Skip to main content

Showing 1–6 of 6 results for author: Chandramouli, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2208.06223  [pdf, ps, other

    cs.CR cs.DC cs.IT

    Perfectly Secure Synchronous MPC with Asynchronous Fallback Guarantees Against General Adversaries

    Authors: Ananya Appan, Anirudh Chandramouli, Ashish Choudhury

    Abstract: In this work, we study perfectly-secure multi-party computation (MPC) against general (non-threshold) adversaries. Known protocols in a synchronous network are secure against $Q^{(3)}$ adversary structures, while in an asynchronous network, known protocols are secure against $Q^{(4)}$ adversary structures. A natural question is whether there exists a single protocol which remains secure against… ▽ More

    Submitted 12 August, 2022; originally announced August 2022.

    Comments: 56 pages, 11 figures. arXiv admin note: text overlap with arXiv:2201.12194

  2. arXiv:2205.13169  [pdf, ps, other

    cs.CR

    Revisiting the Efficiency of Asynchronous Multi Party Computation Against General Adversaries

    Authors: Ananya Appan, Anirudh Chandramouli, Ashish Choudhury

    Abstract: In this paper, we design secure multi-party computation (MPC) protocols in the asynchronous communication setting with optimal resilience. Our protocols are secure against a computationally-unbounded malicious adversary, characterized by an adversary structure $\mathcal{Z}$, which enumerates all possible subsets of potentially corrupt parties. Our protocols incur a communication of… ▽ More

    Submitted 26 May, 2022; originally announced May 2022.

  3. arXiv:2205.06257  [pdf, ps, other

    cs.IT cs.DC

    Coded Data Rebalancing for Distributed Data Storage Systems with Cyclic Storage

    Authors: Athreya Chandramouli, Abhinav Vaishya, Prasad Krishnan

    Abstract: We consider replication-based distributed storage systems in which each node stores the same quantum of data and each data bit stored has the same replication factor across the nodes. Such systems are referred to as balanced distributed databases. When existing nodes leave or new nodes are added to this system, the balanced nature of the database is lost, either due to the reduction in the replica… ▽ More

    Submitted 13 June, 2022; v1 submitted 12 May, 2022; originally announced May 2022.

    Comments: 27 pages

  4. arXiv:2201.12194  [pdf, ps, other

    cs.CR cs.DC cs.IT

    Perfectly-Secure Synchronous MPC with Asynchronous Fallback Guarantees

    Authors: Ananya Appan, Anirudh Chandramouli, Ashish Choudhury

    Abstract: Secure multi-party computation (MPC) is a fundamental problem in secure distributed computing. An MPC protocol allows a set of $n$ mutually distrusting parties to carry out any joint computation of their private inputs, without disclosing any additional information about their inputs. MPC with information-theoretic security provides the strongest security guarantees and remains secure even against… ▽ More

    Submitted 9 August, 2022; v1 submitted 28 January, 2022; originally announced January 2022.

    Comments: 62 pages, 18 figures, Full version of the article published in ACM PODC 2022

  5. arXiv:2112.11393  [pdf, ps, other

    cs.CR cs.DC cs.IT

    A Survey on Perfectly-Secure Verifiable Secret-Sharing

    Authors: Anirudh Chandramouli, Ashish Choudhury, Arpita Patra

    Abstract: Verifiable Secret-Sharing (VSS) is a fundamental primitive in secure distributed computing. It is used as a building block in several distributed computing tasks, such as Byzantine agreement and secure multi-party computation. In this article, we consider VSS schemes with perfect security, tolerating computationally unbounded adversaries. We comprehensively survey the existing perfectly-secure VSS… ▽ More

    Submitted 4 February, 2022; v1 submitted 21 December, 2021; originally announced December 2021.

    Comments: 38 pages, 17 figures

  6. arXiv:2110.00949  [pdf

    cs.IR

    Unsupervised paradigm for information extraction from transcripts using BERT

    Authors: Aravind Chandramouli, Siddharth Shukla, Neeti Nair, Shiven Purohit, Shubham Pandey, Murali Mohana Krishna Dandu

    Abstract: Audio call transcripts are one of the valuable sources of information for multiple downstream use cases such as understanding the voice of the customer and analyzing agent performance. However, these transcripts are noisy in nature and in an industry setting, getting tagged ground truth data is a challenge. In this paper, we present a solution implemented in the industry using BERT Language Models… ▽ More

    Submitted 9 October, 2021; v1 submitted 3 October, 2021; originally announced October 2021.

    Journal ref: ECML PKDD 2021