About Me

I am a Post Doctoral scholar at UCLA since April 2018, working under Prof. Suhas Diggavi. Before that I was a short-term Post Doctoral fellow at IIT Bombay for about six months, advised by Prof. Manoj M. Prabhakaran. I finished my M.Sc. and Ph.D. in the computer science dept. at TIFR Mumbai in August 2017, under the guidance of Prof. Vinod M. Prabhakaran. I graduated from IIIT Hyderabad with a B.Tech. in computer science and engineering in July 2011.

I was a recipient of Microsoft Research India PhD Fellowship 2014, and my Ph.D. research work was supported by this fellowship until the end of my Ph.D. tenure.

I was a visiting fellow at the Fact Center in IDC Herzliya, Israel, from November 2015 to May 2016, hosted by Prof. Alon Rosen. I mainly worked with Prof. Elette Boyle during that time.

Publications

Preprints

  1. Must the Communication Graph of MPC Protocols be an Expander?
    Authors: Elette Boyle, Ran Cohen, Deepesh Data, and Pavel Hubacek
    CRYPTO, August 19-23, 2018, Santa Barbara, California, USA.

Published Papers

  1. Towards Characterizing Securely Computable Two-Party Randomized Functions
    Authors: Deepesh Data and Manoj M. Prabhakaran
    Public Key Cryptography (PKC), March 25-29, 2018, Rio De Janeiro, Brazil.
    (Springer, ePrint)

  2. Secure Computation of Randomized Functions: Further Results
    Authors: Deepesh Data and Vinod M. Prabhakaran
    IEEE Information Theory Workshop (ITW), November 06-10, 2017, Kaohsiung, Taiwan.
    (IEEEXplore, arXiv)

  3. Secure Computation of Randomized Functions
    Author: Deepesh Data
    IEEE International Symposium on Information Theory (ISIT), July 10-15, 2016, Barcelona, Spain.
    (IEEEXplore, arXiv)

  4. Communication and Randomness Lower Bounds for Secure Computation
    Authros: Deepesh Data, Vinod M. Prabhakaran, and Manoj M. Prabhakaran
    IEEE Transactions of Information Theory, vol. 62, no. 7, pp. 3901-3929, July-2016
    (IEEEXplore, arXiv)

  5. On Coding for Secure Computing
    Authors: Deepesh Data and Vinod M. Prabhakaran
    IEEE International Symposium on Information Theory (ISIT), June 14-19, 2015, Hong Kong.
    (IEEEXplore, Full version)

  6. How to Securely Compute the Modulo-Two Sum of Binary Sources
    Authors: Deepesh Data, Vinod M. Prabhakaran, Manoj Mishra, and Bikash Kumar Dey
    IEEE Information Theory Workshop (ITW), November 2-5, 2014, Hobart, Tasmania, Australia.
    (IEEEXplore, arXiv)

  7. On the Communication Complexity of Secure Computation
    Authors: Deepesh Data, Vinod M. Prabhakaran, and Manoj M. Prabhakaran
    CRYPTO, August 17-21, 2014, Santa Barbara, California, USA.
    (Springer, Extended arXiv)

  8. Communication Requirements for Secure Computation- Invited Paper
    Authors: Deepesh Data and Vinod M. Prabhakaran
    Allerton Conference on Communication, Control, and Computing, October 2-4, 2013, Monticello, Illinois, USA.
    (IEEEXplore)



Ph.D. Thesis