Prabhanjan Ananth

From MaRDI portal
Person:1758158

Available identifiers

zbMath Open ananth.prabhanjan-vijendraMaRDI QIDQ1758158

List of research outcomes





PublicationDate of PublicationType
NIZKs with maliciously chosen CRS: subversion advice-ZK and accountable soundness2025-01-10Paper
A modular approach to unclonable cryptography2024-12-13Paper
Pseudorandom isometries2024-11-13Paper
Revocable cryptography from learning with errors2024-08-15Paper
On the (im)plausibility of public-key quantum money from collision-resistant hash functions2024-06-26Paper
https://portal.mardi4nfdi.de/entity/Q61262252024-04-09Paper
Cloning games: a general framework for unclonable primitives2024-02-06Paper
Collusion-resistant functional encryption for RAMs2023-08-25Paper
Pseudorandom (function-Like) quantum state generators: new definitions and applications2023-08-14Paper
On the feasibility of unclonable encryption, and more2023-06-28Paper
Cryptography from pseudorandom quantum states2023-06-12Paper
Unclonable encryption, revisited2023-03-31Paper
Towards efficiency-preserving round compression in MPC. Do fewer rounds mean more computation?2023-03-29Paper
On the concurrent composition of quantum zero-knowledge2022-03-31Paper
Secure quantum extraction protocols2022-03-23Paper
Secure software leasing2021-12-08Paper
Unbounded multi-party computation from learning with errors2021-12-08Paper
Towards accountability in CRS generation2021-12-08Paper
Multi-key fully-homomorphic encryption in the plain model2021-12-01Paper
Private circuits: a modular approach2020-06-30Paper
Towards attribute-based encryption for RAMs from LWE: sub-linear decryption, and more2020-05-20Paper
Optimal bounded-collusion secure functional encryption2020-04-30Paper
From FE combiners to secure MPC and back2020-04-30Paper
Fully homomorphic NIZK and NIWI proofs2020-04-30Paper
Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification2020-03-09Paper
Two round information-theoretic MPC with malicious security2020-02-06Paper
Succinct garbling schemes from functional encryption through a local simulation paradigm2018-12-06Paper
Round-optimal secure multiparty computation with honest majority2018-09-26Paper
On secure two-party computation in three rounds2018-01-19Paper
Indistinguishability obfuscation for Turing machines: constant overhead and amortization2017-11-15Paper
A new approach to round-optimal secure multiparty computation2017-11-03Paper
Patchable indistinguishability obfuscation: \(i\mathcal {O}\) for evolving software2017-06-23Paper
Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps2017-06-13Paper
Robust transforming combiners from indistinguishability obfuscation to functional encryption2017-06-13Paper
Cryptography with updates2017-06-13Paper
Delegating RAM computations with adaptive soundness and privacy2016-12-22Paper
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption2016-10-27Paper
Functional Encryption for Turing Machines2016-03-23Paper
Indistinguishability obfuscation from compact functional encryption2015-12-10Paper
From selective to adaptive security in functional encryption2015-12-10Paper
Border basis detection is NP-complete2015-06-09Paper
Interactive proofs under continual memory leakage2014-08-07Paper
Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing2014-03-25Paper
Lower Bounds in the Hardware Token Model2014-02-18Paper
Non observability in the random oracle model2013-10-23Paper
On the (in)security of Fischlin's paradigm2013-03-18Paper
Complexity of Gröbner basis detection and border basis detection2012-11-08Paper
An Algebraic Characterization of Rainbow Connectivity2012-09-21Paper
Rainbow connectivity: hardness and tractability2012-08-31Paper

Research outcomes over time

This page was built for person: Prabhanjan Ananth