Ittai Abraham Microsoft Research Paper

On By In 1
The system can't perform the operation now. Try again later.
This "Cited by" count includes citations to the following articles in Scholar. The ones marked * may be different from the article in the profile.
Get my own profile


  • Andrew V. GoldbergSenior Principal Scientist,, Inc.Verified email at
  • Ofer NeimanBen Gurion UniversityVerified email at
  • Cyril GavoilleProfesseur d'informatique, Université de BordeauxVerified email at
  • Danny DolevProfessor of Computer Science, The Hebrew UniversityVerified email at
  • Joseph HalpernProfessor of Computer Science, Cornell UniversityVerified email at
  • Shiri ChechikProfessor of Computer Science, Tel-Aviv UniversityVerified email at
  • Amos FiatProfessor of Computer Science, Tel Aviv UniversityVerified email at
  • Gregory ChocklerReader in Computer Science, Royal Holloway, University of LondonVerified email at
  • Kartik NayakUniversity Of Maryland, College ParkVerified email at
  • Udi WiederVMware ResearchVerified email at
  • Anupam GuptaProfessor of Computer Science, Carnegie Mellon UniversityVerified email at
  • Ling RenGraduate Student, Massachusetts Institute of TechnologyVerified email at
  • Noam NisanProfessor of Computer Science, Hebrew University of JerusalemVerified email at
  • Fabian KuhnProfessor of Computer Science, University of FreiburgVerified email at
Verified email at

Research Interests

I work in the area of security and applied cryptography. My research is directed towards designing and building systems for privacy-preserving computation using approaches such as secure multiparty computation and secure processor design. I have also worked towards efficient oblivious computation which provides a foundation for these, and other related systems. Specifically, I have worked to improve the I/O efficiency (bandwidth, locality, etc.) of oblivious computation for general RAM programs as well as specific data-structures and algorithms.

In the past year, I have started working towards the design of efficient and robust blockchains. My work has identified problems in existing blockchains such as Bitcoin as well as designed blockchains in both, permissioned and permissionless settings.

Manuscripts and Publications

(* denotes author names in alphabetical order)

Oblivious Computation With Data Locality *
Gilad Asharov, T-H. Hubert Chan, Kartik Nayak, Rafael Pass, Ling Ren and Elaine Shi

Efficient Synchronous Byzantine Consensus *
Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren

Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus *
Published in Principles of Distributed Systems (OPODIS), 2017
Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Alexander Spiegelman

Asymptotically Tight Bounds for Composing ORAM with PIR *
Published in Public Key Cryptography (PKC), 2017
Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren

HOP: Hardware makes Obfuscation Practical
Paper | Code | Slides | Videos
Published in Network and Distributed System Security (NDSS), 2017
Kartik Nayak, Christopher W. Fletcher, Ling Ren, Nishanth Chandran, Satya Lokam, Elaine Shi, Vipul Goyal

Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
Paper | Code | Slides
Published in IEEE European Symposium on Security and Privacy (Euro S&P), 2016
Kartik Nayak, Srijan Kumar, Andrew Miller, Elaine Shi

GraphSC: Parallel Secure Computation Made Easy
Paper | Code | Slides | Video
Published in IEEE Symposium on Security and Privacy (S&P), 2015
Kartik Nayak, Xiao Shaun Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine Shi

ObliVM: A Programming Framework for Secure Computation
Paper | Code
Published in IEEE Symposium on Security and Privacy (S&P), 2015
1st place in NYU-Poly CSAW Applied Security Research Best Paper Competition
Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, Elaine Shi

Oblivious Data Structures
Paper | Slides
Published in ACM Conference on Computer and Communications Security (CCS), 2014
Finalist in NYU-Poly CSAW Applied Security Research Best Paper Competition
Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang

An Oblivious Parallel RAM with Parallel Runtime Blowup
Kartik Nayak, Jonathan Katz

Some Vulnerabilities are Different than Others: Studying Vulnerabilities and Attack Surfaces in the Wild
Paper | Announcement | Slides | Video
Published in Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2014
Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras

Helping Johnny Encrypt: Toward Semantic Interfaces for Cryptography Frameworks
Published in Onward! 2016
Soumya Indela, Mukul Kulkarni, Kartik Nayak, Tudor Dumitras


  • 5th year Ph.D. student, Computer Science, University Of Maryland, College Park, September 2013 - present

  • M.S., Computer Science, University Of Maryland, College Park, September 2013 - December 2016

  • B.Tech., Computer Science, Veermata Jijabai Technological Institute, Mumbai, July 2007 - May 2011

Work Experience

Microsoft Research, Cambridge, UK, June - August 2017
Worked on scalable and confidential blockchains (COCO)
Mentors: Manuel Costa, Olya Ohrimenko

VMware Research, Palo Alto, June - August 2016
Worked on blockchains and Oblivious RAMs
Mentors: Ittai Abraham, Dahlia Malkhi, Benny Pinkas

Microsoft Research, Bangalore, India, June - August 2015
Worked towards designing a secure processor to achieve VBB obfuscation of RAM programs
Mentors: Vipul Goyal, Satya Lokam, Nishanth Chandran

Technicolor Research, Los Altos, June - August 2014
Worked towards parallel secure computation frame work for graph parallel algorithms
Mentors: Stratis Ioannidis, Udi Weinsberg, Nina Taft

Google India, Bangalore, July 2011 - June 2013
Worked towards reducing spam from Google Apps for business

Microsoft IDC, Hyderabad, May - July 2010
Worked towards designing a Bluetooth clicker for a powerpoint presentation using Bluetooth HID profile on Windows 6.5 mobile phones


Leave a Reply

Your email address will not be published. Required fields are marked *