scispace - formally typeset
M

Muthuramakrishnan Venkitasubramaniam

Researcher at University of Rochester

Publications -  79
Citations -  7988

Muthuramakrishnan Venkitasubramaniam is an academic researcher from University of Rochester. The author has contributed to research in topics: Secure multi-party computation & Secure two-party computation. The author has an hindex of 20, co-authored 70 publications receiving 7100 citations. Previous affiliations of Muthuramakrishnan Venkitasubramaniam include Cornell University.

Papers
More filters
Journal ArticleDOI

L-diversity: Privacy beyond k-anonymity

TL;DR: This paper shows with two simple attacks that a \kappa-anonymized dataset has some subtle, but severe privacy problems, and proposes a novel and powerful privacy definition called \ell-diversity, which is practical and can be implemented efficiently.
Proceedings ArticleDOI

L-diversity: privacy beyond k-anonymity

TL;DR: This paper shows with two simple attacks that a \kappa-anonymized dataset has some subtle, but severe privacy problems, and proposes a novel and powerful privacy definition called \ell-diversity, which is practical and can be implemented efficiently.
Proceedings ArticleDOI

Ligero: Lightweight Sublinear Arguments Without a Trusted Setup

TL;DR: A simple zero-knowledge argument protocol for NP whose communication complexity is proportional to the square-root of the verification circuit size, which is attractive not only for very large verification circuits but also for moderately large circuits that arise in applications.
Book ChapterDOI

Concurrent non-malleable commitments from any one-way function

TL;DR: The proof of security only requires the use of black-box techniques, and additionally provides an arguably simplified proof of the existence of even stand-alone secure non-malleable commitments.
Proceedings ArticleDOI

A unified framework for concurrent security: universal composability from stand-alone non-malleability

TL;DR: A unified framework for obtaining Universally Composable (UC) protocols by relying on stand-alone secure non-malleable commitments and shows that UC security where the adversary is a uniform PPT but the simulator is allowed to be a non-uniform PPT is possible without any trusted set-up.