Vinod Vaikuntanathan

From MaRDI portal
Revision as of 11:01, 6 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:380961

Available identifiers

zbMath Open vaikuntanathan.vinodDBLPv/VinodVaikuntanathanWikidataQ28002635 ScholiaQ28002635MaRDI QIDQ380961

List of research outcomes

PublicationDate of PublicationType
Lattice problems beyond polynomial time2024-05-08Paper
Boosting batch arguments and RAM delegation2024-05-08Paper
Succinct computational secret sharing2024-05-08Paper
Quantum advantage from any non-local game2024-05-08Paper
https://portal.mardi4nfdi.de/entity/Q61262542024-04-09Paper
https://portal.mardi4nfdi.de/entity/Q61263472024-04-09Paper
Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers2024-02-02Paper
SNARGs and PPAD hardness from the decisional Diffie-Hellman assumption2023-12-08Paper
https://portal.mardi4nfdi.de/entity/Q60909042023-11-20Paper
Witness encryption and null-iO from evasive LWE2023-08-25Paper
Succinct classical verification of quantum computation2023-06-28Paper
Locally verifiable signature and key aggregation2023-06-28Paper
Succinct LWE sampling, random polynomials, and obfuscation2023-04-13Paper
Somewhere statistical soundness, post-quantum security, and SNARGs2023-03-31Paper
Cryptography from Information Loss.2023-02-03Paper
Fiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs2022-12-07Paper
Homomorphic Encryption Standard2022-11-02Paper
Asymptotically quasi-optimal cryptography2022-08-30Paper
https://portal.mardi4nfdi.de/entity/Q50903882022-07-18Paper
https://portal.mardi4nfdi.de/entity/Q50904192022-07-18Paper
A note on perfect correctness by derandomization2022-06-16Paper
The \(t\)-wise independence of substitution-permutation networks2022-05-18Paper
Oblivious transfer is in MiniQCrypt2021-12-08Paper
Extracting randomness from extractor-dependent sources2021-12-01Paper
Statistical ZAPR arguments from bilinear maps2021-12-01Paper
Zero-Knowledge Proofs of Proximity2021-06-15Paper
Structure Versus Hardness Through the Obfuscation Lens2021-02-08Paper
Data structures meet cryptography: 3SUM with preprocessing2021-01-19Paper
Some Open Problems in Information-Theoretic Cryptography2020-11-25Paper
Lattice trapdoors and IBE from middle-product LWE2020-04-30Paper
Matrix PRFs: constructions, attacks, and applications to obfuscation2020-04-30Paper
Optimal bounded-collusion secure functional encryption2020-04-30Paper
Reusable non-interactive secure computation2020-03-09Paper
Worst-case hardness for LPN and cryptographic hashing via code smoothing2020-02-04Paper
Breaking the circuit-size barrier in secret sharing2019-08-22Paper
Indistinguishability Obfuscation from Functional Encryption2019-02-25Paper
Traitor-tracing from LWE made simple and attribute-based2018-12-06Paper
Watermarking Cryptographic Capabilities2018-12-05Paper
GGH15 beyond permutation branching programs: proofs, attacks, and candidates2018-09-26Paper
Attribute-Based Encryption for Circuits2018-08-02Paper
Anonymous IBE, leakage resilience and circular security from new assumptions2018-07-09Paper
Towards breaking the exponential barrier for general secret sharing2018-07-09Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings2018-07-04Paper
https://portal.mardi4nfdi.de/entity/Q46380562018-05-03Paper
Limits on the locality of pseudorandom generators and applications to indistinguishability obfuscation2018-01-19Paper
Private constrained PRFs (and more) from LWE2018-01-19Paper
Multikey Fully Homomorphic Encryption and Applications2017-12-18Paper
Structure vs. hardness through the obfuscation lens2017-11-03Paper
Conditional disclosure of secrets via non-linear reconstruction2017-11-03Paper
Watermarking cryptographic capabilities2017-09-29Paper
Chosen-Ciphertext Secure Fully Homomorphic Encryption2017-06-13Paper
A Note on Perfect Correctness by Derandomization2017-06-13Paper
Lattice-based FHE as secure as PKE2017-05-19Paper
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers2017-05-16Paper
3-Message Zero Knowledge Against Human Ignorance2016-12-21Paper
Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security2016-11-09Paper
Fine-Grained Cryptography2016-11-09Paper
(Leveled) Fully Homomorphic Encryption without Bootstrapping2016-10-24Paper
(Leveled) fully homomorphic encryption without bootstrapping2016-10-07Paper
Secret Sharing and Statistical Zero Knowledge2016-06-10Paper
Obfuscating Conjunctions under Entropic Ring LWE2016-04-15Paper
Time-Lock Puzzles from Randomized Encodings2016-04-15Paper
Indistinguishability Obfuscation: From Approximate to Exact2016-03-23Paper
On Basing Private Information Retrieval on NP-Hardness2016-03-23Paper
Predicate Encryption for Circuits from LWE2015-12-10Paper
From Selective to Adaptive Security in Functional Encryption2015-12-10Paper
Succinct Garbling and Indistinguishability Obfuscation for RAM Programs2015-08-21Paper
Leveled Fully Homomorphic Signatures from Standard Lattices2015-08-21Paper
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions2015-07-06Paper
Aggregate Pseudorandom Functions and Connections to Learning2015-07-06Paper
Obfuscation of Probabilistic Circuits and Applications2015-07-06Paper
Protecting Circuits from Computationally Bounded and Noisy Leakage2015-02-09Paper
Byzantine agreement in the full-information model in O(log n) rounds2014-11-25Paper
How to Compute on Encrypted Data2014-08-20Paper
Attribute-based encryption for circuits2014-08-07Paper
Reusable garbled circuits and succinct functional encryption2014-08-07Paper
Efficient Fully Homomorphic Encryption from (Standard) LWE2014-07-30Paper
Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$2014-07-30Paper
Computing Blindfolded: New Developments in Fully Homomorphic Encryption2014-07-30Paper
(Leveled) Fully Homomorphic Encryption without Bootstrapping2014-07-01Paper
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits2014-05-27Paper
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption2014-05-13Paper
On Continual Leakage of Discrete Log Representations2013-12-10Paper
Round-optimal password-based authenticated key exchange2013-11-15Paper
Functional Encryption: New Perspectives and Lower Bounds2013-09-17Paper
How to Run Turing Machines on Encrypted Data2013-09-17Paper
Functional Encryption with Bounded Collusions via Multi-party Computation2012-09-25Paper
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices2012-07-20Paper
Efficient Password Authenticated Key Exchange via Oblivious Transfer2012-07-20Paper
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE2012-06-29Paper
Functional Re-encryption and Collusion-Resistant Obfuscation2012-06-15Paper
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption2012-06-15Paper
Securely obfuscating re-encryption2012-01-13Paper
Functional Encryption for Inner Product Predicates from Learning with Errors2011-12-02Paper
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages2011-08-12Paper
Round-Optimal Password-Based Authenticated Key Exchange2011-05-19Paper
New Developments in Leakage-Resilient Cryptography2011-03-15Paper
A Group Signature Scheme from Lattice Assumptions2010-12-07Paper
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits2010-08-24Paper
Fully Homomorphic Encryption over the Integers2010-06-01Paper
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases2010-06-01Paper
A Simple BGN-Type Cryptosystem from LWE2010-06-01Paper
Public-Key Encryption Schemes with Auxiliary Inputs2010-02-24Paper
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices2009-12-15Paper
Signature Schemes with Bounded Leakage Resilience2009-12-15Paper
Simultaneous Hardcore Bits and Cryptography against Memory Attacks2009-03-03Paper
How Efficient Can Memory Checking Be?2009-03-03Paper
Weak Verifiable Random Functions2009-03-03Paper
Adaptive One-Way Functions and Applications2009-02-10Paper
Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems2009-02-10Paper
A Framework for Efficient and Composable Oblivious Transfer2009-02-10Paper
Trapdoors for hard lattices and new cryptographic constructions2009-01-05Paper
Bounded CCA2-Secure Encryption2008-05-15Paper
Relations Among Notions of Non-malleability for Encryption2008-05-15Paper
Secure Computation from Random Error Correcting Codes2007-11-29Paper
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One2007-09-04Paper
Securely Obfuscating Re-encryption2007-08-30Paper
Distributed Computing2006-11-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Vinod Vaikuntanathan