Abhishek Jain

From MaRDI portal
Person:1653071

Available identifiers

zbMath Open jain.abhishekMaRDI QIDQ1653071

List of research outcomes





PublicationDate of PublicationType
Scalable multiparty computation from non-linear secret sharing2024-12-13Paper
Monotone-policy aggregate signatures2024-11-13Paper
https://portal.mardi4nfdi.de/entity/Q61262252024-04-09Paper
Correlation intractability and SNARGs from sub-exponential DDH2024-02-06Paper
A note on non-interactive zero-knowledge from CDH2024-02-06Paper
Cryptography with weights: MPC, encryption and signatures2024-02-02Paper
End-to-end secure messaging with traceability only for illegal content2023-12-08Paper
Credibility in private set membership2023-11-16Paper
Steganography-free zero-knowledge2023-08-14Paper
Oblivious transfer from trapdoor permutations in minimal rounds2023-04-13Paper
On communication models and best-achievable security in two-round MPC2023-04-13Paper
Towards efficiency-preserving round compression in MPC. Do fewer rounds mean more computation?2023-03-29Paper
The round complexity of secure computation against covert adversaries2022-12-16Paper
Secure multiparty computation with free branching2022-08-30Paper
Non-interactive batch arguments for NP from standard assumptions2022-05-18Paper
Round optimal secure multiparty computation from minimal assumptions2022-03-23Paper
Effects of large aromatic precursors on soot formation in turbulent non-premixed sooting jet flames2022-02-16Paper
Non-interactive zero knowledge from sub-exponential DDH2021-12-08Paper
Order-C secure multiparty computation for highly repetitive circuits2021-12-08Paper
Unbounded multi-party computation from learning with errors2021-12-08Paper
Statistical Zaps and new oblivious transfer protocols2021-12-01Paper
Multi-key fully-homomorphic encryption in the plain model2021-12-01Paper
https://portal.mardi4nfdi.de/entity/Q50026942021-07-28Paper
The broadcast message complexity of secure multiparty computation2020-05-20Paper
Public-key function-private hidden vector encryption (and more)2020-05-11Paper
UC-secure multiparty computation from one-way functions using stateless tokens2020-05-05Paper
Interactive non-malleable codes2020-04-30Paper
Founding secure computation on blockchains2020-02-06Paper
Two round information-theoretic MPC with malicious security2020-02-06Paper
Non-interactive secure computation from one-way functions2019-01-23Paper
Round-optimal secure multiparty computation with honest majority2018-09-26Paper
Promise zero knowledge and its applications to round optimal MPC2018-09-26Paper
On the existence of three round zero-knowledge proofs2018-07-17Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings2018-07-04Paper
Non-interactive multiparty computation without correlated randomness2018-02-23Paper
Efficient authentication from hard learning problems2018-02-15Paper
Round optimal concurrent MPC via strong simulation2018-01-19Paper
On secure two-party computation in three rounds2018-01-19Paper
Distinguisher-dependent simulation in two rounds and its applications2017-11-15Paper
Indistinguishability obfuscation for Turing machines: constant overhead and amortization2017-11-15Paper
A new approach to round-optimal secure multiparty computation2017-11-03Paper
Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software2017-06-23Paper
Cryptography with Updates2017-06-13Paper
Interactive Coding for Multiparty Protocols2017-05-19Paper
Function-Hiding Inner Product Encryption2016-06-10Paper
Multi-input Functional Encryption for Unbounded Arity Functions2016-06-10Paper
Time-lock puzzles from randomized encodings2016-04-15Paper
Secure multiparty computation with general interaction patterns2016-04-15Paper
Indistinguishability Obfuscation from Compact Functional Encryption2015-12-10Paper
Concurrent Secure Computation with Optimal Query Complexity2015-12-10Paper
Succinct Garbling and Indistinguishability Obfuscation for RAM Programs2015-08-21Paper
Functional Encryption for Randomized Functionalities2015-07-06Paper
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships2014-10-14Paper
On the round complexity of covert computation2014-08-13Paper
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity2014-08-07Paper
Multi-input Functional Encryption2014-05-27Paper
Multiparty computation secure against continual memory leakage2014-05-13Paper
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model2013-12-10Paper
On the Achievability of Simulation-Based Security for Functional Encryption2013-09-17Paper
What Information Is Leaked under Concurrent Composition?2013-09-17Paper
Secure Computation against Adaptive Auxiliary Information2013-09-02Paper
On Concurrently Secure Computation in the Multiple Ideal Query Model2013-05-31Paper
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise2013-03-19Paper
Concurrent Zero Knowledge in the Bounded Player Model2013-03-18Paper
Why “Fiat-Shamir for Proofs” Lacks a Proof2013-03-18Paper
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation2012-09-25Paper
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE2012-06-29Paper
Concurrently Secure Computation in Constant Rounds2012-06-29Paper
Counterexamples to Hardness Amplification beyond Negligible2012-06-15Paper
Hardness Preserving Constructions of Pseudorandom Functions2012-06-15Paper
Leakage-Resilient Zero Knowledge2011-08-12Paper
Efficient Authentication from Hard Learning Problems2011-05-27Paper
Parallel Repetition for Leakage Resilience Amplification Revisited2011-05-19Paper
Bringing People of Different Beliefs Together to Do UC2011-05-19Paper
Password-Authenticated Session-Key Generation on the Internet in the Plain Model2010-08-24Paper
Using cognitive computing to extend the range of Grashof number in numerical simulation of natural convection2009-07-29Paper
Bounded Ciphertext Policy Attribute Based Encryption2008-08-19Paper
Analytical modeling of electrokinetic effects on flow and heat transfer in microchannels2008-02-14Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
https://portal.mardi4nfdi.de/entity/Q44243262003-09-04Paper

Research outcomes over time

This page was built for person: Abhishek Jain