Dakshita Khurana

From MaRDI portal
Person:1629412

Available identifiers

zbMath Open khurana.dakshitaMaRDI QIDQ1629412

List of research outcomes





PublicationDate of PublicationType
Software with certified deletion2024-11-13Paper
Weakening assumptions for publicly-verifiable deletion2024-08-15Paper
On black-box verifiable outsourcing2024-08-01Paper
Weak zero-knowledge via the Goldreich-Levin theorem2024-06-26Paper
Refuting the dream XOR lemma via ideal obfuscation and resettable MPC2024-06-25Paper
Publicly-verifiable deletion via target-collapsing functions2024-02-06Paper
Cryptography with certified deletion2024-02-06Paper
Secure computation with shared EPR pairs (or: how to teleport in zero-knowledge)2024-02-06Paper
Round-optimal black-box MPC in the plain model2024-02-02Paper
On non-uniform security for black-box non-interactive CCA commitments2024-01-16Paper
A new framework for quantum oblivious transfer2024-01-16Paper
Black-box reusable NISC with random oracles2023-12-08Paper
SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE2023-11-14Paper
Round-optimal black-box secure computation from two-round malicious OT2023-08-14Paper
Two-round maliciously secure computation with super-polynomial simulation2023-03-31Paper
Round-optimal black-box protocol compilers2022-08-30Paper
COA-secure obfuscation and applications2022-08-30Paper
SNARGs for P from sub-exponential DDH and QR2022-08-30Paper
https://portal.mardi4nfdi.de/entity/Q50793342022-05-25Paper
On the round complexity of black-box secure MPC2022-04-22Paper
Improved computational extractors and their applications2022-04-22Paper
Compact ring signatures from learning with errors2022-03-31Paper
One-way functions imply secure computation in a quantum world2022-03-31Paper
On the round complexity of secure quantum computation2022-03-31Paper
On statistical security in two-party computation2022-03-23Paper
Weak Zero-Knowledge beyond the Black-Box Barrier2022-02-08Paper
On the CCA compatibility of public-key infrastructure2021-12-21Paper
Post-quantum multi-party computation2021-12-08Paper
Black-box non-interactive non-malleable commitments2021-12-08Paper
Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments2021-12-08Paper
Low error efficient computational extractors in the CRS model2021-12-01Paper
Statistical ZAP arguments2021-12-01Paper
Non-interactive non-malleability from quantum supremacy2020-03-09Paper
Weak zero-knowledge beyond the black-box barrier2020-01-30Paper
Succinct delegation for low-space non-deterministic computation2019-08-22Paper
Round optimal black-box ``commit-and-prove2018-12-11Paper
Upgrading to functional encryption2018-12-11Paper
Promise zero knowledge and its applications to round optimal MPC2018-09-26Paper
Statistical witness indistinguishability (and more) in two messages2018-07-17Paper
Round optimal concurrent MPC via strong simulation2018-01-19Paper
Round optimal concurrent non-malleability from polynomial hardness2018-01-19Paper
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?2017-12-19Paper
Distinguisher-dependent simulation in two rounds and its applications2017-11-15Paper
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs2017-06-13Paper
How to Generate and Use Universal Samplers2017-01-06Paper
Secure Computation from Elastic Noisy Channels2016-07-15Paper
All Complete Functionalities are Reversible2016-07-15Paper
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation2016-06-10Paper
Statistical Randomized Encodings: A Complexity Theoretic View2015-10-27Paper
Black-Box Separations for Differentially Private Protocols2015-01-06Paper

Research outcomes over time

This page was built for person: Dakshita Khurana