Vipul Goyal

From MaRDI portal
Person:1653070



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
NIZKs with maliciously chosen CRS: subversion advice-ZK and accountable soundness2025-01-10Paper
Towards achieving asynchronous MPC with linear communication and optimal resilience2024-12-13Paper
Asymmetric multi-party computation2024-11-22Paper
Computational quantum secret sharing2024-11-20Paper
Software with certified deletion2024-11-13Paper
Asynchronous multi-party quantum computation2024-09-25Paper
Interaction-preserving compilers for secure computation2024-04-09Paper
scientific article; zbMATH DE number 7829313 (Why is no real title available?)2024-04-09Paper
On concurrent multi-party quantum computation
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Reusable secure computation in the plain model
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
\textsc{SuperPack}: dishonest majority MPC with constant online communication
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Steganography-free zero-knowledge
Theory of Cryptography
2023-08-14Paper
Tight bounds on the randomness complexity of secure multiparty computation
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Sharing transformation and dishonest majority MPC with packed secret sharing
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Oblivious transfer from trapdoor permutations in minimal rounds2023-04-13Paper
Blockchains enable non-interactive MPC2023-04-13Paper
Two-round maliciously secure computation with super-polynomial simulation2023-03-31Paper
The round complexity of secure computation against covert adversaries2022-12-16Paper
Guaranteed output delivery comes free in honest majority MPC2022-11-09Paper
Round-optimal Byzantine agreement2022-08-30Paper
Private circuits with quasilinear randomness2022-08-30Paper
Storing and retrieving secrets on a blockchain
Public-Key Cryptography – PKC 2022
2022-07-08Paper
Instant block confirmation in the sleepy model2022-06-22Paper
ATLAS: efficient and scalable MPC in the honest majority setting2022-04-22Paper
Unconditional communication-efficient MPC via Hall's marriage theorem2022-04-22Paper
Traceable secret sharing and applications2022-04-22Paper
Round optimal secure multiparty computation from minimal assumptions2022-03-23Paper
Threshold garbled circuits and ad hoc secure computation2021-12-08Paper
Post-quantum multi-party computation
(available as arXiv preprint)
2021-12-08Paper
Multi-source non-malleable extractors and applications2021-12-08Paper
Towards accountability in CRS generation2021-12-08Paper
Statistical Zaps and new oblivious transfer protocols2021-12-01Paper
An Algebraic Approach to Nonmalleability
SIAM Journal on Computing
2021-10-18Paper
Extractors for adversarial sources via extremal hypergraphs
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing
2021-01-19Paper
Nonmalleable extractors and codes, with their many tampered extensions
SIAM Journal on Computing
2020-10-26Paper
Interactive non-malleable codes2020-04-30Paper
Communication-efficient unconditional MPC with guaranteed output delivery2020-03-09Paper
Simultaneous amplification: the case of non-interactive zero-knowledge2020-03-09Paper
Founding secure computation on blockchains2020-02-06Paper
Correlated-source extractors and cryptography with correlated-random tapes2020-02-04Paper
Non-malleable secret sharing
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
Promise zero knowledge and its applications to round optimal MPC2018-09-26Paper
Non-malleable secret sharing for general access structures2018-09-12Paper
On the existence of three round zero-knowledge proofs2018-07-17Paper
scientific article; zbMATH DE number 6866298 (Why is no real title available?)2018-05-03Paper
Round optimal concurrent MPC via strong simulation2018-01-19Paper
Overcoming cryptographic impossibility results using blockchains2018-01-19Paper
Block-wise non-malleable codes2017-12-19Paper
Do distributed differentially-private protocols require oblivious transfer?2017-12-19Paper
Non-malleable extractors and codes, with their many tampered extensions
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2017-09-29Paper
Textbook non-malleable commitments
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2017-09-29Paper
Verifiable functional encryption
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Multi-input functional encryption with unbounded-message security
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Concurrent secure computation via non-black box simulation
Lecture Notes in Computer Science
2015-12-10Paper
Concurrent secure computation with optimal query complexity
Lecture Notes in Computer Science
2015-12-10Paper
Functional encryption for randomized functionalities
Theory of Cryptography
2015-07-06Paper
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
Theory of Cryptography
2015-07-06Paper
Black-box non-black-box zero knowledge
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
Position-based cryptography
SIAM Journal on Computing
2014-11-14Paper
On-line/off-line leakage resilient secure computation protocols
Lecture Notes in Computer Science
2014-08-20Paper
On the round complexity of covert computation
Proceedings of the forty-second ACM symposium on Theory of computing
2014-08-13Paper
Interactive proofs under continual memory leakage
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Non-black-box simulation in the fully concurrent setting
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
Stateless Cryptographic Protocols
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
2014-07-30Paper
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
2009 50th Annual IEEE Symposium on Foundations of Computer Science
2014-07-25Paper
Constant round non-malleable protocols using one way functions
Proceedings of the forty-third annual ACM symposium on Theory of computing
2014-06-05Paper
Position-based quantum cryptography: impossibility and constructions
SIAM Journal on Computing
2014-06-04Paper
Multi-input functional encryption
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Lower Bounds in the Hardware Token Model
Theory of Cryptography
2014-02-18Paper
Constant-round concurrent zero knowledge in the bounded player model
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
What Information Is Leaked under Concurrent Composition?
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
On concurrently secure computation in the multiple ideal query model
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Concurrent zero knowledge in the bounded player model
Theory of Cryptography
2013-03-18Paper
On the (in)security of Fischlin's paradigm
Theory of Cryptography
2013-03-18Paper
New impossibility results for concurrent composition and a non-interactive completeness theorem for secure computation
Lecture Notes in Computer Science
2012-09-25Paper
Concurrently secure computation in constant rounds
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
On black-box reductions between predicate encryption schemes
Theory of Cryptography
2012-06-15Paper
Resettable cryptography in constant rounds -- the case of zero knowledge
Lecture Notes in Computer Science
2011-12-02Paper
Noiseless database privacy
Lecture Notes in Computer Science
2011-12-02Paper
Secure composition of cryptographic protocols. (Abstract)
Provable Security
2011-09-16Paper
Position-based quantum cryptography: impossibility and constructions
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Correlated-input secure hash functions
Theory of Cryptography
2011-05-19Paper
Bringing people of different beliefs together to do UC
Theory of Cryptography
2011-05-19Paper
Password-authenticated session-key generation on the internet in the plain model
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Interactive locking, zero-knowledge PCPs, and unconditional cryptography
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Founding Cryptography on Tamper-Proof Hardware Tokens
Theory of Cryptography
2010-02-24Paper
Position Based Cryptography
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Resettably Secure Computation
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Reducing Trust in the PKG in Identity Based Cryptosystems
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Bounded Ciphertext Policy Attribute Based Encryption
Automata, Languages and Programming
2008-08-19Paper
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Universally Composable Multi-party Computation with an Unreliable Common Reference String
Theory of Cryptography
2008-03-05Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper


Research outcomes over time


This page was built for person: Vipul Goyal