldberg
    International Journal of Information Security (IJIS) Vol. 10 (3), Pages 189-199, May 2011. (Speaker)
    Available as CACR Technical Report (CACR 2007-26).

2010 and Before

  • Pairing-Based Onion Routing with Improved Forward Secrecy
    Aniket Kate, Gregory M. Zaverucha, and Ian Goldberg
    ACM Transactions on Information and System Security (TISSec) Vol. 13 Iss. 4 (29), December 2010. (Speaker)
    The construction with asymmetric bilinear pairing appears in my thesis.
    A slightly older version is available as IACR Cryptology ePrint Archive, Report 2008/080.

  • Constant-Size Commitments to Polynomials and Their Applications
    Aniket Kate, Gregory M. Zaverucha and Ian Goldberg
    16th International Conference on the Theory and Application of Cryptology (ASIACRYPT 2010), December 2010.(Speaker)
    An extended version is available as CACR Technical Report (CACR 2010-10).

  • Distributed Private-Key Generators for Identity-Based Cryptography
    Aniket Kate and Ian Goldberg
    7th Conference on Security and Cryptography for Networks (SCN 2010), September 2010. (Speaker)
    An extended version is available as IACR Cryptology ePrint Archive, Report 2009/355.

  • Practical Robust Communication in DHTs Tolerating a Byzantine Adversary
    Maxwell Young, Aniket Kate, Ian Goldberg and Martin Karsten
    30th International Conference on Distributed Computing Systems (ICDCS 2010), June 2010. (Co-lead)
    An extended version is available as CACR Technical Report (CACR 2009-31).

  • Using Sphinx to Improve Onion Routing Circuit Construction (Extended Abstract)
    Aniket Kate and Ian Goldberg
    14th International Conference on Financial Cryptography and Data Security (FC 2010), January 2010. (Speaker)
    The full version is available as CACR Technical Report (CACR 2009-33).

  • Distributed Key Generation for the Internet
    Aniket Kate and Ian Goldberg
    29th International Conference on Distributed Computing Systems (ICDCS 2009), June 2009. (Speaker)
    An extended version is as CACR Technical Report (CACR 2008-25).

  • Anonymity and Security in Delay Tolerant Networks
    Aniket Kate, Gregory M. Zaverucha, and Urs Hengartner
    3rd International Conference on Security and Privacy in Communication Networks (SecureComm 2007), Sept 2007. (Speaker)
    Available as CACR Technical Report (CACR 2007-12).

  • Pairing-Based Onion Routing
    Aniket Kate, Gregory M. Zaverucha, and Ian Goldberg
    7th Privacy Enhancing Technologies Symposium (PET 2007), June 2007. (Speaker)
    An extended version available as CACR Technical Report (CACR 2007-08).

Other Refereed Publications


Techreports and Preprints

  • Encrypting Messages for Incomplete Chains of Certificates
    Sanjit Chatterjee, Deepak Garg, Aniket Kate, and Tobias Theobald
    IACR Cryptology ePrint Archive: Report 2017/777, Aug 2017.

  • Mind Your Credit: Assessing the Health of the Ripple Credit Network
    Pedro Moreno-Sanchez, Navin Modi, Raghuvir Songhela, Aniket Kate, and Sonia Fahmy
    arXiv [cs.CR] 1706.02358, Jun 2017.

  • Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange
    Ivan Pryvalov and Aniket Kate
    IACR Cryptology ePrint Archive: Report 2014/247, April 2014.

  • Distributed Key Generation in the Wild
    Aniket Kate, Yizhou Huang, and Ian Goldberg
    IACR Cryptology ePrint Archive: Report 2012/377, June 2012.

Copyright © 2015-17 Aniket Kate, Purdue University.