Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Credential Transparency System

    A major component of the entire digital identity ecosystem are verifiable credentials. However, for users to have complete control and privacy of their digital credentials, they need to be able to store and ma...

    Melissa Chase, Georg Fuchsbauer, Esha Ghosh in Security and Cryptography for Networks (2022)

  2. No Access

    Chapter and Conference Paper

    Rotatable Zero Knowledge Sets

    Key Transparency (KT) systems allow end-to-end encrypted service providers (messaging, calls, etc.) to maintain an auditable directory of their users’ public keys, producing proofs that all participants have a co...

    Brian Chen, Yevgeniy Dodis, Esha Ghosh in Advances in Cryptology – ASIACRYPT 2022 (2022)

  3. Chapter and Conference Paper

    Secret-Shared Shuffle

    Generating additive secret shares of a shuffled dataset - such that neither party knows the order in which it is permuted - is a fundamental building block in many protocols, such as secure collaborative filterin...

    Melissa Chase, Esha Ghosh, Oxana Poburinnaya in Advances in Cryptology – ASIACRYPT 2020 (2020)

  4. No Access

    Chapter and Conference Paper

    Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees

    We propose a three-party model for maintaining a dynamic data structure that supports verifiable and privacy-preserving (zero-knowledge) queries. We give efficient constructions supporting this model for order...

    Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko in Security and Cryptography for Networks (2016)

  5. Chapter and Conference Paper

    Zero-Knowledge Authenticated Order Queries and Order Statistics on a List

    An order query takes as input a set of elements from a list (ordered sequence) \(\mathcal {L}\) , and asks for this se...

    Esha Ghosh, Olga Ohrimenko, Roberto Tamassia in Applied Cryptography and Network Security (2015)