Sanjam Garg

From MaRDI portal
Person:775968

Available identifiers

zbMath Open garg.sanjamMaRDI QIDQ775968

List of research outcomes

PublicationDate of PublicationType
Correlation intractability and SNARGs from sub-exponential DDH2024-02-06Paper
Cryptography with weights: MPC, encryption and signatures2024-02-02Paper
End-to-end secure messaging with traceability only for illegal content2023-12-08Paper
Credibility in private set membership2023-11-16Paper
IBE with incompressible master secret and small identity secrets2023-08-14Paper
On the worst-case inefficiency of CGKA2023-08-14Paper
Candidate iO from homomorphic encryption schemes2023-07-26Paper
A more complete analysis of the signal double ratchet algorithm2023-06-12Paper
How to build a trapdoor function from an encryption scheme2023-05-12Paper
Two-round Multiparty Secure Computation from Minimal Assumptions2023-04-27Paper
Laconic private set intersection and applications2023-04-13Paper
Amortizing rate-1 OT and applications to PIR and PSI2023-04-13Paper
https://portal.mardi4nfdi.de/entity/Q58757402023-02-03Paper
https://portal.mardi4nfdi.de/entity/Q58757782023-02-03Paper
Tight verifiable delay functions2022-12-16Paper
Black-box constructions of bounded-concurrent secure computation2022-12-16Paper
Identity-based Encryption from the Diffie-Hellman Assumption2022-12-08Paper
Master-Key KDM-Secure IBE from Pairings2022-10-13Paper
Reusable Two-Round MPC from LPN2022-07-08Paper
Compact ring signatures from learning with errors2022-03-31Paper
Formalizing data deletion in the context of the right to be forgotten2022-03-23Paper
Two-round oblivious transfer from CDH or LPN2022-03-23Paper
Reusable two-round MPC from DDH2022-03-23Paper
Candidate iO from homomorphic encryption schemes2021-12-01Paper
Constant ciphertext-rate non-committing encryption from standard assumptions2021-12-01Paper
Efficient range-trapdoor functions and applications: rate-1 OT and more2021-12-01Paper
FHE-based bootstrapping of designated-prover NIZK2021-12-01Paper
Two-round multiparty secure computation minimizing public key operations2020-06-30Paper
Limits on the power of garbling techniques for public-key encryption2020-06-30Paper
Adaptive garbled RAM from laconic oblivious transfer2020-06-30Paper
On the round complexity of OT extension2020-06-30Paper
https://portal.mardi4nfdi.de/entity/Q51113692020-05-27Paper
The broadcast message complexity of secure multiparty computation2020-05-20Paper
Rate-1 trapdoor functions from the Diffie-Hellman problem2020-05-11Paper
Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles2020-04-30Paper
Trapdoor hash functions and their applications2020-03-09Paper
New techniques for efficient trapdoor functions and applications2020-02-04Paper
Registration-based encryption from standard assumptions2020-01-28Paper
Obfuscation from low noise multilinear maps2019-03-29Paper
Two-round MPC: information-theoretic and black-box2018-12-11Paper
Registration-based encryption: removing private-key generator from IBE2018-12-11Paper
A simple construction of iO for Turing machines2018-12-06Paper
Trapdoor functions from the computational Diffie-Hellman assumption2018-09-26Paper
Two-round multiparty secure computation from minimal assumptions2018-07-09Paper
Adaptively secure garbling with near optimal online complexity2018-07-09Paper
A new approach to black-box concurrent secure computation2018-07-09Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings2018-07-04Paper
New constructions of identity-based and key-dependent message secure encryption schemes2018-05-16Paper
Two-message witness indistinguishability and secure computation in the plain model from new assumptions2018-02-23Paper
When does functional encryption imply obfuscation?2018-01-19Paper
From selective IBE to full IBE and selective HIBE2018-01-19Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input2018-01-05Paper
Laconic oblivious transfer and its applications2017-11-15Paper
Incremental program obfuscation2017-11-15Paper
Identity-based encryption from the Diffie-Hellman assumption2017-11-03Paper
Lower bounds on obfuscation from all-or-nothing encryption primitives2017-11-03Paper
Breaking the Sub-Exponential Barrier in Obfustopia2017-06-23Paper
On the Exact Round Complexity of Self-composable Two-Party Computation2017-06-13Paper
Secure Obfuscation in a Weak Multilinear Map Model2016-12-22Paper
Single-Key to Multi-Key Functional Encryption with Polynomial Loss2016-12-22Paper
Secure Multiparty RAM Computation in Constant Rounds2016-12-21Paper
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption2016-11-09Paper
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium2016-10-27Paper
The Exact Round Complexity of Secure Computation2016-07-15Paper
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits2016-07-04Paper
Functional Encryption Without Obfuscation2016-04-08Paper
Cryptography with One-Way Communication2015-12-10Paper
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions2015-09-10Paper
Succinct Randomized Encodings and their Applications2015-08-21Paper
Garbled RAM From One-Way Functions2015-08-21Paper
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation2015-07-06Paper
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input2014-08-07Paper
Witness encryption and its applications2014-08-07Paper
Protecting Obfuscation against Algebraic Attacks2014-05-27Paper
Efficient Round Optimal Blind Signatures2014-05-27Paper
Cross-Domain Secure Computation2014-03-25Paper
Two-Round Secure MPC from Indistinguishability Obfuscation2014-02-18Paper
Attribute-Based Encryption for Circuits from Multilinear Maps2013-09-17Paper
Secure Computation against Adaptive Auxiliary Information2013-09-02Paper
Candidate Multilinear Maps from Ideal Lattices2013-05-31Paper
Why “Fiat-Shamir for Proofs” Lacks a Proof2013-03-18Paper
Adaptively Secure Multi-Party Computation with Dishonest Majority2012-09-25Paper
Impossibility Results for Static Input Secure Computation2012-09-25Paper
Concurrently Secure Computation in Constant Rounds2012-06-29Paper
Resettable Statistical Zero Knowledge2012-06-15Paper
Leakage-Resilient Zero Knowledge2011-08-12Paper
Round Optimal Blind Signatures2011-08-12Paper
Bringing People of Different Beliefs Together to Do UC2011-05-19Paper
Improved Bounds on Security Reductions for Discrete Log Based Signatures2009-02-10Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Sanjam Garg