scispace - formally typeset
V

Vladimir Kolesnikov

Researcher at Georgia Institute of Technology

Publications -  195
Citations -  5380

Vladimir Kolesnikov is an academic researcher from Georgia Institute of Technology. The author has contributed to research in topics: Encryption & Key (cryptography). The author has an hindex of 31, co-authored 172 publications receiving 4490 citations. Previous affiliations of Vladimir Kolesnikov include Columbia University & University of Toronto.

Papers
More filters
Book ChapterDOI

Improved Garbled Circuit: Free XOR Gates and Applications

TL;DR: In this one-round protocol, XOR gates are evaluated "for free", which results in the corresponding improvement over the best garbled circuit implementations (e.g. Fairplay) and improves integer addition and equality testing by factor of up to 2.
Proceedings ArticleDOI

Blind Seer: A Scalable Private DBMS

TL;DR: This work addresses a major open problem in private DB: efficient sub linear search for arbitrary Boolean queries, and allows leakage of some search pattern information, but protects the query and data, and provides a high level of privacy for individual terms in the executed search formula.
Book ChapterDOI

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima

TL;DR: This work considers generic Garbled Circuit-based techniques for Secure Function Evaluation (SFE) in the semi-honest model and describes efficient GC constructions for addition, subtraction, multiplication, and comparison functions.
Book

A Pragmatic Introduction to Secure Multi-Party Computation

TL;DR: This monograph provides an introduction to multi-party computation for practitioners interested in building privacy-preserving applications and researchers who want to work in the area and provides a starting point for building applications using MPC and for developing MPC protocols, implementations, tools, and applications.
Proceedings ArticleDOI

Secure two-party computation in sublinear (amortized) time

TL;DR: The approach combines generic secure two-party computation with oblivious RAM (ORAM) protocols and describes an implementation of the resulting protocol, which outperforms off-the-shelf secure-computation protocols for databases containing more than 218 entries.