Dakshita Khurana

From MaRDI portal
Person:1629412


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Software with certified deletion
 
2024-11-13Paper
Weakening assumptions for publicly-verifiable deletion
 
2024-08-15Paper
On black-box verifiable outsourcing
 
2024-08-01Paper
Weak zero-knowledge via the Goldreich-Levin theorem
 
2024-06-26Paper
Refuting the dream XOR lemma via ideal obfuscation and resettable MPC
 
2024-06-25Paper
Publicly-verifiable deletion via target-collapsing functions
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Cryptography with certified deletion
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Secure computation with shared EPR pairs (or: how to teleport in zero-knowledge)
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Round-optimal black-box MPC in the plain model
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
On non-uniform security for black-box non-interactive CCA commitments
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
A new framework for quantum oblivious transfer
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Black-box reusable NISC with random oracles
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing
2023-11-14Paper
Round-optimal black-box secure computation from two-round malicious OT
Theory of Cryptography
2023-08-14Paper
Two-round maliciously secure computation with super-polynomial simulation
 
2023-03-31Paper
Round-optimal black-box protocol compilers
 
2022-08-30Paper
COA-secure obfuscation and applications
 
2022-08-30Paper
SNARGs for P from sub-exponential DDH and QR
 
2022-08-30Paper
Approximation of functions by Stancu variant of genuine Gupta-Srivastava operators
 
2022-05-25Paper
On the round complexity of black-box secure MPC
 
2022-04-22Paper
Improved computational extractors and their applications
 
2022-04-22Paper
Compact ring signatures from learning with errors
 
2022-03-31Paper
One-way functions imply secure computation in a quantum world
 
2022-03-31Paper
On the round complexity of secure quantum computation
 
2022-03-31Paper
On statistical security in two-party computation
 
2022-03-23Paper
Weak Zero-Knowledge beyond the Black-Box Barrier
SIAM Journal on Computing
2022-02-08Paper
On the CCA compatibility of public-key infrastructure
 
2021-12-21Paper
Post-quantum multi-party computation
 
2021-12-08Paper
Black-box non-interactive non-malleable commitments
 
2021-12-08Paper
Non-interactive distributional indistinguishability (NIDI) and non-malleable commitments
 
2021-12-08Paper
Low error efficient computational extractors in the CRS model
 
2021-12-01Paper
Statistical ZAP arguments
 
2021-12-01Paper
Non-interactive non-malleability from quantum supremacy
 
2020-03-09Paper
Weak zero-knowledge beyond the black-box barrier
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing
2020-01-30Paper
Succinct delegation for low-space non-deterministic computation
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
Round optimal black-box ``commit-and-prove
 
2018-12-11Paper
Upgrading to functional encryption
 
2018-12-11Paper
Promise zero knowledge and its applications to round optimal MPC
 
2018-09-26Paper
Statistical witness indistinguishability (and more) in two messages
 
2018-07-17Paper
Round optimal concurrent MPC via strong simulation
 
2018-01-19Paper
Round optimal concurrent non-malleability from polynomial hardness
 
2018-01-19Paper
Do distributed differentially-private protocols require oblivious transfer?
 
2017-12-19Paper
Distinguisher-dependent simulation in two rounds and its applications
 
2017-11-15Paper
Unconditional UC-secure computation with (stronger-malicious) PUFs
Lecture Notes in Computer Science
2017-06-13Paper
How to Generate and Use Universal Samplers
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Secure computation from elastic noisy channels
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
All complete functionalities are reversible
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Statistical randomized encodings: a complexity theoretic view
Automata, Languages, and Programming
2015-10-27Paper
Black-box separations for differentially private protocols
Lecture Notes in Computer Science
2015-01-06Paper


Research outcomes over time


This page was built for person: Dakshita Khurana