Sanjam Garg

From MaRDI portal
Revision as of 09:43, 24 September 2023 by Import230924090903 (talk | contribs) (Created automatically from import230924090903)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:775968

Available identifiers

zbMath Open garg.sanjamMaRDI QIDQ775968

List of research outcomes





PublicationDate of PublicationType
How to prove statements obliviously?2025-01-10Paper
Threshold encryption with silent setup2024-12-13Paper
Scalable multiparty computation from non-linear secret sharing2024-12-13Paper
Laconic branching programs from the Diffie-Hellman assumption2024-11-12Paper
Factoring and pairings are not necessary for iO: circular-secure LWE suffices2024-06-24Paper
Correlation intractability and SNARGs from sub-exponential DDH2024-02-06Paper
Cryptography with weights: MPC, encryption and signatures2024-02-02Paper
End-to-end secure messaging with traceability only for illegal content2023-12-08Paper
Credibility in private set membership2023-11-16Paper
IBE with incompressible master secret and small identity secrets2023-08-14Paper
On the worst-case inefficiency of CGKA2023-08-14Paper
Candidate iO from homomorphic encryption schemes2023-07-26Paper
A more complete analysis of the signal double ratchet algorithm2023-06-12Paper
How to build a trapdoor function from an encryption scheme2023-05-12Paper
Two-round Multiparty Secure Computation from Minimal Assumptions2023-04-27Paper
Laconic private set intersection and applications2023-04-13Paper
Amortizing rate-1 OT and applications to PIR and PSI2023-04-13Paper
Ad Hoc Multi-Input Functional Encryption.2023-02-03Paper
https://portal.mardi4nfdi.de/entity/Q58757782023-02-03Paper
Tight verifiable delay functions2022-12-16Paper
Black-box constructions of bounded-concurrent secure computation2022-12-16Paper
Identity-based Encryption from the Diffie-Hellman Assumption2022-12-08Paper
Master-Key KDM-Secure IBE from Pairings2022-10-13Paper
Reusable Two-Round MPC from LPN2022-07-08Paper
Compact ring signatures from learning with errors2022-03-31Paper
Formalizing data deletion in the context of the right to be forgotten2022-03-23Paper
Two-round oblivious transfer from CDH or LPN2022-03-23Paper
Reusable two-round MPC from DDH2022-03-23Paper
Candidate iO from homomorphic encryption schemes2021-12-01Paper
Constant ciphertext-rate non-committing encryption from standard assumptions2021-12-01Paper
Efficient range-trapdoor functions and applications: rate-1 OT and more2021-12-01Paper
FHE-based bootstrapping of designated-prover NIZK2021-12-01Paper
Two-round multiparty secure computation minimizing public key operations2020-06-30Paper
Limits on the power of garbling techniques for public-key encryption2020-06-30Paper
Adaptive garbled RAM from laconic oblivious transfer2020-06-30Paper
On the round complexity of OT extension2020-06-30Paper
Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH132020-05-27Paper
The broadcast message complexity of secure multiparty computation2020-05-20Paper
Rate-1 trapdoor functions from the Diffie-Hellman problem2020-05-11Paper
Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles2020-04-30Paper
Trapdoor hash functions and their applications2020-03-09Paper
New techniques for efficient trapdoor functions and applications2020-02-04Paper
Registration-based encryption from standard assumptions2020-01-28Paper
Obfuscation from low noise multilinear maps2019-03-29Paper
Two-round MPC: information-theoretic and black-box2018-12-11Paper
Registration-based encryption: removing private-key generator from IBE2018-12-11Paper
A simple construction of iO for Turing machines2018-12-06Paper
Trapdoor functions from the computational Diffie-Hellman assumption2018-09-26Paper
Two-round multiparty secure computation from minimal assumptions2018-07-09Paper
Adaptively secure garbling with near optimal online complexity2018-07-09Paper
A new approach to black-box concurrent secure computation2018-07-09Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings2018-07-04Paper
New constructions of identity-based and key-dependent message secure encryption schemes2018-05-16Paper
Two-message witness indistinguishability and secure computation in the plain model from new assumptions2018-02-23Paper
When does functional encryption imply obfuscation?2018-01-19Paper
From selective IBE to full IBE and selective HIBE2018-01-19Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input2018-01-05Paper
Laconic oblivious transfer and its applications2017-11-15Paper
Incremental program obfuscation2017-11-15Paper
Identity-based encryption from the Diffie-Hellman assumption2017-11-03Paper
Lower bounds on obfuscation from all-or-nothing encryption primitives2017-11-03Paper
Breaking the Sub-Exponential Barrier in Obfustopia2017-06-23Paper
On the Exact Round Complexity of Self-composable Two-Party Computation2017-06-13Paper
Secure Obfuscation in a Weak Multilinear Map Model2016-12-22Paper
Single-Key to Multi-Key Functional Encryption with Polynomial Loss2016-12-22Paper
Secure Multiparty RAM Computation in Constant Rounds2016-12-21Paper
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption2016-11-09Paper
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium2016-10-27Paper
The Exact Round Complexity of Secure Computation2016-07-15Paper
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits2016-07-04Paper
Functional Encryption Without Obfuscation2016-04-08Paper
Cryptography with One-Way Communication2015-12-10Paper
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions2015-09-10Paper
Succinct Randomized Encodings and their Applications2015-08-21Paper
Garbled RAM From One-Way Functions2015-08-21Paper
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation2015-07-06Paper
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input2014-08-07Paper
Witness encryption and its applications2014-08-07Paper
Protecting Obfuscation against Algebraic Attacks2014-05-27Paper
Efficient Round Optimal Blind Signatures2014-05-27Paper
Cross-Domain Secure Computation2014-03-25Paper
Two-Round Secure MPC from Indistinguishability Obfuscation2014-02-18Paper
Attribute-Based Encryption for Circuits from Multilinear Maps2013-09-17Paper
Secure Computation against Adaptive Auxiliary Information2013-09-02Paper
Candidate Multilinear Maps from Ideal Lattices2013-05-31Paper
Why “Fiat-Shamir for Proofs” Lacks a Proof2013-03-18Paper
Adaptively Secure Multi-Party Computation with Dishonest Majority2012-09-25Paper
Impossibility Results for Static Input Secure Computation2012-09-25Paper
Concurrently Secure Computation in Constant Rounds2012-06-29Paper
Resettable Statistical Zero Knowledge2012-06-15Paper
Leakage-Resilient Zero Knowledge2011-08-12Paper
Round Optimal Blind Signatures2011-08-12Paper
Bringing People of Different Beliefs Together to Do UC2011-05-19Paper
Improved Bounds on Security Reductions for Discrete Log Based Signatures2009-02-10Paper

Research outcomes over time

This page was built for person: Sanjam Garg