2024

  1. Kelong Cong, Debajyoti Das, Georgio Nicolas, Jeongeun Park:
    Panacea: Non-interactive and Stateless Oblivious-RAM.
    IEEE European Symposium on Security and Privacy (IEEE Euro S&P 2024).

  2. Debajyoti Das, Claudia Diaz, Aggelos Kiayias, Thomas Zacharias:
    Are continuous stop-and-go mixnets provably secure?.
    22nd Privacy Enhancing Technologies Symposium (PETS 2024).

  3. Iness Ben Guirat, Debajyoti Das, Claudia Diaz:
    Blending Different Latency Traffic With Beta Mixing.
    22nd Privacy Enhancing Technologies Symposium (PETS 2024).

  4. Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
    Divide and Funnel: A Scaling Technique for Mix-networks.
    37th IEEE Computer Security Foundations Symposium (CSF 2024).

  5. 2022

  6. Kelong Cong, Debajyoti Das, Jeongeun Park, Hilder V. L. Pereira:
    SortingHat: efficient private decision tree evaluation via homomorphic encryption and transciphering.
    Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS 2022).

  7. Debajyoti Das*, Easwar Vivek Mangipudi*, Aniket Kate:
    OrgAn: Organizational Anonymity with Low Latency.
    22nd Privacy Enhancing Technologies Symposium (PETS 2022).
    talk

  8. 2016-2021

  9. Mic Bowman, Debajyoti Das, Avradip Mandal, Hart Montgomery:
    On Elapsed Time Consensus Protocols.
    22nd International Conference on Cryptology in India (Indocrypt 2021).

  10. Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
    Comprehensive Anonymity Trilemma: User Coordination is not enough.
    20th Privacy Enhancing Technologies Symposium (PETS 2020).
    talk

  11. Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
    Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency – Choose Two.
    39th IEEE Symposium on Security and Privacy (IEEE S&P 2018).
    talk

  12. David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, and Alan T. Sherman:
    cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations.
    15th International Conference on Applied Cryptography and Network Security (ACNS 2017).
    eprint