Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sarvar Patel is active.

Publication


Featured researches published by Sarvar Patel.


computer and communications security | 2017

Practical Secure Aggregation for Privacy-Preserving Machine Learning

Keith Allen Bonawitz; Vladimir Ivanov; Ben Kreuter; Antonio Marcedone; H. Brendan McMahan; Sarvar Patel; Daniel Ramage; Aaron Segal; Karn Seth

We design a novel, communication-efficient, failure-robust protocol for secure aggregation of high-dimensional data. Our protocol allows a server to compute the sum of large, user-held data vectors from mobile devices in a secure manner (i.e. without learning each users individual contribution), and can be used, for example, in a federated learning setting, to aggregate user-provided model updates for a deep neural network. We prove the security of our protocol in the honest-but-curious and active adversary settings, and show that security is maintained even if an arbitrarily chosen subset of users drop out at any time. We evaluate the efficiency of our protocol and show, by complexity analysis and a concrete implementation, that its runtime and communication overhead remain low even on large data sets and client pools. For 16-bit input values, our protocol offers


european symposium on research in computer security | 2018

Symmetric Searchable Encryption with Sharing and Unsharing.

Sarvar Patel; Giuseppe Persiano; Kevin Yeo

1.73 x communication expansion for 210 users and 220-dimensional vectors, and 1.98 x expansion for 214 users and 224-dimensional vectors over sending data in the clear.


computer and communications security | 2018

Private Stateful Information Retrieval

Sarvar Patel; Giuseppe Persiano; Kevin Yeo

In this paper, we study Symmetric Searchable Encryption (SSE) in a multi-user setting in which each user dynamically shares its documents with selected other users, allowing sharees also to perform searches. We introduce the concept of a Symmetric Searchable Encryption with Sharing and Unsharing, an extension of Multi-Key Searchable Encryption (NSDI ’14), that supports dynamic sharing and unsharing of documents amongst users. We also strengthen the security notion by considering a simulation-based notion that does not restrict sharing between honest and compromised users.


Archive | 2011

Storing encrypted objects

Umesh Shankar; Andrei Kulik; Bodo Möller; Sarvar Patel

Private information retrieval (PIR) is a fundamental tool for preserving query privacy when accessing outsourced data. All previous PIR constructions have significant costs preventing widespread use. In this work, we present private stateful information retrieval (PSIR), an extension of PIR, allowing clients to be stateful and maintain information between multiple queries. Our design of the PSIR primitive maintains three important properties of PIR: multiple clients may simultaneously query without complex concurrency primitives, query privacy should be maintained if the server colludes with other clients, and new clients should be able to enroll into the system by exclusively interacting with the server. We present a PSIR framework that reduces an online query to performing one single-server PIR on a sub-linear number of database records. All other operations beyond the single-server PIR consist of cryptographic hashes or plaintext operations. In practice, the dominating costs of resources occur due to the public-key operations involved with PIR. By reducing the input database to PIR, we are able to limit expensive computation and avoid transmitting large ciphertexts. We show that various instantiations of PSIR reduce server CPU by up to 10x and online network costs by up to 10x over the previous best PIR construction.


arXiv: Cryptography and Security | 2016

Practical Secure Aggregation for Federated Learning on User-Held Data

Keith Allen Bonawitz; Vladimir Ivanov; Ben Kreuter; Antonio Marcedone; H. Brendan McMahan; Sarvar Patel; Daniel Ramage; Aaron Segal; Karn Seth


applied cryptography and network security | 2012

Contextual OTP: mitigating emerging man-in-the-middle attacks with wireless hardware tokens

Assaf Ben-David; Omer Berkman; Yossi Matias; Sarvar Patel; Cem Paya; Moti Yung


Archive | 2015

Mixing secure and insecure data and operations at server database

Marcel M.M. Yung; Sarvar Patel; Binyamin Pinkas


Archive | 2014

SYSTEMS AND METHODS FOR FASTER PUBLIC KEY ENCRYPTION USING THE ASSOCIATED PRIVATE KEY PORTION

Marcel M.M. Yung; Sarvar Patel


foundations of computer science | 2018

PanORAMa: Oblivious RAM with Logarithmic Overhead

Sarvar Patel; Giuseppe Persiano; Mariana Raykova; Kevin Yeo


Archive | 2016

ENCRYPTED AGGREGATED TRANSACTION DATA EXCHANGE WITH TRANSACTION DATA PROVIDER

Shobhit Saxena; David Owen Shanahan; Marcel M.M. Yung; Sarvar Patel

Collaboration


Dive into the Sarvar Patel's collaboration.

Researchain Logo
Decentralizing Knowledge