Sanjam Garg

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Policy compliant secure messaging
 
2026-03-31Paper
How to prove statements obliviously?
 
2025-01-10Paper
Threshold encryption with silent setup
 
2024-12-13Paper
Scalable multiparty computation from non-linear secret sharing
 
2024-12-13Paper
Laconic branching programs from the Diffie-Hellman assumption
 
2024-11-12Paper
Factoring and pairings are not necessary for iO: circular-secure LWE suffices
 
2024-06-24Paper
Correlation intractability and SNARGs from sub-exponential DDH
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Cryptography with weights: MPC, encryption and signatures
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
End-to-end secure messaging with traceability only for illegal content
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Credibility in private set membership
Lecture Notes in Computer Science
2023-11-16Paper
On the worst-case inefficiency of CGKA
Theory of Cryptography
2023-08-14Paper
IBE with incompressible master secret and small identity secrets
Theory of Cryptography
2023-08-14Paper
Candidate iO from homomorphic encryption schemes
Journal of Cryptology
2023-07-26Paper
A more complete analysis of the signal double ratchet algorithm
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
How to build a trapdoor function from an encryption scheme
Lecture Notes in Computer Science
2023-05-12Paper
Two-round Multiparty Secure Computation from Minimal Assumptions
Journal of the ACM
2023-04-27Paper
Laconic private set intersection and applications
 
2023-04-13Paper
Amortizing rate-1 OT and applications to PIR and PSI
 
2023-04-13Paper
Ad Hoc Multi-Input Functional Encryption.
 
2023-02-03Paper
scientific article; zbMATH DE number 7650419 (Why is no real title available?)
 
2023-02-03Paper
Tight verifiable delay functions
 
2022-12-16Paper
Black-box constructions of bounded-concurrent secure computation
 
2022-12-16Paper
Identity-based Encryption from the Diffie-Hellman Assumption
Journal of the ACM
2022-12-08Paper
Master-key KDM-secure IBE from pairings
Lecture Notes in Computer Science
2022-10-13Paper
Reusable two-round MPC from LPN
Public-Key Cryptography – PKC 2022
2022-07-08Paper
Compact ring signatures from learning with errors
 
2022-03-31Paper
Two-round oblivious transfer from CDH or LPN
 
2022-03-23Paper
Reusable two-round MPC from DDH
 
2022-03-23Paper
Formalizing data deletion in the context of the right to be forgotten
 
2022-03-23Paper
Constant ciphertext-rate non-committing encryption from standard assumptions
 
2021-12-01Paper
Candidate iO from homomorphic encryption schemes
 
2021-12-01Paper
Efficient range-trapdoor functions and applications: rate-1 OT and more
 
2021-12-01Paper
FHE-based bootstrapping of designated-prover NIZK
 
2021-12-01Paper
Two-round multiparty secure computation minimizing public key operations
 
2020-06-30Paper
Limits on the power of garbling techniques for public-key encryption
 
2020-06-30Paper
Adaptive garbled RAM from laconic oblivious transfer
 
2020-06-30Paper
On the round complexity of OT extension
 
2020-06-30Paper
Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
 
2020-05-27Paper
The broadcast message complexity of secure multiparty computation
 
2020-05-20Paper
Rate-1 trapdoor functions from the Diffie-Hellman problem
 
2020-05-11Paper
Leveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzles
 
2020-04-30Paper
Trapdoor hash functions and their applications
 
2020-03-09Paper
New techniques for efficient trapdoor functions and applications
 
2020-02-04Paper
Registration-based encryption from standard assumptions
 
2020-01-28Paper
Obfuscation from low noise multilinear maps
 
2019-03-29Paper
Two-round MPC: information-theoretic and black-box
 
2018-12-11Paper
Registration-based encryption: removing private-key generator from IBE
 
2018-12-11Paper
A simple construction of iO for Turing machines
 
2018-12-06Paper
Trapdoor functions from the computational Diffie-Hellman assumption
 
2018-09-26Paper
Adaptively secure garbling with near optimal online complexity
 
2018-07-09Paper
Two-round multiparty secure computation from minimal assumptions
 
2018-07-09Paper
A new approach to black-box concurrent secure computation
 
2018-07-09Paper
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
SIAM Journal on Computing
2018-07-04Paper
New constructions of identity-based and key-dependent message secure encryption schemes
 
2018-05-16Paper
Two-message witness indistinguishability and secure computation in the plain model from new assumptions
 
2018-02-23Paper
From selective IBE to full IBE and selective HIBE
 
2018-01-19Paper
When does functional encryption imply obfuscation?
 
2018-01-19Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
Algorithmica
2018-01-05Paper
Laconic oblivious transfer and its applications
 
2017-11-15Paper
Incremental program obfuscation
 
2017-11-15Paper
Identity-based encryption from the Diffie-Hellman assumption
 
2017-11-03Paper
Lower bounds on obfuscation from all-or-nothing encryption primitives
 
2017-11-03Paper
Breaking the sub-exponential barrier in obfustopia
Lecture Notes in Computer Science
2017-06-23Paper
On the exact round complexity of self-composable two-party computation
Lecture Notes in Computer Science
2017-06-13Paper
Secure Obfuscation in a Weak Multilinear Map Model
Theory of Cryptography
2016-12-22Paper
Single-key to multi-key functional encryption with polynomial loss
Theory of Cryptography
2016-12-22Paper
Secure multiparty RAM computation in constant rounds
Theory of Cryptography
2016-12-21Paper
\textbf{TWORAM:} efficient oblivious RAM in two rounds with applications to searchable encryption
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
The Exact Round Complexity of Secure Computation
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Candidate indistinguishability obfuscation and functional encryption for all circuits
SIAM Journal on Computing
2016-07-04Paper
Functional encryption without obfuscation
Theory of Cryptography
2016-04-08Paper
Cryptography with One-Way Communication
Lecture Notes in Computer Science
2015-12-10Paper
Balancing output length and query bound in hardness preserving constructions of pseudorandom functions
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Succinct randomized encodings and their applications
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
2015-08-21Paper
Garbled RAM from one-way functions
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
2015-08-21Paper
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation
Theory of Cryptography
2015-07-06Paper
Witness encryption and its applications
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Protecting obfuscation against algebraic attacks
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Efficient Round Optimal Blind Signatures
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Cross-domain secure computation
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Two-round secure MPC from indistinguishability obfuscation
Theory of Cryptography
2014-02-18Paper
Attribute-based encryption for circuits from multilinear maps
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Secure computation against adaptive auxiliary information
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Candidate Multilinear Maps from Ideal Lattices
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Why ``Fiat-Shamir for proofs lacks a proof
Theory of Cryptography
2013-03-18Paper
Adaptively secure multi-party computation with dishonest majority
Lecture Notes in Computer Science
2012-09-25Paper
Impossibility results for static input secure computation
Lecture Notes in Computer Science
2012-09-25Paper
Concurrently secure computation in constant rounds
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Resettable statistical zero knowledge
Theory of Cryptography
2012-06-15Paper
Leakage-resilient zero knowledge
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Round optimal blind signatures
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Bringing people of different beliefs together to do UC
Theory of Cryptography
2011-05-19Paper
Improved Bounds on Security Reductions for Discrete Log Based Signatures
Lecture Notes in Computer Science
2009-02-10Paper


Research outcomes over time


This page was built for person: Sanjam Garg