Vipul Goyal

From MaRDI portal
Person:1653070

Available identifiers

zbMath Open goyal.vipulMaRDI QIDQ1653070

List of research outcomes





PublicationDate of PublicationType
NIZKs with maliciously chosen CRS: subversion advice-ZK and accountable soundness2025-01-10Paper
Towards achieving asynchronous MPC with linear communication and optimal resilience2024-12-13Paper
Asymmetric multi-party computation2024-11-22Paper
Computational quantum secret sharing2024-11-20Paper
Software with certified deletion2024-11-13Paper
Asynchronous multi-party quantum computation2024-09-25Paper
Interaction-preserving compilers for secure computation2024-04-09Paper
https://portal.mardi4nfdi.de/entity/Q61263222024-04-09Paper
On concurrent multi-party quantum computation2024-02-06Paper
Reusable secure computation in the plain model2024-02-02Paper
\textsc{SuperPack}: dishonest majority MPC with constant online communication2023-12-08Paper
Steganography-free zero-knowledge2023-08-14Paper
Tight bounds on the randomness complexity of secure multiparty computation2023-07-07Paper
Sharing transformation and dishonest majority MPC with packed secret sharing2023-07-07Paper
Oblivious transfer from trapdoor permutations in minimal rounds2023-04-13Paper
Blockchains enable non-interactive MPC2023-04-13Paper
Two-round maliciously secure computation with super-polynomial simulation2023-03-31Paper
The round complexity of secure computation against covert adversaries2022-12-16Paper
Guaranteed output delivery comes free in honest majority MPC2022-11-09Paper
Round-optimal Byzantine agreement2022-08-30Paper
Private circuits with quasilinear randomness2022-08-30Paper
Storing and retrieving secrets on a blockchain2022-07-08Paper
Instant block confirmation in the sleepy model2022-06-22Paper
ATLAS: efficient and scalable MPC in the honest majority setting2022-04-22Paper
Unconditional communication-efficient MPC via Hall's marriage theorem2022-04-22Paper
Traceable secret sharing and applications2022-04-22Paper
Round optimal secure multiparty computation from minimal assumptions2022-03-23Paper
Threshold garbled circuits and ad hoc secure computation2021-12-08Paper
Post-quantum multi-party computation2021-12-08Paper
Multi-source non-malleable extractors and applications2021-12-08Paper
Towards accountability in CRS generation2021-12-08Paper
Statistical Zaps and new oblivious transfer protocols2021-12-01Paper
An Algebraic Approach to Nonmalleability2021-10-18Paper
Extractors for adversarial sources via extremal hypergraphs2021-01-19Paper
Nonmalleable extractors and codes, with their many tampered extensions2020-10-26Paper
Interactive non-malleable codes2020-04-30Paper
Communication-efficient unconditional MPC with guaranteed output delivery2020-03-09Paper
Simultaneous amplification: the case of non-interactive zero-knowledge2020-03-09Paper
Founding secure computation on blockchains2020-02-06Paper
Correlated-source extractors and cryptography with correlated-random tapes2020-02-04Paper
Non-malleable secret sharing2019-08-22Paper
Promise zero knowledge and its applications to round optimal MPC2018-09-26Paper
Non-malleable secret sharing for general access structures2018-09-12Paper
On the existence of three round zero-knowledge proofs2018-07-17Paper
https://portal.mardi4nfdi.de/entity/Q46380572018-05-03Paper
Round optimal concurrent MPC via strong simulation2018-01-19Paper
Overcoming cryptographic impossibility results using blockchains2018-01-19Paper
Block-wise non-malleable codes2017-12-19Paper
Do distributed differentially-private protocols require oblivious transfer?2017-12-19Paper
Non-malleable extractors and codes, with their many tampered extensions2017-09-29Paper
Textbook non-malleable commitments2017-09-29Paper
Verifiable functional encryption2017-01-06Paper
Multi-input functional encryption with unbounded-message security2017-01-06Paper
Concurrent secure computation via non-black box simulation2015-12-10Paper
Concurrent secure computation with optimal query complexity2015-12-10Paper
Functional encryption for randomized functionalities2015-07-06Paper
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma2015-07-06Paper
Black-box non-black-box zero knowledge2015-06-26Paper
Position-based cryptography2014-11-14Paper
On-line/off-line leakage resilient secure computation protocols2014-08-20Paper
On the round complexity of covert computation2014-08-13Paper
Interactive proofs under continual memory leakage2014-08-07Paper
Non-black-box simulation in the fully concurrent setting2014-08-07Paper
Stateless Cryptographic Protocols2014-07-30Paper
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy2014-07-25Paper
Constant round non-malleable protocols using one way functions2014-06-05Paper
Position-based quantum cryptography: impossibility and constructions2014-06-04Paper
Multi-input functional encryption2014-05-27Paper
Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing2014-03-25Paper
Lower Bounds in the Hardware Token Model2014-02-18Paper
Constant-round concurrent zero knowledge in the bounded player model2013-12-10Paper
What Information Is Leaked under Concurrent Composition?2013-09-17Paper
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols2013-09-02Paper
On concurrently secure computation in the multiple ideal query model2013-05-31Paper
Concurrent zero knowledge in the bounded player model2013-03-18Paper
On the (in)security of Fischlin's paradigm2013-03-18Paper
New impossibility results for concurrent composition and a non-interactive completeness theorem for secure computation2012-09-25Paper
Concurrently secure computation in constant rounds2012-06-29Paper
On black-box reductions between predicate encryption schemes2012-06-15Paper
Resettable cryptography in constant rounds -- the case of zero knowledge2011-12-02Paper
Noiseless database privacy2011-12-02Paper
Secure composition of cryptographic protocols. (Abstract)2011-09-16Paper
Position-based quantum cryptography: impossibility and constructions2011-08-12Paper
Correlated-input secure hash functions2011-05-19Paper
Bringing people of different beliefs together to do UC2011-05-19Paper
Password-authenticated session-key generation on the internet in the plain model2010-08-24Paper
Interactive locking, zero-knowledge PCPs, and unconditional cryptography2010-08-24Paper
Founding Cryptography on Tamper-Proof Hardware Tokens2010-02-24Paper
Position Based Cryptography2009-10-20Paper
Resettably Secure Computation2009-05-12Paper
Reducing Trust in the PKG in Identity Based Cryptosystems2009-03-10Paper
Bounded Ciphertext Policy Attribute Based Encryption2008-08-19Paper
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions2008-05-15Paper
New Constructions for UC Secure Computation Using Tamper-Proof Hardware2008-04-15Paper
Universally Composable Multi-party Computation with an Unreliable Common Reference String2008-03-05Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Information Security and Privacy2006-06-22Paper

Research outcomes over time

This page was built for person: Vipul Goyal