Muthuramakrishnan Venkitasubramaniam

From MaRDI portal
Person:1629407


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Protecting distributed primitives against leakage: equivocal secret sharing and more
Journal of Cryptology
2024-11-15Paper
Can Alice and Bob guarantee output to Carol?
 
2024-11-13Paper
The price of active security in cryptographic protocols
Journal of Cryptology
2024-08-30Paper
Beyond MPC-in-the-head: black-box constructions of short zero-knowledge proofs
 
2024-08-01Paper
Your reputation's safe with me: framing-free distributed zero-knowledge proofs
 
2024-08-01Paper
Protecting distributed primitives against leakage: equivocal secret sharing and more
 
2024-06-25Paper
Best of both worlds. Revisiting the spymasters double agent problem
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Private polynomial commitments and applications to MPC
Lecture Notes in Computer Science
2023-11-16Paper
Ligero: lightweight sublinear arguments without a trusted setup
Designs, Codes and Cryptography
2023-11-07Paper
On black-box constructions of time and space efficient sublinear arguments from symmetric-key primitives
Theory of Cryptography
2023-08-14Paper
Actively secure garbled circuits with constant communication overhead in the plain model
Journal of Cryptology
2023-07-26Paper
scientific article; zbMATH DE number 7706038 (Why is no real title available?)
 
2023-07-03Paper
Adaptively secure computation for RAM programs
 
2022-08-30Paper
ZK-PCPs from leakage-resilient secret sharing
Journal of Cryptology
2022-08-01Paper
The price of active security in cryptographic protocols
 
2022-03-23Paper
Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model
SIAM Journal on Computing
2022-02-08Paper
Which languages have 4-round fully black-box zero-knowledge arguments from one-way functions?
 
2021-12-01Paper
Going beyond dual execution: MPC for functions with efficient verification
 
2021-12-01Paper
Round-optimal secure multi-party computation
Journal of Cryptology
2021-07-30Paper
On the power of secure two-party computation
Journal of Cryptology
2020-03-03Paper
What security can we achieve within 4 rounds?
Journal of Cryptology
2019-11-27Paper
On black-box complexity of universally composable security in the CRS model
Journal of Cryptology
2019-08-13Paper
Two-round adaptively secure multiparty computation from standard assumptions
 
2018-12-11Paper
Round-optimal fully black-box zero-knowledge arguments from one-way permutations
 
2018-12-11Paper
Round-optimal secure multi-party computation
Lecture Notes in Computer Science
2018-09-26Paper
A unified approach to constructing black-box UC protocols in trusted setup models
 
2018-01-19Paper
Actively secure garbled circuits with constant communication overhead in the plain model
 
2018-01-19Paper
Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing
2017-08-17Paper
Better two-round adaptive multi-party computation
Lecture Notes in Computer Science
2017-06-13Paper
Scalable multi-party private set-intersection
Lecture Notes in Computer Science
2017-06-13Paper
Constant round adaptively secure protocols in the tamper-proof hardware model
Lecture Notes in Computer Science
2017-06-13Paper
Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
Theory of Cryptography
2016-12-21Paper
Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions
Theory of Cryptography
2016-12-21Paper
On the Power of Secure Two-Party Computation
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
What Security Can We Achieve Within 4 Rounds?
Lecture Notes in Computer Science
2016-10-21Paper
Secure computation from millionaire
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
On Black-Box Complexity of Universally Composable Security in the CRS Model
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
A parallel repetition theorem for constant-round Arthur-Merlin proofs
ACM Transactions on Computation Theory
2015-09-24Paper
A unified framework for concurrent security
Proceedings of the forty-first annual ACM symposium on Theory of computing
2015-02-04Paper
On adaptively secure protocols
Lecture Notes in Computer Science
2014-10-14Paper
Concurrent zero knowledge, revisited
Journal of Cryptology
2014-04-01Paper
4-round resettably-sound zero knowledge
Theory of Cryptography
2014-02-18Paper
Adaptive and concurrent secure computation from new adaptive, non-malleable commitments
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
A unified framework for UC from only OT
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
The generalized randomized iterate and its application to new efficient constructions of uowhfs from regular one-way functions
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Towards non-black-box lower bounds in cryptography
Theory of Cryptography
2011-05-19Paper
Concurrent non-malleable zero knowledge proofs
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Private coins versus public coins in zero-knowledge proof systems
Theory of Cryptography
2010-02-24Paper
Eye for an eye: efficient concurrent zero-knowledge in the timing model
Theory of Cryptography
2010-02-24Paper
scientific article; zbMATH DE number 5485477 (Why is no real title available?)
 
2009-01-05Paper
Precise Concurrent Zero Knowledge
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Concurrent Non-malleable Commitments from Any One-Way Function
Theory of Cryptography
2008-03-05Paper
On Constant-Round Concurrent Zero-Knowledge
Theory of Cryptography
2008-03-05Paper


Research outcomes over time


This page was built for person: Muthuramakrishnan Venkitasubramaniam