Abhishek Jain

From MaRDI portal
Person:1653071

Available identifiers

zbMath Open jain.abhishekMaRDI QIDQ1653071

List of research outcomes





PublicationDate of PublicationType
Scalable multiparty computation from non-linear secret sharing2024-12-13Paper
Monotone-policy aggregate signatures2024-11-13Paper
https://portal.mardi4nfdi.de/entity/Q61262252024-04-09Paper
Correlation intractability and SNARGs from sub-exponential DDH2024-02-06Paper
A note on non-interactive zero-knowledge from CDH2024-02-06Paper
Cryptography with weights: MPC, encryption and signatures2024-02-02Paper
End-to-end secure messaging with traceability only for illegal content2023-12-08Paper
Credibility in private set membership2023-11-16Paper
Steganography-free zero-knowledge2023-08-14Paper
Oblivious transfer from trapdoor permutations in minimal rounds2023-04-13Paper
On communication models and best-achievable security in two-round MPC2023-04-13Paper
Towards efficiency-preserving round compression in MPC. Do fewer rounds mean more computation?2023-03-29Paper
The round complexity of secure computation against covert adversaries2022-12-16Paper
Secure multiparty computation with free branching2022-08-30Paper
Non-interactive batch arguments for NP from standard assumptions2022-05-18Paper
Round optimal secure multiparty computation from minimal assumptions2022-03-23Paper
Effects of large aromatic precursors on soot formation in turbulent non-premixed sooting jet flames2022-02-16Paper
Non-interactive zero knowledge from sub-exponential DDH2021-12-08Paper
Order-C secure multiparty computation for highly repetitive circuits2021-12-08Paper
Unbounded multi-party computation from learning with errors2021-12-08Paper
Statistical Zaps and new oblivious transfer protocols2021-12-01Paper
Multi-key fully-homomorphic encryption in the plain model2021-12-01Paper
The bottleneck complexity of secure multiparty computation2021-07-28Paper
The broadcast message complexity of secure multiparty computation2020-05-20Paper
Public-key function-private hidden vector encryption (and more)2020-05-11Paper
UC-secure multiparty computation from one-way functions using stateless tokens2020-05-05Paper
Interactive non-malleable codes2020-04-30Paper
Founding secure computation on blockchains2020-02-06Paper
Two round information-theoretic MPC with malicious security2020-02-06Paper
Non-interactive secure computation from one-way functions2019-01-23Paper
Round-optimal secure multiparty computation with honest majority2018-09-26Paper
Promise zero knowledge and its applications to round optimal MPC2018-09-26Paper
On the existence of three round zero-knowledge proofs2018-07-17Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings2018-07-04Paper
Non-interactive multiparty computation without correlated randomness2018-02-23Paper
Efficient authentication from hard learning problems2018-02-15Paper
Round optimal concurrent MPC via strong simulation2018-01-19Paper
On secure two-party computation in three rounds2018-01-19Paper
Distinguisher-dependent simulation in two rounds and its applications2017-11-15Paper
Indistinguishability obfuscation for Turing machines: constant overhead and amortization2017-11-15Paper
A new approach to round-optimal secure multiparty computation2017-11-03Paper
Patchable indistinguishability obfuscation: \(i\mathcal {O}\) for evolving software2017-06-23Paper
Cryptography with updates2017-06-13Paper
Interactive coding for multiparty protocols2017-05-19Paper
Function-hiding inner product encryption2016-06-10Paper
Multi-input functional encryption for unbounded arity functions2016-06-10Paper
Time-lock puzzles from randomized encodings2016-04-15Paper
Secure multiparty computation with general interaction patterns2016-04-15Paper
Indistinguishability obfuscation from compact functional encryption2015-12-10Paper
Concurrent secure computation with optimal query complexity2015-12-10Paper
Succinct garbling and indistinguishability obfuscation for RAM programs2015-08-21Paper
Functional encryption for randomized functionalities2015-07-06Paper
Non-malleable zero knowledge: black-box constructions and definitional relationships2014-10-14Paper
On the round complexity of covert computation2014-08-13Paper
Client-server concurrent zero knowledge with constant rounds and guaranteed complexity2014-08-07Paper
Multi-input functional encryption2014-05-27Paper
Multiparty computation secure against continual memory leakage2014-05-13Paper
Constant-round concurrent zero knowledge in the bounded player model2013-12-10Paper
On the achievability of simulation-based security for functional encryption2013-09-17Paper
What Information Is Leaked under Concurrent Composition?2013-09-17Paper
Secure computation against adaptive auxiliary information2013-09-02Paper
On concurrently secure computation in the multiple ideal query model2013-05-31Paper
Commitments and efficient zero-knowledge proofs from learning parity with noise2013-03-19Paper
Concurrent zero knowledge in the bounded player model2013-03-18Paper
Why ``Fiat-Shamir for proofs lacks a proof2013-03-18Paper
New impossibility results for concurrent composition and a non-interactive completeness theorem for secure computation2012-09-25Paper
Multiparty computation with low communication, computation and interaction via threshold FHE2012-06-29Paper
Concurrently secure computation in constant rounds2012-06-29Paper
Counterexamples to hardness amplification beyond negligible2012-06-15Paper
Hardness preserving constructions of pseudorandom functions2012-06-15Paper
Leakage-resilient zero knowledge2011-08-12Paper
Efficient Authentication from Hard Learning Problems2011-05-27Paper
Parallel Repetition for Leakage Resilience Amplification Revisited2011-05-19Paper
Bringing people of different beliefs together to do UC2011-05-19Paper
Password-authenticated session-key generation on the internet in the plain model2010-08-24Paper
Using cognitive computing to extend the range of Grashof number in numerical simulation of natural convection2009-07-29Paper
Bounded Ciphertext Policy Attribute Based Encryption2008-08-19Paper
Analytical modeling of electrokinetic effects on flow and heat transfer in microchannels2008-02-14Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
https://portal.mardi4nfdi.de/entity/Q44243262003-09-04Paper

Research outcomes over time

This page was built for person: Abhishek Jain