Personal information

No personal information available

Activities

Employment (2)

George Washington University: Washington D.C., District of Columbia, US

2018-08-01 to present | Assistant Professor (Computer Science)
Employment
Source: Self-asserted source
Arkady Yerukhimovich

MIT Lincoln Laboratory: Lexington, Massachusetts, US

2011-10-01 to 2018-07-31 | Research scientist
Employment
Source: Self-asserted source
Arkady Yerukhimovich

Education and qualifications (2)

University of Maryland, College Park: College Park, Maryland, US

2004-09-01 to 2011-08-31 | PhD (Computer Science)
Education
Source: Self-asserted source
Arkady Yerukhimovich

Brown University: RI, RI, US

1999-09-01 to 2003-05-31 | BS (Computer Science)
Education
Source: Self-asserted source
Arkady Yerukhimovich

Works (39)

On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash

IACR Communications in Cryptology
2025-01-13 | Journal article
Contributors: Mingyu Liang; Seung Choi; Dana Dachman-Soled; Linsheng Liu; Arkady Yerukhimovich
Source: check_circle
Crossref

TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things

IEEE Transactions on Mobile Computing
2024-05 | Journal article
Contributors: Chunchi Liu; Minghui Xu; Hechuan Guo; Xiuzhen Cheng; Yinhao Xiao; Dongxiao Yu; Bei Gong; Arkady Yerukhimovich; Shengling Wang; Weifeng Lyu
Source: check_circle
Crossref

Secure Sampling with Sublinear Communication

2022 | Book chapter
Contributors: Seung Geol Choi; Dana Dachman-Soled; S. Dov Gordon; Linsheng Liu; Arkady Yerukhimovich
Source: check_circle
Crossref

The More The Merrier: Reducing the Cost of Large Scale MPC.

IACR Cryptol. ePrint Arch.
2021 | Preprint
Source: Self-asserted source
Arkady Yerukhimovich

The More The Merrier: Reducing the Cost of Large Scale MPC

Eurocrypt
2021-10 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Differentially-private multi-party sketching for large-scale statistics

Proceedings on Privacy Enhancing Technologies
2020 | Journal article
Source: Self-asserted source
Arkady Yerukhimovich

Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things

arXiv preprint arXiv:2011.04919
2020 | Preprint
Source: Self-asserted source
Arkady Yerukhimovich

Blockchain technology: what is it good for?

Communications of the ACM
2019 | Journal article
Source: Self-asserted source
Arkady Yerukhimovich

Blockchain Technology: What Is It Good for? Industry’s dreams and fears for this new technology

ACM Queue
2019 | Journal article
Source: Self-asserted source
Arkady Yerukhimovich

Location leakage from network access patterns

2019 IEEE Conference on Communications and Network Security (CNS)
2019 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

SoK: Blockchain technology and its potential use cases

arXiv preprint arXiv:1909.12454
2019 | Preprint
Source: Self-asserted source
Arkady Yerukhimovich

Stormy: Statistics in tor by measuring securely

Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
2019 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns

arXiv preprint arXiv:1807.02719
2018 | Preprint
Source: Self-asserted source
Arkady Yerukhimovich

Bounded-collusion attribute-based encryption from minimal assumptions

IACR International Workshop on Public Key Cryptography
2017 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Sok: Cryptographically protected database search

2017 IEEE Symposium on Security and Privacy (SP)
2017 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Can Smartphones and Privacy Coexist Assessing Technologies and Regulations Protecting Personal Data on Android and IOS Devices

2016 | Report
Source: Self-asserted source
Arkady Yerukhimovich

CompGC: Efficient Offline/Online Semi-honest Two-party Computation.

IACR Cryptol. ePrint Arch.
2016 | Preprint
Source: Self-asserted source
Arkady Yerukhimovich

Cryptography for big data security

Big data: storage, sharing, and security
2016 | Book chapter
Source: Self-asserted source
Arkady Yerukhimovich

POPE: Partial order preserving encoding

Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
2016 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Secure multiparty computation for cooperative cyber risk assessment

2016 IEEE Cybersecurity Development (SecDev)
2016 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

SoK: Privacy on mobile devices--it’s complicated

Proceedings on Privacy Enhancing Technologies
2016 | Journal article
Source: Self-asserted source
Arkady Yerukhimovich

A General framework for one database private information retrieval

Online at http://www. cs. umd. edu/Grad/scholarlypapers/papers/Arkady-pircomp. pdf
2015 | Preprint
Source: Self-asserted source
Arkady Yerukhimovich

Computing on masked data to improve the security of big data

2015 IEEE International Symposium on Technologies for Homeland Security (HST)
2015 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Improving the veracity of homeland security big data through computing on masked data

2015 IEEE International Symposium on Technologies for Homeland Security, Waltham, Mass
2015 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Secure and resilient cloud computing for the department of defense

2015 | Report
Source: Self-asserted source
Arkady Yerukhimovich

Security and privacy assurance research (spar) pilot final report

2015 | Report
Source: Self-asserted source
Arkady Yerukhimovich

(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens

Theory of Cryptography Conference
2014 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

A survey of cryptographic approaches to securing big-data analytics in the cloud

2014 IEEE High Performance Extreme Computing Conference (HPEC)
2014 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Computing on masked data: a high performance method for improving big data veracity

2014 IEEE High Performance Extreme Computing Conference (HPEC)
2014 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Impossibility of blind signatures from one-way permutations

Theory of Cryptography Conference
2011 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Limits of computational differential privacy in the client/server setting

Theory of Cryptography Conference
2011 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Limits on the power of zero-knowledge proofs in cryptographic constructions

Theory of Cryptography Conference
2011 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Authenticated broadcast with a partially compromised public-key infrastructure

Symposium on Self-Stabilizing Systems
2010 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

On the round complexity of zero-knowledge proofs based on one-way permutations

International Conference on Cryptology and Information Security in Latin America
2010 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

On black-box constructions of predicate encryption from trapdoor permutations

International Conference on the Theory and Application of Cryptology and Information Security
2009 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Frequency Independent Flexible Spherical Beamforming Via Rbf Fitting

2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings
2006 | Conference paper
Source: Self-asserted source
Arkady Yerukhimovich

Efficient data storage in large nanoarrays

Theory of Computing Systems
2005 | Journal article
Source: Self-asserted source
Arkady Yerukhimovich

A study of separation in cryptography: New results and new models, 2011

Dissertation or Thesis
Source: Self-asserted source
Arkady Yerukhimovich

Computational inexpensive PIR, 2006

Draft available online at http://www. cs. umd. edu/~ arkady/pir/pirComp. pdf
Preprint
Source: Self-asserted source
Arkady Yerukhimovich