Akshayaram Srinivasan

From MaRDI portal
(Redirected from Person:775970)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Two-round maliciously-secure oblivious transfer with optimal rate2024-11-13Paper
Rate-1 fully local somewhere extractable hashing from DDH2024-11-12Paper
scientific article; zbMATH DE number 7829258 (Why is no real title available?)2024-04-09Paper
Secure computation with shared EPR pairs (or: how to teleport in zero-knowledge)
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Round-optimal black-box MPC in the plain model
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Reusable secure computation in the plain model
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
A framework for statistically sender private OT with optimal rate
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Black-box reusable NISC with random oracles
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Round-optimal black-box secure computation from two-round malicious OT
Theory of Cryptography
2023-08-14Paper
Fully-secure MPC with minimal trust
Theory of Cryptography
2023-08-14Paper
Two-round Multiparty Secure Computation from Minimal Assumptions
Journal of the ACM
2023-04-27Paper
scientific article; zbMATH DE number 7650419 (Why is no real title available?)2023-02-03Paper
Nearly optimal robust secret sharing against rushing adversaries2022-12-07Paper
Round-optimal black-box protocol compilers2022-08-30Paper
SNARGs for P from sub-exponential DDH and QR2022-08-30Paper
Reusable two-round MPC from LPN
Public-Key Cryptography – PKC 2022
2022-07-08Paper
Efficiently obfuscating re-encryption program under DDH assumption2022-07-01Paper
On the round complexity of black-box secure MPC2022-04-22Paper
Three-round secure multiparty computation from black-box two-round oblivious transfer2022-04-22Paper
Improved computational extractors and their applications2022-04-22Paper
Traceable secret sharing and applications2022-04-22Paper
Correction to: ``Unconditionally secure computation against low-complexity leakage
Journal of Cryptology
2022-03-03Paper
Multi-source non-malleable extractors and applications2021-12-08Paper
Correction to: ``Unconditionally secure computation against low-complexity leakage
Journal of Cryptology
2021-11-24Paper
Unconditionally secure computation against low-complexity leakage
Journal of Cryptology
2021-09-10Paper
Two-round multiparty secure computation minimizing public key operations2020-06-30Paper
Adaptive garbled RAM from laconic oblivious transfer2020-06-30Paper
Leakage resilient secret sharing and applications2020-03-09Paper
Unconditionally secure computation against low-complexity leakage
Advances in Cryptology – CRYPTO 2019
2020-03-09Paper
Revisiting non-malleable secret sharing2020-02-04Paper
Two-round MPC: information-theoretic and black-box2018-12-11Paper
Round optimal black-box ``commit-and-prove2018-12-11Paper
A simple construction of iO for Turing machines2018-12-06Paper
Adaptively secure garbling with near optimal online complexity2018-07-09Paper
Two-round multiparty secure computation from minimal assumptions2018-07-09Paper
Breaking the sub-exponential barrier in obfustopia
Lecture Notes in Computer Science
2017-06-23Paper
Secure Obfuscation in a Weak Multilinear Map Model
Theory of Cryptography
2016-12-22Paper
Single-key to multi-key functional encryption with polynomial loss
Theory of Cryptography
2016-12-22Paper
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper


Research outcomes over time


This page was built for person: Akshayaram Srinivasan