Venkata Koppula

From MaRDI portal
Person:1629442



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Adaptive multiparty NIKE
Theory of Cryptography
2023-08-14Paper
scientific article; zbMATH DE number 7651035 (Why is no real title available?)
(available as arXiv preprint)
2023-02-07Paper
NIZK from LPN and trapdoor hash via correlation intractability for approximable relations2022-12-07Paper
Chosen ciphertext security from injective trapdoor functions2022-11-09Paper
Signature schemes with randomized verification2022-07-01Paper
On perfect correctness in (lockable) obfuscation2021-12-01Paper
Adaptively secure constrained pseudorandom functions2021-03-17Paper
Collusion resistant traitor tracing from learning with errors
SIAM Journal on Computing
2020-10-29Paper
Output compression, MPC, and iO for Turing machines2020-05-20Paper
New approaches to traitor tracing with embedded identities2020-04-30Paper
Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption2020-03-09Paper
Collusion resistant traitor tracing from learning with errors
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
Impossibility of simulation secure functional encryption even with random oracles2018-12-11Paper
A generic approach to constructing and proving verifiable random functions2018-01-19Paper
Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption
Lecture Notes in Computer Science
2017-06-13Paper
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
Lecture Notes in Computer Science
2017-06-13Paper
Universal samplers with fast verification
Lecture Notes in Computer Science
2017-06-13Paper
Semi-adaptive security and bundling functionalities made generic and easy
Theory of Cryptography
2016-12-22Paper
Circular Security Separations for Arbitrary Length Cycles from LWE
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Deterministic Public-Key Encryption Under Continual Leakage
Applied Cryptography and Network Security
2016-10-04Paper
Constrained Pseudorandom Functions for Unconstrained Inputs
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Adaptively secure puncturable pseudorandom functions in the standard model
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Universal signature aggregators
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Indistinguishability obfuscation for Turing machines with unbounded memory
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
2015-08-21Paper
Functional encryption for randomized functionalities
Theory of Cryptography
2015-07-06Paper
Separations in circular security for arbitrary length key cycles
Theory of Cryptography
2015-07-06Paper
On the Kernelization Complexity of Colorful Motifs
Parameterized and Exact Computation
2010-12-07Paper


Research outcomes over time


This page was built for person: Venkata Koppula