Filter
Conference contribution

Search results

  • 2024

    Commitments from Quantum One-Wayness

    Khurana, D. & Tomer, K., Jun 10 2024, STOC 2024 - Proceedings of the 56th Annual ACM Symposium on Theory of Computing. Mohar, B., Shinkar, I. & O�Donnell, R. (eds.). Association for Computing Machinery, p. 968-978 11 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Software with Certified Deletion

    Bartusek, J., Goyal, V., Khurana, D., Malavolta, G., Raizes, J. & Roberts, B., 2024, Advances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Joye, M. & Leander, G. (eds.). Springer, p. 85-111 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14654 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2023

    A New Framework for Quantum Oblivious Transfer

    Agarwal, A., Bartusek, J., Khurana, D. & Kumar, N., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). Springer, p. 363-394 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14004 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Black-Box Reusable NISC with Random Oracles

    Ishai, Y., Khurana, D., Sahai, A. & Srinivasan, A., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2023, Proceedings. Hazay, C. & Stam, M. (eds.). Springer, p. 68-97 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14005 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cryptography with Certified Deletion

    Bartusek, J. & Khurana, D., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer, p. 192-223 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14085 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • On Black-Box Verifiable Outsourcing

    Agarwal, A., Alamati, N., Khurana, D., Raghuraman, S. & Rindal, P., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer, p. 158-187 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14369 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • On Non-uniform Security for Black-Box Non-interactive CCA Commitments

    Garg, R., Khurana, D., Lu, G. & Waters, B., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). Springer, p. 173-204 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14004 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Publicly-Verifiable Deletion via Target-Collapsing Functions

    Bartusek, J., Khurana, D. & Poremba, A., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer, p. 99-128 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14085 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Round-Optimal Black-Box MPC in the Plain Model

    Ishai, Y., Khurana, D., Sahai, A. & Srinivasan, A., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer, p. 393-426 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14081 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge)

    Bartusek, J., Khurana, D. & Srinivasan, A., 2023, Advances in Cryptology – CRYPTO 2023 - 43rd Annual International Cryptology Conference, CRYPTO 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Springer, p. 224-257 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14085 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Weakening Assumptions for Publicly-Verifiable Deletion

    Bartusek, J., Khurana, D., Malavolta, G., Poremba, A. & Walter, M., 2023, Theory of Cryptography - 21st International Conference, TCC 2023, Proceedings. Rothblum, G. & Wee, H. (eds.). Springer, p. 183-197 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14372 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Weak Zero-Knowledge via the Goldreich-Levin Theorem

    Khurana, D., Malavolta, G. & Tomer, K., 2023, Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Guo, J. & Steinfeld, R. (eds.). Springer, p. 142-173 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14439 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2022

    COA-Secure Obfuscation and Applications

    Canetti, R., Chakraborty, S., Khurana, D., Kumar, N., Poburinnaya, O. & Prabhakaran, M., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer, p. 731-758 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC

    Badrinarayanan, S., Ishai, Y., Khurana, D., Sahai, A. & Wichs, D., Jul 1 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 10. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Round-Optimal Black-Box Protocol Compilers

    Ishai, Y., Khurana, D., Sahai, A. & Srinivasan, A., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer, p. 210-240 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT

    Ishai, Y., Khurana, D., Sahai, A. & Srinivasan, A., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer, p. 441-469 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13748 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SNARGs for P from Sub-exponential DDH and QR

    Hulett, J., Jawale, R., Khurana, D. & Srinivasan, A., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer, p. 520-549 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13276 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Black-Box Non-interactive Non-malleable Commitments

    Garg, R., Khurana, D., Lu, G. & Waters, B., 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F.-X. (eds.). Springer, p. 159-185 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12698 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Compact Ring Signatures from Learning with Errors

    Chatterjee, R., Garg, S., Hajiabadi, M., Khurana, D., Liang, X., Malavolta, G., Pandey, O. & Shiehian, S., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer, p. 282-312 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12825 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Improved Computational Extractors and Their Applications

    Khurana, D. & Srinivasan, A., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer, p. 566-594 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12827 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Non-interactive Distributional Indistinguishability (NIDI) and Non-malleable Commitments

    Khurana, D., 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F.-X. (eds.). Springer, p. 186-215 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12698 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • One-Way Functions Imply Secure Computation in a Quantum World

    Bartusek, J., Coladangelo, A., Khurana, D. & Ma, F., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer, p. 467-496 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12825 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the CCA Compatibility of Public-Key Infrastructure

    Khurana, D. & Waters, B., 2021, Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings. Garay, J. A. (ed.). Springer, p. 235-260 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12711 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the Round Complexity of Black-Box Secure MPC

    Ishai, Y., Khurana, D., Sahai, A. & Srinivasan, A., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer, p. 214-243 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the Round Complexity of Secure Quantum Computation

    Bartusek, J., Coladangelo, A., Khurana, D. & Ma, F., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer, p. 406-435 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12825 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Post-Quantum Multi-Party Computation

    Agarwal, A., Bartusek, J., Goyal, V., Khurana, D. & Malavolta, G., 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F.-X. (eds.). Springer, p. 435-464 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12696 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE

    Jawale, R., Kalai, Y. T., Khurana, D. & Zhang, R., Jun 15 2021, STOC 2021 - Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing. Khuller, S. & Williams, V. V. (eds.). Association for Computing Machinery, p. 708-721 14 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Two-Round Maliciously Secure Computation with Super-Polynomial Simulation

    Agarwal, A., Bartusek, J., Goyal, V., Khurana, D. & Malavolta, G., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). Springer, p. 654-685 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13042 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2020

    Low error efficient computational extractors in the crs model

    Garg, A., Kalai, Y. T. & Khurana, D., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 373-402 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12105 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On statistical security in two-party computation

    Khurana, D. & Mughees, M. H., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer, p. 532-561 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12551 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Statistical zap arguments

    Badrinarayanan, S., Fernando, R., Jain, A., Khurana, D. & Sahai, A., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 642-667 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    Non-interactive Non-malleability from Quantum Supremacy

    Kalai, Y. T. & Khurana, D., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer, p. 552-582 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Weak zero-knowledge beyond the black-box barrier

    Bitansky, N., Khurana, D. & Paneth, O., Jun 23 2019, STOC 2019 - Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. Charikar, M. & Cohen, E. (eds.). Association for Computing Machinery, p. 1091-1102 12 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Promise zero knowledge and its applications to round optimal MPC

    Badrinarayanan, S., Goyal, V., Jain, A., Kalai, Y. T., Khurana, D. & Sahai, A., 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer, p. 459-487 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10992 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Round Optimal Black-Box “Commit-and-Prove”

    Khurana, D., Ostrovsky, R. & Srinivasan, A., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Dziembowski, S. & Beimel, A. (eds.). Springer, p. 286-313 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Statistical witness indistinguishability (and more) in two messages

    Kalai, Y. T., Khurana, D. & Sahai, A., 2018, Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2018 Proceedings. Nielsen, J. B. & Rijmen, V. (eds.). Springer, p. 34-65 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10822 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Succinct delegation for low-Space non-deterministic computation

    Badrinarayanan, S., Kalai, Y. T., Khurana, D., Sahai, A. & Wichs, D., Jun 20 2018, STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. Henzinger, M., Kempe, D. & Diakonikolas, I. (eds.). Association for Computing Machinery, p. 267-280 14 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Upgrading to functional encryption

    Badrinarayanan, S., Khurana, D., Sahai, A. & Waters, B., 2018, Theory of Cryptography - 16th International Conference, TCC 2018, Proceedings. Dziembowski, S. & Beimel, A. (eds.). Springer, p. 629-658 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    Distinguisher-dependent simulation in two rounds and its applications

    Jain, A., Kalai, Y. T., Khurana, D. & Rothblum, R., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Springer, p. 158-189 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How to achieve non-malleability in one or two rounds

    Khurana, D. & Sahai, A., Nov 10 2017, Proceedings - 58th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2017. IEEE Computer Society, p. 564-575 12 p. 8104090. (Annual Symposium on Foundations of Computer Science - Proceedings; vol. 2017-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Round Optimal Concurrent MPC via Strong Simulation

    Badrinarayanan, S., Goyal, V., Jain, A., Khurana, D. & Sahai, A., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer, p. 743-775 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Round optimal concurrent non-malleability from polynomial hardness

    Khurana, D., 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer, p. 139-171 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10678 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Unconditional UC-secure computation with (Stronger-malicious) PUFs

    Badrinarayanan, S., Khurana, D., Ostrovsky, R. & Visconti, I., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Nielsen, J. B. & Coron, J.-S. (eds.). Springer, p. 382-411 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10210 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2016

    All complete functionalities are reversible

    Khurana, D., Kraschewski, D., Maji, H. K., Prabhakaran, M. M. & Sahai, A., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Coron, J.-S. (eds.). Springer, p. 213-242 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Breaking the Three Round Barrier for Non-malleable Commitments

    Goyal, V., Khurana, D. & Sahai, A., Dec 14 2016, Proceedings - 57th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2016. IEEE Computer Society, p. 21-30 10 p. 7782914. (Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS; vol. 2016-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Do distributed differentially-private protocols require oblivious transfer?

    Goyal, V., Khurana, D., Mironov, I., Pandey, O. & Sahai, A., Aug 1 2016, 43rd International Colloquium on Automata, Languages, and Programming, ICALP 2016. Rabani, Y., Chatzigiannakis, I., Sangiorgi, D. & Mitzenmacher, M. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 29. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 55).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How to generate and use universal samplers

    Hofheinz, D., Jager, T., Khurana, D., Sahai, A., Waters, B. & Zhandry, M., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Cheon, J. H. & Takagi, T. (eds.). Springer, p. 715-744 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10032 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure computation from elastic noisy channels

    Khurana, D., Maji, H. K. & Sahai, A., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J.-S. & Fischlin, M. (eds.). Springer, p. 184-212 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2015

    Multi-party key exchange for unbounded parties from indistinguishability obfuscation

    Khurana, D., Rao, V. & Sahai, A., 2015, Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, 2015, Proceedings. Cheon, J. H. & Iwata, T. (eds.). Springer, p. 52-75 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9452).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Statistical randomized encodings: A complexity theoretic view

    Agrawal, S., Ishai, Y., Khurana, D. & Paskin-Cherniavsky, A., 2015, Automata, Languages, and Programming - 42nd International Colloquium, ICALP 2015, Proceedings. Halldorsson, M. M., Kobayashi, N., Speckmann, B. & Iwama, K. (eds.). Springer, p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9134).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution