default search action
Abhishek Jain 0002
Person information
- affiliation: Johns Hopkins University, USA
- affiliation: MIT
- affiliation: UCLA
Other persons with the same name
- Abhishek Jain — disambiguation page
- Abhishek Jain 0001 — Colorado State University, Fort Collins, CO, USA
- Abhishek Jain 0003 — STMicroelectronics, Greater Noida, India (and 2 more)
- Abhishek Jain 0004 — Georgia Institute of Technology, Atlanta, GA, USA
- Abhishek Jain 0005 — North Carolina State University, Department of Electrical Engineering, Raleigh, NC, USA
- Abhishek Jain 0006 — State University of New York, Cloud and Big Data Laboratory, Binghamton, NY, USA
- Abhishek Jain 0007 — Indian Institute of Technology, Department of Electronics and Electrical Communication Engineering Kharagpur, India
- Abhishek Jain 0008 — Thapar Institute of Engineering and Technology, Department of Computer Science and Engineering, Patiala, India
- Abhishek Jain 0009 — Amity University, Computer Science and Engineering, Amity School of Engineering and Technology, Noida, India
- Abhishek Jain 0010 — Rensselaer Polytechnic Institute, Department of Mechanical, AeroSpace and Nuclear Engineering, Troy, NY, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c88]Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Mingyuan Wang:
Scalable Multiparty Computation from Non-linear Secret Sharing. CRYPTO (8) 2024: 384-417 - [c87]Maya Farber Brodsky, Arka Rai Choudhuri, Abhishek Jain, Omer Paneth:
Monotone-Policy Aggregate Signatures. EUROCRYPT (4) 2024: 168-195 - [c86]Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
hinTS: Threshold Signatures with Silent Setup. SP 2024: 3034-3052 - [c85]Harry Eldridge, Gabrielle Beck, Matthew Green, Nadia Heninger, Abhishek Jain:
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem. USENIX Security Symposium 2024 - [i73]Maya Farber Brodsky, Arka Rai Choudhuri, Abhishek Jain, Omer Paneth:
Monotone-Policy Aggregate Signatures. IACR Cryptol. ePrint Arch. 2024: 899 (2024) - [i72]Pedro Branco, Arka Rai Choudhuri, Nico Döttling, Abhishek Jain, Giulio Malavolta, Akshayaram Srinivasan:
Black-Box Non-Interactive Zero Knowledge from Vector Trapdoor Hash. IACR Cryptol. ePrint Arch. 2024: 1514 (2024) - [i71]Pedro Branco, Nico Döttling, Abhishek Jain, Giulio Malavolta, Surya Mathialagan, Spencer Peters, Vinod Vaikuntanathan:
Pseudorandom Obfuscation and Applications. IACR Cryptol. ePrint Arch. 2024: 1742 (2024) - 2023
- [j4]Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari:
Time-Deniable Signatures. Proc. Priv. Enhancing Technol. 2023(3): 79-102 (2023) - [c84]Matthew Green, Abhishek Jain, Gijs Van Laer:
Efficient Set Membership Encryption and Applications. CCS 2023: 1080-1092 - [c83]Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, Gabriel Kaptchuk:
Scalable Multiparty Garbling. CCS 2023: 2158-2172 - [c82]Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Cryptography with Weights: MPC, Encryption and Signatures. CRYPTO (1) 2023: 295-327 - [c81]Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Jiaheng Zhang:
Correlation Intractability and SNARGs from Sub-exponential DDH. CRYPTO (4) 2023: 635-668 - [c80]Geoffroy Couteau, Abhishek Jain, Zhengzhong Jin, Willy Quach:
A Note on Non-interactive Zero-Knowledge from CDH. CRYPTO (4) 2023: 731-764 - [c79]James Bartusek, Sanjam Garg, Abhishek Jain, Guru-Vamsi Policharla:
End-to-End Secure Messaging with Traceability Only for Illegal Content. EUROCRYPT (5) 2023: 35-66 - [c78]Sanjam Garg, Mohammad Hajiabadi, Abhishek Jain, Zhengzhong Jin, Omkant Pandey, Sina Shiehian:
Credibility in Private Set Membership. Public Key Cryptography (2) 2023: 159-189 - [c77]Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Threshold Signatures in the Multiverse. SP 2023: 1454-1470 - [c76]Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, Sruthi Sekar:
zkSaaS: Zero-Knowledge SNARKs as a Service. USENIX Security Symposium 2023: 4427-4444 - [i70]Leemon Baird, Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Threshold Signatures in the Multiverse. IACR Cryptol. ePrint Arch. 2023: 63 (2023) - [i69]Gabrielle Beck, Aarushi Goel, Aditya Hegde, Abhishek Jain, Zhengzhong Jin, Gabriel Kaptchuk:
Scalable Multiparty Garbling. IACR Cryptol. ePrint Arch. 2023: 99 (2023) - [i68]Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
hinTS: Threshold Signatures with Silent Setup. IACR Cryptol. ePrint Arch. 2023: 567 (2023) - [i67]Aarushi Goel, Mathias Hall-Andersen, Aditya Hegde, Abhishek Jain:
Secure Multiparty Computation with Free Branching. IACR Cryptol. ePrint Arch. 2023: 901 (2023) - [i66]Sanjam Garg, Aarushi Goel, Abhishek Jain, Guru-Vamsi Policharla, Sruthi Sekar:
zkSaaS: Zero-Knowledge SNARKs as a Service. IACR Cryptol. ePrint Arch. 2023: 905 (2023) - [i65]Geoffroy Couteau, Abhishek Jain, Zhengzhong Jin, Willy Quach:
A Note on Non-Interactive Zero-Knowledge from CDH. IACR Cryptol. ePrint Arch. 2023: 970 (2023) - [i64]Gabrielle Beck, Harry Eldridge, Matthew Green, Nadia Heninger, Abhishek Jain:
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem. IACR Cryptol. ePrint Arch. 2023: 1332 (2023) - 2022
- [c75]Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Yinuo Zhang:
Succinct Zero Knowledge for Floating Point Computations. CCS 2022: 1203-1216 - [c74]Aarushi Goel, Mathias Hall-Andersen, Aditya Hegde, Abhishek Jain:
Secure Multiparty Computation with Free Branching. EUROCRYPT (1) 2022: 397-426 - [c73]Abhishek Jain, Zhengzhong Jin:
Indistinguishability Obfuscation via Mathematical Proofs of Equivalence. FOCS 2022: 1023-1034 - [c72]Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta:
Pre-Constrained Encryption. ITCS 2022: 4:1-4:20 - [c71]Harry Eldridge, Aarushi Goel, Matthew Green, Abhishek Jain, Maximilian Zinkus:
One-Time Programs from Commodity Hardware. TCC (3) 2022: 121-150 - [c70]Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta:
Steganography-Free Zero-Knowledge. TCC (1) 2022: 143-172 - [i63]Gabrielle Beck, Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Pratyush Ranjan Tiwari:
Time-Deniable Signatures. IACR Cryptol. ePrint Arch. 2022: 1018 (2022) - [i62]Harry Eldridge, Aarushi Goel, Matthew Green, Abhishek Jain, Maximilian Zinkus:
One-Time Programs from Commodity Hardware. IACR Cryptol. ePrint Arch. 2022: 1257 (2022) - [i61]Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta:
Steganography-Free Zero-Knowledge. IACR Cryptol. ePrint Arch. 2022: 1263 (2022) - [i60]Abhishek Jain, Zhengzhong Jin:
Indistinguishability Obfuscation via Mathematical Proofs of Equivalence. IACR Cryptol. ePrint Arch. 2022: 1430 (2022) - [i59]Arka Rai Choudhuri, Sanjam Garg, Abhishek Jain, Zhengzhong Jin, Jiaheng Zhang:
Correlation Intractability and SNARGs from Sub-exponential DDH. IACR Cryptol. ePrint Arch. 2022: 1486 (2022) - [i58]Sanjam Garg, Abhishek Jain, Pratyay Mukherjee, Rohit Sinha, Mingyuan Wang, Yinuo Zhang:
Cryptography with Weights: MPC, Encryption and Signatures. IACR Cryptol. ePrint Arch. 2022: 1632 (2022) - [i57]James Bartusek, Sanjam Garg, Abhishek Jain, Guru-Vamsi Policharla:
End-to-End Secure Messaging with Traceability Only for Illegal Content. IACR Cryptol. ePrint Arch. 2022: 1643 (2022) - 2021
- [c69]Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain, Gabriel Kaptchuk:
Fluid MPC: Secure Multiparty Computation with Dynamic Participants. CRYPTO (2) 2021: 94-123 - [c68]Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin:
Non-interactive Batch Arguments for NP from Standard Assumptions. CRYPTO (4) 2021: 394-423 - [c67]Abhishek Jain, Zhengzhong Jin:
Non-interactive Zero Knowledge from Sub-exponential DDH. EUROCRYPT (1) 2021: 3-32 - [c66]Gabrielle Beck, Aarushi Goel, Abhishek Jain, Gabriel Kaptchuk:
Order-C Secure Multiparty Computation for Highly Repetitive Circuits. EUROCRYPT (2) 2021: 663-693 - [c65]Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta:
Unbounded Multi-party Computation from Learning with Errors. EUROCRYPT (2) 2021: 754-781 - [c64]Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin:
SNARGs for $\mathcal{P}$ from LWE. FOCS 2021: 68-79 - [c63]Aarushi Goel, Abhishek Jain, Manoj Prabhakaran, Rajeev Raghunath:
On Communication Models and Best-Achievable Security in Two-Round MPC. TCC (2) 2021: 97-128 - [c62]Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky:
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds. TCC (2) 2021: 518-549 - [i56]Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta:
Unbounded Multi-Party Computation from Learning with Errors. IACR Cryptol. ePrint Arch. 2021: 431 (2021) - [i55]Gabrielle Beck, Aarushi Goel, Abhishek Jain, Gabriel Kaptchuk:
Order-C Secure Multiparty Computation for Highly Repetitive Circuits. IACR Cryptol. ePrint Arch. 2021: 500 (2021) - [i54]Abhishek Jain, Zhengzhong Jin:
Non-Interactive Zero Knowledge from Sub-exponential DDH. IACR Cryptol. ePrint Arch. 2021: 514 (2021) - [i53]Aarushi Goel, Abhishek Jain, Manoj Prabhakaran, Rajeev Raghunath:
On Communication Models and Best-Achievable Security in Two-Round MPC. IACR Cryptol. ePrint Arch. 2021: 690 (2021) - [i52]Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin:
Non-Interactive Batch Arguments for NP from Standard Assumptions. IACR Cryptol. ePrint Arch. 2021: 807 (2021) - [i51]Arka Rai Choudhuri, Abhishek Jain, Zhengzhong Jin:
SNARGs for P from LWE. IACR Cryptol. ePrint Arch. 2021: 808 (2021) - [i50]Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky:
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds. IACR Cryptol. ePrint Arch. 2021: 1433 (2021) - 2020
- [j3]Nathan Manohar, Abhishek Jain, Amit Sahai:
Self-Processing Private Sensor Data via Garbled Encryption. Proc. Priv. Enhancing Technol. 2020(4): 434-460 (2020) - [c61]Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain:
Towards Efficiency-Preserving Round Compression in MPC - Do Fewer Rounds Mean More Computation? ASIACRYPT (3) 2020: 181-212 - [c60]Vipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta:
Statistical Zaps and New Oblivious Transfer Protocols. EUROCRYPT (3) 2020: 668-699 - [c59]Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain:
The Round Complexity of Secure Computation Against Covert Adversaries. SCN 2020: 600-620 - [c58]Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta:
Multi-key Fully-Homomorphic Encryption in the Plain Model. TCC (1) 2020: 28-57 - [c57]Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky:
Round Optimal Secure Multiparty Computation from Minimal Assumptions. TCC (2) 2020: 291-319 - [i49]Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin:
Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE). IACR Cryptol. ePrint Arch. 2020: 169 (2020) - [i48]Prabhanjan Ananth, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta:
Multikey FHE in the Plain Model. IACR Cryptol. ePrint Arch. 2020: 180 (2020) - [i47]Vipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta:
Statistical Zaps and New Oblivious Transfer Protocols. IACR Cryptol. ePrint Arch. 2020: 235 (2020) - [i46]Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain, Gabriel Kaptchuk:
Fluid MPC: Secure Multiparty Computation with Dynamic Participants. IACR Cryptol. ePrint Arch. 2020: 754 (2020) - [i45]Nathan Manohar, Abhishek Jain, Amit Sahai:
Self-Processing Private Sensor Data via Garbled Encryption. IACR Cryptol. ePrint Arch. 2020: 950 (2020) - [i44]Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain:
The Round Complexity of Secure Computation Against Covert Adversaries. IACR Cryptol. ePrint Arch. 2020: 1092 (2020) - [i43]Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain:
Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation? IACR Cryptol. ePrint Arch. 2020: 1100 (2020)
2010 – 2019
- 2019
- [c56]Sanjam Garg, Aarushi Goel, Abhishek Jain:
The Broadcast Message Complexity of Secure Multiparty Computation. ASIACRYPT (1) 2019: 426-455 - [c55]James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova:
Public-Key Function-Private Hidden Vector Encryption (and More). ASIACRYPT (3) 2019: 489-519 - [c54]Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti:
UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens. ASIACRYPT (2) 2019: 577-605 - [c53]Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain:
Founding Secure Computation on Blockchains. EUROCRYPT (2) 2019: 351-380 - [c52]Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain:
Two Round Information-Theoretic MPC with Malicious Security. EUROCRYPT (2) 2019: 532-561 - [c51]Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Anat Paskin-Cherniavsky, Slava Radune:
Interactive Non-malleable Codes. TCC (2) 2019: 233-263 - [i42]Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky:
On Round Optimal Secure Multiparty Computation from Minimal Assumptions. IACR Cryptol. ePrint Arch. 2019: 216 (2019) - [i41]Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain:
Founding Secure Computation on Blockchains. IACR Cryptol. ePrint Arch. 2019: 253 (2019) - [i40]James Bartusek, Brent Carmer, Abhishek Jain, Zhengzhong Jin, Tancrède Lepoint, Fermi Ma, Tal Malkin, Alex J. Malozemoff, Mariana Raykova:
Public-Key Function-Private Hidden Vector Encryption (and More). IACR Cryptol. ePrint Arch. 2019: 746 (2019) - [i39]Abhishek Jain, Zhengzhong Jin:
Statistical Zap Arguments from Quasi-Polynomial LWE. IACR Cryptol. ePrint Arch. 2019: 839 (2019) - 2018
- [j2]Nir Bitansky, Ran Canetti, Sanjam Garg, Justin Holmgren, Abhishek Jain, Huijia Lin, Rafael Pass, Sidharth Telang, Vinod Vaikuntanathan:
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings. SIAM J. Comput. 47(3): 1123-1210 (2018) - [c50]Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti:
Non-interactive Secure Computation from One-Way Functions. ASIACRYPT (3) 2018: 118-138 - [c49]Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain:
Round-Optimal Secure Multiparty Computation with Honest Majority. CRYPTO (2) 2018: 395-424 - [c48]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Promise Zero Knowledge and Its Applications to Round Optimal MPC. CRYPTO (2) 2018: 459-487 - [c47]Nils Fleischhacker, Vipul Goyal, Abhishek Jain:
On the Existence of Three Round Zero-Knowledge Proofs. EUROCRYPT (3) 2018: 3-33 - [c46]Elette Boyle, Abhishek Jain, Manoj Prabhakaran, Ching-Hua Yu:
The Bottleneck Complexity of Secure Multiparty Computation. ICALP 2018: 24:1-24:16 - [i38]Nils Fleischhacker, Vipul Goyal, Abhishek Jain:
On the Existence of Three Round Zero-Knowledge Proofs. IACR Cryptol. ePrint Arch. 2018: 167 (2018) - [i37]Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain:
Round-Optimal Secure Multiparty Computation with Honest Majority. IACR Cryptol. ePrint Arch. 2018: 572 (2018) - [i36]Saikrishna Badrinarayanan, Abhishek Jain, Rafail Ostrovsky, Ivan Visconti:
Non-Interactive Secure Computation from One-Way Functions. IACR Cryptol. ePrint Arch. 2018: 1020 (2018) - [i35]Prabhanjan Ananth, Arka Rai Choudhuri, Aarushi Goel, Abhishek Jain:
Two Round Information-Theoretic MPC with Malicious Security. IACR Cryptol. ePrint Arch. 2018: 1078 (2018) - 2017
- [j1]Eike Kiltz, Krzysztof Pietrzak, Daniele Venturi, David Cash, Abhishek Jain:
Efficient Authentication from Hard Learning Problems. J. Cryptol. 30(4): 1238-1275 (2017) - [c45]Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev:
Non-Interactive Multiparty Computation Without Correlated Randomness. ASIACRYPT (3) 2017: 181-211 - [c44]Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers:
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards. CCS 2017: 719-728 - [c43]Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum:
Distinguisher-Dependent Simulation in Two Rounds and its Applications. CRYPTO (2) 2017: 158-189 - [c42]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization. CRYPTO (2) 2017: 252-279 - [c41]Prabhanjan Ananth, Arka Rai Choudhuri, Abhishek Jain:
A New Approach to Round-Optimal Secure Multiparty Computation. CRYPTO (1) 2017: 468-499 - [c40]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Patchable Indistinguishability Obfuscation: iO for Evolving Software. EUROCRYPT (3) 2017: 127-155 - [c39]Prabhanjan Ananth, Aloni Cohen, Abhishek Jain:
Cryptography with Updates. EUROCRYPT (2) 2017: 445-472 - [c38]Prabhanjan Ananth, Abhishek Jain:
On Secure Two-Party Computation in Three Rounds. TCC (1) 2017: 612-644 - [c37]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai:
Round Optimal Concurrent MPC via Strong Simulation. TCC (1) 2017: 743-775 - [i34]Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Ron Rothblum:
Distinguisher-Dependent Simulation in Two Rounds and its Applications. IACR Cryptol. ePrint Arch. 2017: 330 (2017) - [i33]Prabhanjan Ananth, Arka Rai Choudhuri, Abhishek Jain:
A New Approach to Round-Optimal Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2017: 402 (2017) - [i32]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai:
Round Optimal Concurrent MPC via Strong Simulation. IACR Cryptol. ePrint Arch. 2017: 597 (2017) - [i31]Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev:
Non-Interactive Multiparty Computation without Correlated Randomness. IACR Cryptol. ePrint Arch. 2017: 871 (2017) - [i30]Prabhanjan Ananth, Abhishek Jain:
On Secure Two-Party Computation in Three Rounds. IACR Cryptol. ePrint Arch. 2017: 942 (2017) - [i29]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Promise Zero Knowledge and its Applications to Round Optimal MPC. IACR Cryptol. ePrint Arch. 2017: 1088 (2017) - [i28]Arka Rai Choudhuri, Matthew Green, Abhishek Jain, Gabriel Kaptchuk, Ian Miers:
Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards. IACR Cryptol. ePrint Arch. 2017: 1091 (2017) - 2016
- [c36]Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin:
Secure Multiparty Computation with General Interaction Patterns. ITCS 2016: 157-168 - [c35]Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters:
Time-Lock Puzzles from Randomized Encodings. ITCS 2016: 345-356 - [i27]Prabhanjan Ananth, Aloni Cohen, Abhishek Jain:
Cryptography with Updates. IACR Cryptol. ePrint Arch. 2016: 934 (2016) - 2015
- [c34]Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai:
Multi-input Functional Encryption for Unbounded Arity Functions. ASIACRYPT (1) 2015: 27-51 - [c33]Allison Bishop, Abhishek Jain, Lucas Kowalczyk:
Function-Hiding Inner Product Encryption. ASIACRYPT (1) 2015: 470-491 - [c32]Ran Canetti, Vipul Goyal, Abhishek Jain:
Concurrent Secure Computation with Optimal Query Complexity. CRYPTO (2) 2015: 43-62 - [c31]Prabhanjan Ananth, Abhishek Jain:
Indistinguishability Obfuscation from Compact Functional Encryption. CRYPTO (1) 2015: 308-326 - [c30]Abhishek Jain, Yael Tauman Kalai, Allison Bishop Lewko:
Interactive Coding for Multiparty Protocols. ITCS 2015: 1-10 - [c29]Ran Canetti, Justin Holmgren, Abhishek Jain, Vinod Vaikuntanathan:
Succinct Garbling and Indistinguishability Obfuscation for RAM Programs. STOC 2015: 429-437 - [c28]Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai:
Functional Encryption for Randomized Functionalities. TCC (2) 2015: 325-351 - [i26]Prabhanjan Ananth, Abhishek Jain:
Indistinguishability Obfuscation from Compact Functional Encryption. IACR Cryptol. ePrint Arch. 2015: 173 (2015) - [i25]Vipul Goyal, Divya Gupta, Abhishek Jain:
What Information is Leaked under Concurrent Composition? IACR Cryptol. ePrint Arch. 2015: 420 (2015) - [i24]Vipul Goyal, Abhishek Jain:
On Concurrently Secure Computation in the Multiple Ideal Query Model. IACR Cryptol. ePrint Arch. 2015: 439 (2015) - [i23]Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters:
Time-Lock Puzzles from Randomized Encodings. IACR Cryptol. ePrint Arch. 2015: 514 (2015) - [i22]Ran Canetti, Vipul Goyal, Abhishek Jain:
Concurrent Secure Computation with Optimal Query Complexity. IACR Cryptol. ePrint Arch. 2015: 559 (2015) - [i21]Allison Bishop, Abhishek Jain, Lucas Kowalczyk:
Function-Hiding Inner Product Encryption. IACR Cryptol. ePrint Arch. 2015: 672 (2015) - [i20]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption. IACR Cryptol. ePrint Arch. 2015: 730 (2015) - [i19]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Indistinguishability Obfuscation with Constant Size Overhead. IACR Cryptol. ePrint Arch. 2015: 1023 (2015) - [i18]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Patchable Obfuscation. IACR Cryptol. ePrint Arch. 2015: 1084 (2015) - [i17]Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai:
Multi-Input Functional Encryption for Unbounded Arity Functions. IACR Cryptol. ePrint Arch. 2015: 1136 (2015) - [i16]Shai Halevi, Yuval Ishai, Abhishek Jain, Eyal Kushilevitz, Tal Rabin:
Secure Multiparty Computation with General Interaction Patterns. IACR Cryptol. ePrint Arch. 2015: 1173 (2015) - 2014
- [c27]Ran Canetti, Abhishek Jain, Alessandra Scafuro:
Practical UC security with a Global Random Oracle. CCS 2014: 597-608 - [c26]Ran Canetti, Abhishek Jain, Omer Paneth:
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity. CRYPTO (2) 2014: 337-350 - [c25]Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou:
Multi-input Functional Encryption. EUROCRYPT 2014: 578-602 - [c24]Abhishek Jain, Omkant Pandey:
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships. SCN 2014: 435-454 - [i15]Ran Canetti, Abhishek Jain, Omer Paneth:
Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity. IACR Cryptol. ePrint Arch. 2014: 633 (2014) - [i14]Ran Canetti, Justin Holmgren, Abhishek Jain, Vinod Vaikuntanathan:
Indistinguishability Obfuscation of Iterated Circuits and RAM Programs. IACR Cryptol. ePrint Arch. 2014: 769 (2014) - [i13]Ran Canetti, Abhishek Jain, Alessandra Scafuro:
Practical UC security with a Global Random Oracle. IACR Cryptol. ePrint Arch. 2014: 908 (2014) - 2013
- [c23]Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti:
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model. ASIACRYPT (1) 2013: 21-40 - [c22]Vipul Goyal, Divya Gupta, Abhishek Jain:
What Information Is Leaked under Concurrent Composition? CRYPTO (2) 2013: 220-238 - [c21]Elette Boyle, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Amit Sahai:
Secure Computation against Adaptive Auxiliary Information. CRYPTO (1) 2013: 316-334 - [c20]Angelo De Caro, Vincenzo Iovino, Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano:
On the Achievability of Simulation-Based Security for Functional Encryption. CRYPTO (2) 2013: 519-535 - [c19]Vipul Goyal, Abhishek Jain:
On Concurrently Secure Computation in the Multiple Ideal Query Model. EUROCRYPT 2013: 684-701 - [c18]Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti:
Concurrent Zero Knowledge in the Bounded Player Model. TCC 2013: 60-79 - [c17]Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana López-Alt, Daniel Wichs:
Why "Fiat-Shamir for Proofs" Lacks a Proof. TCC 2013: 182-201 - [p1]Abhishek Jain, Amit Sahai:
The IPS Compiler. Secure Multi-Party Computation 2013: 201-221 - [i12]Angelo De Caro, Vincenzo Iovino, Abhishek Jain, Adam O'Neill, Omer Paneth, Giuseppe Persiano:
On the Achievability of Simulation-Based Security for Functional Encryption. IACR Cryptol. ePrint Arch. 2013: 364 (2013) - [i11]Shafi Goldwasser, Vipul Goyal, Abhishek Jain, Amit Sahai:
Multi-Input Functional Encryption. IACR Cryptol. ePrint Arch. 2013: 727 (2013) - [i10]Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai:
Functional Encryption for Randomized Functionalities. IACR Cryptol. ePrint Arch. 2013: 729 (2013) - 2012
- [b1]Abhishek Jain:
New Frontiers in Secure Computation. University of California, Los Angeles, USA, 2012 - [c16]Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes:
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise. ASIACRYPT 2012: 663-680 - [c15]Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai:
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation. CRYPTO 2012: 443-460 - [c14]Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai:
Concurrently Secure Computation in Constant Rounds. EUROCRYPT 2012: 99-116 - [c13]Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan, Daniel Wichs:
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. EUROCRYPT 2012: 483-501 - [c12]Elette Boyle, Shafi Goldwasser, Abhishek Jain, Yael Tauman Kalai:
Multiparty computation secure against continual memory leakage. STOC 2012: 1235-1254 - [c11]Abhishek Jain, Krzysztof Pietrzak, Aris Tentes:
Hardness Preserving Constructions of Pseudorandom Functions. TCC 2012: 369-382 - [c10]Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs:
Counterexamples to Hardness Amplification beyond Negligible. TCC 2012: 476-493 - [i9]Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs:
Counterexamples to Hardness Amplification Beyond Negligible. IACR Cryptol. ePrint Arch. 2012: 32 (2012) - [i8]Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti:
Concurrent Zero Knowledge in the Bounded Player Model. IACR Cryptol. ePrint Arch. 2012: 279 (2012) - [i7]Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak, Aris Tentes:
Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems. IACR Cryptol. ePrint Arch. 2012: 513 (2012) - [i6]Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai:
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation. IACR Cryptol. ePrint Arch. 2012: 555 (2012) - [i5]Dana Dachman-Soled, Abhishek Jain, Yael Tauman Kalai, Adriana López-Alt:
On the (In)security of the Fiat-Shamir Paradigm, Revisited. IACR Cryptol. ePrint Arch. 2012: 706 (2012) - 2011
- [c9]Sanjam Garg, Abhishek Jain, Amit Sahai:
Leakage-Resilient Zero Knowledge. CRYPTO 2011: 297-315 - [c8]Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi:
Efficient Authentication from Hard Learning Problems. EUROCRYPT 2011: 7-26 - [c7]Abhishek Jain, Krzysztof Pietrzak:
Parallel Repetition for Leakage Resilience Amplification Revisited. TCC 2011: 58-69 - [c6]Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai:
Bringing People of Different Beliefs Together to Do UC. TCC 2011: 311-328 - [i4]Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai:
Concurrently Secure Computation in Constant Rounds. IACR Cryptol. ePrint Arch. 2011: 251 (2011) - [i3]Abhishek Jain, Omkant Pandey:
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships. IACR Cryptol. ePrint Arch. 2011: 513 (2011) - [i2]Gilad Asharov, Abhishek Jain, Daniel Wichs:
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. IACR Cryptol. ePrint Arch. 2011: 613 (2011) - 2010
- [c5]Vipul Goyal, Abhishek Jain, Rafail Ostrovsky:
Password-Authenticated Session-Key Generation on the Internet in the Plain Model. CRYPTO 2010: 277-294 - [c4]Vipul Goyal, Abhishek Jain:
On the round complexity of covert computation. STOC 2010: 191-200 - [i1]Vipul Goyal, Abhishek Jain:
On the Round Complexity of Covert Computation. IACR Cryptol. ePrint Arch. 2010: 279 (2010)
2000 – 2009
- 2008
- [c3]Xin Zhang, Abhishek Jain, Adrian Perrig:
Packet-dropping adversary identification for data plane security. CoNEXT 2008: 24 - [c2]Vipul Goyal, Abhishek Jain, Omkant Pandey, Amit Sahai:
Bounded Ciphertext Policy Attribute Based Encryption. ICALP (2) 2008: 579-591 - 2005
- [c1]Vipul Goyal, Abhishek Jain, Jean-Jacques Quisquater:
Improvements to Mitchell's Remote User Authentication Protocol. ICISC 2005: 69-80
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint