Omkant Pandey

From MaRDI portal
Person:1648851


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Credibility in private set membership
Lecture Notes in Computer Science
2023-11-16Paper
A new approach to efficient non-malleable zero-knowledge
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Black-box constructions of bounded-concurrent secure computation
 
2022-12-16Paper
Towards a unified approach to black-box constructions of zero-knowledge proofs
 
2022-05-18Paper
Compact ring signatures from learning with errors
 
2022-03-31Paper
Random walks and concurrent zero-knowledge
 
2021-02-23Paper
Improved algorithms for optimal embeddings
ACM Transactions on Algorithms
2018-11-05Paper
A new approach to black-box concurrent secure computation
 
2018-07-09Paper
Incremental deterministic public-key encryption
Journal of Cryptology
2018-04-26Paper
Block-wise non-malleable codes
 
2017-12-19Paper
Do distributed differentially-private protocols require oblivious transfer?
 
2017-12-19Paper
Incremental program obfuscation
 
2017-11-15Paper
Textbook non-malleable commitments
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2017-09-29Paper
Breaking the sub-exponential barrier in obfustopia
Lecture Notes in Computer Science
2017-06-23Paper
On the exact round complexity of self-composable two-party computation
Lecture Notes in Computer Science
2017-06-13Paper
Secure multiparty RAM computation in constant rounds
Theory of Cryptography
2016-12-21Paper
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Deterministic Public-Key Encryption Under Continual Leakage
Applied Cryptography and Network Security
2016-10-04Paper
The Exact Round Complexity of Secure Computation
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Optimal computational split-state non-malleable codes
Theory of Cryptography
2016-04-08Paper
Explicit non-malleable codes against bit-wise tampering and permutations
Lecture Notes in Computer Science
2015-12-10Paper
Public-coin differing-inputs obfuscation and its applications
Theory of Cryptography
2015-07-06Paper
A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations
Theory of Cryptography
2015-07-06Paper
Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for NP
Theory of Cryptography
2015-07-06Paper
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
Theory of Cryptography
2015-07-06Paper
Non-malleable zero knowledge: black-box constructions and definitional relationships
Lecture Notes in Computer Science
2014-10-14Paper
Relaxed two-to-one recoding schemes
Lecture Notes in Computer Science
2014-10-14Paper
Interactive proofs under continual memory leakage
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Achieving constant round leakage-resilient zero-knowledge
Theory of Cryptography
2014-02-18Paper
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Cryptography using \texttt{CAPTCHA} puzzles
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Incremental Deterministic Public-Key Encryption
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Property preserving symmetric encryption
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Publicly verifiable secret sharing for cloud-based key management
Lecture Notes in Computer Science
2011-12-16Paper
Efficiency preserving transformations for concurrent non-malleable zero knowledge
Theory of Cryptography
2010-02-24Paper
Computational Differential Privacy
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Adaptive One-Way Functions and Applications
Lecture Notes in Computer Science
2009-02-10Paper
Bounded Ciphertext Policy Attribute Based Encryption
Automata, Languages and Programming
2008-08-19Paper
Precise Concurrent Zero Knowledge
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Private Locally Decodable Codes
Automata, Languages and Programming
2007-11-28Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper


Research outcomes over time


This page was built for person: Omkant Pandey