# Abhishek Jain

According to our database

Collaborative distances:

^{1}, Abhishek Jain authored at least 74 papers between 2005 and 2019.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### Homepage:

#### On csauthors.net:

## Bibliography

2019

Founding Secure Computation on Blockchains.

IACR Cryptology ePrint Archive, 2019

On Round Optimal Secure Multiparty Computation from Minimal Assumptions.

IACR Cryptology ePrint Archive, 2019

Interactive Non-malleable Codes.

Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Two Round Information-Theoretic MPC with Malicious Security.

Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

The Broadcast Message Complexity of Secure Multiparty Computation.

Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens.

Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018

Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings.

SIAM J. Comput., 2018

On the Existence of Three Round Zero-Knowledge Proofs.

IACR Cryptology ePrint Archive, 2018

Non-Interactive Secure Computation from One-Way Functions.

IACR Cryptology ePrint Archive, 2018

Two Round Information-Theoretic MPC with Malicious Security.

IACR Cryptology ePrint Archive, 2018

Round-Optimal Secure Multiparty Computation with Honest Majority.

IACR Cryptology ePrint Archive, 2018

The Bottleneck Complexity of Secure Multiparty Computation.

Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018

Round-Optimal Secure Multiparty Computation with Honest Majority.

Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017

Efficient Authentication from Hard Learning Problems.

J. Cryptology, 2017

Distinguisher-Dependent Simulation in Two Rounds and its Applications.

IACR Cryptology ePrint Archive, 2017

Non-Interactive Multiparty Computation without Correlated Randomness.

IACR Cryptology ePrint Archive, 2017

Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards.

IACR Cryptology ePrint Archive, 2017

Promise Zero Knowledge and its Applications to Round Optimal MPC.

IACR Cryptology ePrint Archive, 2017

Round Optimal Concurrent MPC via Strong Simulation.

IACR Cryptology ePrint Archive, 2017

A New Approach to Round-Optimal Secure Multiparty Computation.

IACR Cryptology ePrint Archive, 2017

On Secure Two-Party Computation in Three Rounds.

IACR Cryptology ePrint Archive, 2017

On Secure Two-Party Computation in Three Rounds.

Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Patchable Indistinguishability Obfuscation: i

*O*for Evolving Software.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Cryptography with Updates.

Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

A New Approach to Round-Optimal Secure Multiparty Computation.

Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization.

Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016

Cryptography with Updates.

IACR Cryptology ePrint Archive, 2016

2015

Secure Multiparty Computation with General Interaction Patterns.

IACR Cryptology ePrint Archive, 2015

On Concurrently Secure Computation in the Multiple Ideal Query Model.

IACR Cryptology ePrint Archive, 2015

What Information is Leaked under Concurrent Composition?

IACR Cryptology ePrint Archive, 2015

Concurrent Secure Computation with Optimal Query Complexity.

IACR Cryptology ePrint Archive, 2015

Time-Lock Puzzles from Randomized Encodings.

IACR Cryptology ePrint Archive, 2015

Function-Hiding Inner Product Encryption.

IACR Cryptology ePrint Archive, 2015

Multi-Input Functional Encryption for Unbounded Arity Functions.

IACR Cryptology ePrint Archive, 2015

Patchable Obfuscation.

IACR Cryptology ePrint Archive, 2015

Indistinguishability Obfuscation with Constant Size Overhead.

IACR Cryptology ePrint Archive, 2015

Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption.

IACR Cryptology ePrint Archive, 2015

Indistinguishability Obfuscation from Compact Functional Encryption.

IACR Cryptology ePrint Archive, 2015

Succinct Garbling and Indistinguishability Obfuscation for RAM Programs.

Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

Interactive Coding for Multiparty Protocols.

Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

Indistinguishability Obfuscation from Compact Functional Encryption.

Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014

Indistinguishability Obfuscation of Iterated Circuits and RAM Programs.

IACR Cryptology ePrint Archive, 2014

Practical UC security with a Global Random Oracle.

IACR Cryptology ePrint Archive, 2014

Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.

IACR Cryptology ePrint Archive, 2014

Multi-input Functional Encryption.

Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013

The IPS Compiler.

Proceedings of the Secure Multi-Party Computation, 2013

Functional Encryption for Randomized Functionalities.

IACR Cryptology ePrint Archive, 2013

Multi-Input Functional Encryption.

IACR Cryptology ePrint Archive, 2013

On the Achievability of Simulation-Based Security for Functional Encryption.

IACR Cryptology ePrint Archive, 2013

Concurrent Zero Knowledge in the Bounded Player Model.

Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Why "Fiat-Shamir for Proofs" Lacks a Proof.

Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Secure Computation against Adaptive Auxiliary Information.

Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Constant-Round Concurrent Zero Knowledge in the Bounded Player Model.

Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012

New Frontiers in Secure Computation.

PhD thesis, 2012

Concurrent Zero Knowledge in the Bounded Player Model.

IACR Cryptology ePrint Archive, 2012

Counterexamples to Hardness Amplification Beyond Negligible.

IACR Cryptology ePrint Archive, 2012

On the (In)security of the Fiat-Shamir Paradigm, Revisited.

IACR Cryptology ePrint Archive, 2012

New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation.

IACR Cryptology ePrint Archive, 2012

Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems.

IACR Cryptology ePrint Archive, 2012

Hardness Preserving Constructions of Pseudorandom Functions.

Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Multiparty computation secure against continual memory leakage.

Proceedings of the 44th Symposium on Theory of Computing Conference, 2012

Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE.

Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise.

Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011

Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships.

IACR Cryptology ePrint Archive, 2011

Concurrently Secure Computation in Constant Rounds.

IACR Cryptology ePrint Archive, 2011

Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE.

IACR Cryptology ePrint Archive, 2011

Parallel Repetition for Leakage Resilience Amplification Revisited.

Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Bringing People of Different Beliefs Together to Do UC.

Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Leakage-Resilient Zero Knowledge.

Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010

On the Round Complexity of Covert Computation.

IACR Cryptology ePrint Archive, 2010

Password-Authenticated Session-Key Generation on the Internet in the Plain Model.

Proceedings of the Advances in Cryptology, 2010

2008

Bounded Ciphertext Policy Attribute Based Encryption.

Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Packet-dropping adversary identification for data plane security.

Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2005

Improvements to Mitchell's Remote User Authentication Protocol.

Proceedings of the Information Security and Cryptology, 2005