Akshayaram Srinivasan

From MaRDI portal
Person:775970

Available identifiers

zbMath Open srinivasan.akshayaramMaRDI QIDQ775970

List of research outcomes





PublicationDate of PublicationType
Two-round maliciously-secure oblivious transfer with optimal rate2024-11-13Paper
Rate-1 fully local somewhere extractable hashing from DDH2024-11-12Paper
https://portal.mardi4nfdi.de/entity/Q61262522024-04-09Paper
Secure computation with shared EPR pairs (or: how to teleport in zero-knowledge)2024-02-06Paper
Round-optimal black-box MPC in the plain model2024-02-02Paper
Reusable secure computation in the plain model2024-02-02Paper
A framework for statistically sender private OT with optimal rate2024-02-02Paper
Black-box reusable NISC with random oracles2023-12-08Paper
Round-optimal black-box secure computation from two-round malicious OT2023-08-14Paper
Fully-secure MPC with minimal trust2023-08-14Paper
Two-round Multiparty Secure Computation from Minimal Assumptions2023-04-27Paper
https://portal.mardi4nfdi.de/entity/Q58757782023-02-03Paper
Nearly optimal robust secret sharing against rushing adversaries2022-12-07Paper
Round-optimal black-box protocol compilers2022-08-30Paper
SNARGs for P from sub-exponential DDH and QR2022-08-30Paper
Reusable Two-Round MPC from LPN2022-07-08Paper
Efficiently Obfuscating Re-Encryption Program Under DDH Assumption2022-07-01Paper
On the round complexity of black-box secure MPC2022-04-22Paper
Three-round secure multiparty computation from black-box two-round oblivious transfer2022-04-22Paper
Improved computational extractors and their applications2022-04-22Paper
Traceable secret sharing and applications2022-04-22Paper
Correction to: ``Unconditionally secure computation against low-complexity leakage2022-03-03Paper
Multi-source non-malleable extractors and applications2021-12-08Paper
Correction to: ``Unconditionally secure computation against low-complexity leakage2021-11-24Paper
Unconditionally secure computation against low-complexity leakage2021-09-10Paper
Two-round multiparty secure computation minimizing public key operations2020-06-30Paper
Adaptive garbled RAM from laconic oblivious transfer2020-06-30Paper
Leakage resilient secret sharing and applications2020-03-09Paper
Unconditionally secure computation against low-complexity leakage2020-03-09Paper
Revisiting non-malleable secret sharing2020-02-04Paper
Two-round MPC: information-theoretic and black-box2018-12-11Paper
Round optimal black-box ``commit-and-prove2018-12-11Paper
A simple construction of iO for Turing machines2018-12-06Paper
Adaptively secure garbling with near optimal online complexity2018-07-09Paper
Two-round multiparty secure computation from minimal assumptions2018-07-09Paper
Breaking the Sub-Exponential Barrier in Obfustopia2017-06-23Paper
Secure Obfuscation in a Weak Multilinear Map Model2016-12-22Paper
Single-Key to Multi-Key Functional Encryption with Polynomial Loss2016-12-22Paper
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium2016-10-27Paper

Research outcomes over time

This page was built for person: Akshayaram Srinivasan