Aayush Jain

From MaRDI portal
(Redirected from Person:827273)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Lossy cryptography from code-based assumptions2024-12-13Paper
A systematic study of sparse LWE2024-12-13Paper
Non-interactive zero-knowledge from LPN and MQ2024-12-13Paper
Indistinguishability obfuscation
International Congress of Mathematicians
2024-03-20Paper
The pseudorandom oracle model and ideal obfuscation
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Computational wiretap coding from indistinguishability obfuscation
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Multi-party homomorphic secret sharing and sublinear MPC from sparse LPN
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
On the optimal succinctness and efficiency of functional encryption and attribute-based encryption
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Maliciously-secure MrNISC in the plain model
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Indistinguishability obfuscation from well-founded assumptions
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing
2023-11-14Paper
Secure MPC: laziness leads to GOD2023-03-29Paper
scientific article; zbMATH DE number 7650430 (Why is no real title available?)2023-02-03Paper
Amplifying the security of functional encryption, unconditionally2022-11-09Paper
Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)2022-08-30Paper
Counterexamples to new circular security assumptions underlying iO2022-04-22Paper
Multiparty reusable non-interactive secure computation from LWE2021-12-08Paper
Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification2021-12-08Paper
Combiners for functional encryption, unconditionally2021-12-01Paper
Statistical ZAP arguments2021-12-01Paper
Performance analysis of non-banking finance companies using two-stage data envelopment analysis
Annals of Operations Research
2021-01-07Paper
From FE combiners to secure MPC and back2020-04-30Paper
Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification2020-03-09Paper
Simultaneous amplification: the case of non-interactive zero-knowledge2020-03-09Paper
Sum-of-squares meets program obfuscation, revisited2020-02-04Paper
How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)2020-02-04Paper
Non-trivial witness encryption and null-iO from standard assumptions2018-10-17Paper
scientific article; zbMATH DE number 6866298 (Why is no real title available?)2018-05-03Paper
Robust transforming combiners from indistinguishability obfuscation to functional encryption
Lecture Notes in Computer Science
2017-06-13Paper
Verifiable functional encryption
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Multi-input functional encryption with unbounded-message security
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper


Research outcomes over time


This page was built for person: Aayush Jain