Abhishek Jain
Abhishek Jain
Assistant Professor, Johns Hopkins University
Geverifieerd e-mailadres voor cs.jhu.edu - Homepage
Geciteerd door
Geciteerd door
Bounded ciphertext policy attribute based encryption
V Goyal, A Jain, O Pandey, A Sahai
International Colloquium on Automata, Languages, and Programming, 579-591, 2008
Multiparty computation with low communication, computation and interaction via threshold FHE
G Asharov, A Jain, A López-Alt, E Tromer, V Vaikuntanathan, D Wichs
Annual International Conference on the Theory and Applications of …, 2012
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Annual International Conference on the Theory and Applications of …, 2014
Indistinguishability obfuscation from compact functional encryption
P Ananth, A Jain
Advances in Cryptology--CRYPTO 2015, 308-326, 2015
Efficient Authentication from Hard Learning Problems
E Kiltz, K Pietrzak, D Venturi, D Cash, A Jain
Journal of Cryptology 30 (4), 1238-1275, 2017
Efficient authentication from hard learning problems
E Kiltz, K Pietrzak, D Cash, A Jain, D Venturi
Advances in Cryptology–EUROCRYPT 2011, 7-26, 2011
Succinct garbling and indistinguishability obfuscation for ram programs
R Canetti, J Holmgren, A Jain, V Vaikuntanathan
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of …, 2015
Function-hiding inner product encryption
A Bishop, A Jain, L Kowalczyk
Advances in Cryptology–ASIACRYPT 2015, 470-491, 2015
On the achievability of simulation-based security for functional encryption
A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Advances in Cryptology–CRYPTO 2013, 519-535, 2013
Time-lock puzzles from randomized encodings
N Bitansky, S Goldwasser, A Jain, O Paneth, V Vaikuntanathan, B Waters
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
Practical UC security with a global random oracle
R Canetti, A Jain, A Scafuro
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Commitments and efficient zero-knowledge proofs from learning parity with noise
A Jain, S Krenn, K Pietrzak, A Tentes
Advances in Cryptology–ASIACRYPT 2012, 663-680, 2012
Leakage-resilient zero knowledge
S Garg, A Jain, A Sahai
Advances in Cryptology–CRYPTO 2011, 297-315, 2011
Packet-dropping adversary identification for data plane security
X Zhang, A Jain, A Perrig
Proceedings of the 2008 ACM CoNEXT Conference, 1-12, 2008
Why “fiat-shamir for proofs” lacks a proof
N Bitansky, D Dachman-Soled, S Garg, A Jain, YT Kalai, A López-Alt, ...
Theory of Cryptography, 182-201, 2013
Functional encryption for randomized functionalities
V Goyal, A Jain, V Koppula, A Sahai
Theory of Cryptography Conference, 325-351, 2015
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards
AR Choudhuri, M Green, A Jain, G Kaptchuk, I Miers
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Multiparty computation secure against continual memory leakage
E Boyle, S Goldwasser, A Jain, YT Kalai
Proceedings of the forty-fourth annual ACM symposium on Theory of computing …, 2012
Distinguisher-dependent simulation in two rounds and its applications
A Jain, YT Kalai, D Khurana, R Rothblum
Annual International Cryptology Conference, 158-189, 2017
A new approach to round-optimal secure multiparty computation
P Ananth, AR Choudhuri, A Jain
Annual International Cryptology Conference, 468-499, 2017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20