M
Muthuramakrishnan Venkitasubramaniam
Researcher at University of Rochester
Publications - 79
Citations - 7988
Muthuramakrishnan Venkitasubramaniam is an academic researcher from University of Rochester. The author has contributed to research in topics: Secure multi-party computation & Secure two-party computation. The author has an hindex of 20, co-authored 70 publications receiving 7100 citations. Previous affiliations of Muthuramakrishnan Venkitasubramaniam include Cornell University.
Papers
More filters
Journal ArticleDOI
L-diversity: Privacy beyond k-anonymity
TL;DR: This paper shows with two simple attacks that a \kappa-anonymized dataset has some subtle, but severe privacy problems, and proposes a novel and powerful privacy definition called \ell-diversity, which is practical and can be implemented efficiently.
Proceedings ArticleDOI
L-diversity: privacy beyond k-anonymity
TL;DR: This paper shows with two simple attacks that a \kappa-anonymized dataset has some subtle, but severe privacy problems, and proposes a novel and powerful privacy definition called \ell-diversity, which is practical and can be implemented efficiently.
Proceedings ArticleDOI
Ligero: Lightweight Sublinear Arguments Without a Trusted Setup
TL;DR: A simple zero-knowledge argument protocol for NP whose communication complexity is proportional to the square-root of the verification circuit size, which is attractive not only for very large verification circuits but also for moderately large circuits that arise in applications.
Book ChapterDOI
Concurrent non-malleable commitments from any one-way function
TL;DR: The proof of security only requires the use of black-box techniques, and additionally provides an arguably simplified proof of the existence of even stand-alone secure non-malleable commitments.
Proceedings ArticleDOI
A unified framework for concurrent security: universal composability from stand-alone non-malleability
TL;DR: A unified framework for obtaining Universally Composable (UC) protocols by relying on stand-alone secure non-malleable commitments and shows that UC security where the adversary is a uniform PPT but the simulator is allowed to be a non-uniform PPT is possible without any trusted set-up.