🔍Research Experience
May 2023 - August 2023 : Aarhus university, Denmark
Topic: "Secure binary and arithmetic conversions" supervised by Prof. Peter Scholl
Design of new practically efficient schemes for binary and arithmetic conversions in secure computation and zero knowledge proof protocols.
March 2023 - April 2023 : Technion - Israel Institute of Technology, Israel
Topic: "Pseudorandom correlation generation" supervised by Prof. Yuval Ishai
New constructions of Pseudo-random Correlation Generators for boosting practical efficiency of secure computation tasks such as lookup table evaluation and private information retrieval.
New protocols for secure sorting and selection via Function Secret Sharing.
May 2022 - Aug 2022 : Google, USA - Research Intern
Topic: "Integrating differential privacy and secure computation for large scale neural network training" supervised by Dr. Mariana Raykova and Karn Seth
Formalized new techniques for efficiently integrating central and local differential privacy inside secure two-party protocols for performing neural network training.
May 2021 - Aug 2021 : Google, USA - Research Intern
Topic: "Privacy Preserving Machine Learning" supervised by Dr. Mariana Raykova and Karn Seth
Design and analysis of new and efficient privacy-preserving machine learning algorithms using secure multiparty computation by leveraging novel cryptographic techniques.
Implementation and benchmarking of the protocol using C++ in Google3 codebase
Jun 2020 - Dec. 2020 : Dept. of Computer Science, UIUC - Research Assistant
Topic: "Two round maliciously secure computation" supervised by Dr. Dakshita Khurana
Deigned a novel maliciously secure MPC protocol which requires only two rounds of interaction between the parties, thus establishing a new state-of-the-art in the field of secure computation
Wrote a full technical paper detailing the protocol and the security analysis. The work has been accepted at TCC 2021 and is available on eprint
Aug. 2019 - May 2020 : Coordinated Science Laboratory, UIUC - Research Assistant
Topic: "Robust and scalable schemes for Secure Multiparty Computation" supervised by Dr. Andrew Miller
Design and analysis of privacy-preserving secure multiparty protocols for applications involving multiple semi-trusted/untrusted parties e.g. Proof of Custody and Bank Clearance (Netting) problem.
Implementation and benchmarking of designed protocol using HoneyBadger MPC and MP-SPDZ toolkit
Dec. 2019 - May. 2020 : Dept. of Computer Science, UIUC - Research Assistant
Topic: "Post Quantum Secure Multiparty Computation in Constant Rounds" supervised by Dr. Dakshita Khurana
Explored non-rewinding based simulation techniques for proving security of protocols against quantum adversaries
Design and analysis of a protocol in which multiple parties can generate unbiased and uniform randomness in a distributed fashion. The protocol is provably secure against a quantum adversary which can potentially corrupt all but one party. Additionally, the protocol only takes a constant number of rounds to complete.
Wrote a full technical paper detailing the protocol and the security analysis. The work has been accepted at Eurocrypt 2021 and is available on eprint
Aug. 2019 - Dec. 2019 : Dept. of Computer Science,UIUC
Topic: "Fair protocols for Secure Multiparty Computation" supervised by Dr. Dakshita Khurana
Explored the characterization of non-binary and asymmetric functionalities which can (and cannot) be computed with fairness in settings without an honest majority.
Construction of provably secure protocols (with fairness) for realizing such functionalities.
Jan. 2018 - May 2018 : Nanyang Technological University, SINGAPORE - Research Intern
Topic: "Secure virtual machine placement for IaaS clouds" supervised by Dr.Ta Nguyen Binh Duong
Designed a new virtual machine placement algorithm which combats side-channel attacks in public IaaS cloud data centers by reducing the probability of an adversary to co-locate their Virtual Machine(VM) with a benign user during initial VM placement.
Performed a theoretical and empirical analysis of the proposed algorithm to evaluate its resource efficiency and security. Results obtained using real-world Microsoft Azure workload dataset indicated that the proposed algorithm provides a significant increase in the cloud's co-location resistance with little compromise in resource utilization, compared to existing approaches.
Aug. 2017 - Nov. 2017 : Birla Institute of Technology and Science Pilani, Goa, INDIA - Undergraduate student
Topic: "Traffic Flow Confidentiality using TOR network" supervised by Dr. Sanjay K. Sahay
Studied the inner working of The Onion Routing (TOR) protocol and the strategy that it uses to reduce the risks associated with traffic analysis attacks.
Investigated into some of the open research problems related to bridge (Tor relays that aren't listed in the main Tor directory) distribution inside the TOR network.
May 2017 - Jul. 2017 : University of Southern California, Los Angeles, USA - Research Intern
Topic: "Virtually Isolated DETER Experimentation" supervised by Dr. Clifford Neuman
Designed and implemented an infrastructure that enables remote isolated OS instances to connect with internal nodes for experiments in the DETER testbed (a cyber security testbed available to researchers worldwide).
The project was used to extend the isolated domain of a DETER experiment to external virtual machines that are virtually isolated and capable of communicating only with the DETER testbed through an IPSec tunnel.
Feb. 2017 - Apr. 2017 : Birla Institute of Technology and Science Pilani, Goa, INDIA - Undergraduate student
Topic: "Clustering in ELM vs TF-IDF feature space" supervised by Dr. Rajendra Kumar Roul
Explored various concepts related to Extreme Learning Machines (ELM) and clustering algorithms.
Performed a comparative analysis of standard clustering algorithms like K-means, Hierarchical Clustering and Fuzzy C-means clustering in ELM and TF-IDF feature space.
May 2016 - Jul. 2016 : Indira Gandhi Centre for Atomic Research, Kalpakkam, INDIA - Research Intern
Topic: "Hierarchical clustering algorithm for online resources" supervised by Mr. E. Soundararajan
Worked on hierarchical single linkage clustering using a 2 stage algorithm (a combination of Prim's and Kruskal's algorithm for minimum spanning trees).
Implemented the complete algorithm and tested it for 50,000 records of unordered books in SIRD Library, IGCAR.
Designed a web-based interface for retrieval of clustered documents.
Last updated