Abhishek Jain

Orcid: 0000-0002-3572-7643

Affiliations:
  • Johns Hopkins University, USA
  • MIT
  • UCLA


According to our database1, Abhishek Jain authored at least 119 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Succinct Witness Encryption for Batch Languages and Applications.
IACR Cryptol. ePrint Arch., 2025

How to Trace Viral Content in End-to-End Encrypted Messaging.
IACR Cryptol. ePrint Arch., 2025

Laconic PSI on Authenticated Inputs and Applications.
IACR Cryptol. ePrint Arch., 2025

Multi-Key Homomorphic Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Black-Box Non-interactive Zero Knowledge from Vector Trapdoor Hash.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Simultaneous-Message and Succinct Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Sometimes-Decryptable Homomorphic Encryption from Sub-exponential DDH.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Malicious Security in Collaborative zk-SNARKs: More than Meets the Eye.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Simple and General Counterexamples for Private-Coin Evasive LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Incrementally Verifiable Computation for NP from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Pseudorandom Obfuscation and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Fully Anonymous Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem.
Proceedings of the 33rd USENIX Security Symposium, 2024

Homomorphic Secret Sharing with Verifiable Evaluation.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

hinTS: Threshold Signatures with Silent Setup.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Monotone-Policy Aggregate Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Scalable Multiparty Computation from Non-linear Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
zkSaaS: Zero-Knowledge SNARKs as a Service.
Proceedings of the 32nd USENIX Security Symposium, 2023

Threshold Signatures in the Multiverse.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Credibility in Private Set Membership.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

End-to-End Secure Messaging with Traceability Only for Illegal Content.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Cryptography with Weights: MPC, Encryption and Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

A Note on Non-interactive Zero-Knowledge from CDH.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Correlation Intractability and SNARGs from Sub-exponential DDH.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Scalable Multiparty Garbling.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Efficient Set Membership Encryption and Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Time-Deniable Signatures.
IACR Cryptol. ePrint Arch., 2022

One-Time Programs from Commodity Hardware.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Steganography-Free Zero-Knowledge.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Pre-Constrained Encryption.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Indistinguishability Obfuscation via Mathematical Proofs of Equivalence.
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

Secure Multiparty Computation with Free Branching.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Succinct Zero Knowledge for Floating Point Computations.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
SNARGs for <i>P</i> from LWE.
IACR Cryptol. ePrint Arch., 2021

On Communication Models and Best-Achievable Security in Two-Round MPC.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Oblivious Transfer from Trapdoor Permutations in Minimal Rounds.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

SNARGs for $\mathcal{P}$ from LWE.
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021

Order-C Secure Multiparty Computation for Highly Repetitive Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Unbounded Multi-party Computation from Learning with Errors.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Non-interactive Zero Knowledge from Sub-exponential DDH.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Non-interactive Batch Arguments for NP from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Fluid MPC: Secure Multiparty Computation with Dynamic Participants.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Self-Processing Private Sensor Data via Garbled Encryption.
IACR Cryptol. ePrint Arch., 2020

Multikey FHE in the Plain Model.
IACR Cryptol. ePrint Arch., 2020

Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE).
IACR Cryptol. ePrint Arch., 2020

Round Optimal Secure Multiparty Computation from Minimal Assumptions.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Multi-key Fully-Homomorphic Encryption in the Plain Model.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

The Round Complexity of Secure Computation Against Covert Adversaries.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Statistical Zaps and New Oblivious Transfer Protocols.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Towards Efficiency-Preserving Round Compression in MPC - Do Fewer Rounds Mean More Computation?
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Statistical Zap Arguments from Quasi-Polynomial LWE.
IACR Cryptol. ePrint Arch., 2019

Interactive Non-malleable Codes.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Founding Secure Computation on Blockchains.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Two Round Information-Theoretic MPC with Malicious Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

The Broadcast Message Complexity of Secure Multiparty Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

Public-Key Function-Private Hidden Vector Encryption (and More).
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings.
SIAM J. Comput., 2018

The Bottleneck Complexity of Secure Multiparty Computation.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018

On the Existence of Three Round Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Promise Zero Knowledge and Its Applications to Round Optimal MPC.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Round-Optimal Secure Multiparty Computation with Honest Majority.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Non-interactive Secure Computation from One-Way Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Round Optimal Concurrent MPC via Strong Simulation.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

On Secure Two-Party Computation in Three Rounds.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Patchable Indistinguishability Obfuscation: i<i>O</i> for Evolving Software.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Cryptography with Updates.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

A New Approach to Round-Optimal Secure Multiparty Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Distinguisher-Dependent Simulation in Two Rounds and its Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Non-Interactive Multiparty Computation Without Correlated Randomness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Secure Multiparty Computation with General Interaction Patterns.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

Time-Lock Puzzles from Randomized Encodings.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

2015
Patchable Obfuscation.
IACR Cryptol. ePrint Arch., 2015

Indistinguishability Obfuscation with Constant Size Overhead.
IACR Cryptol. ePrint Arch., 2015

Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption.
IACR Cryptol. ePrint Arch., 2015

Functional Encryption for Randomized Functionalities.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Succinct Garbling and Indistinguishability Obfuscation for RAM Programs.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

Interactive Coding for Multiparty Protocols.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

Concurrent Secure Computation with Optimal Query Complexity.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Indistinguishability Obfuscation from Compact Functional Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Function-Hiding Inner Product Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

Multi-input Functional Encryption for Unbounded Arity Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Indistinguishability Obfuscation of Iterated Circuits and RAM Programs.
IACR Cryptol. ePrint Arch., 2014

Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Multi-input Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Practical UC security with a Global Random Oracle.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
The IPS Compiler.
Proceedings of the Secure Multi-Party Computation, 2013

Multi-Input Functional Encryption.
IACR Cryptol. ePrint Arch., 2013

Concurrent Zero Knowledge in the Bounded Player Model.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Why "Fiat-Shamir for Proofs" Lacks a Proof.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

On Concurrently Secure Computation in the Multiple Ideal Query Model.
Proceedings of the Advances in Cryptology, 2013

What Information Is Leaked under Concurrent Composition?
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

On the Achievability of Simulation-Based Security for Functional Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Secure Computation against Adaptive Auxiliary Information.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Constant-Round Concurrent Zero Knowledge in the Bounded Player Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
New Frontiers in Secure Computation.
PhD thesis, 2012

Concurrent Zero Knowledge in the Bounded Player Model.
IACR Cryptol. ePrint Arch., 2012

On the (In)security of the Fiat-Shamir Paradigm, Revisited.
IACR Cryptol. ePrint Arch., 2012

Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems.
IACR Cryptol. ePrint Arch., 2012

Hardness Preserving Constructions of Pseudorandom Functions.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Counterexamples to Hardness Amplification beyond Negligible.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Multiparty computation secure against continual memory leakage.
Proceedings of the 44th Symposium on Theory of Computing Conference, 2012

Concurrently Secure Computation in Constant Rounds.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE.
IACR Cryptol. ePrint Arch., 2011

Parallel Repetition for Leakage Resilience Amplification Revisited.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Bringing People of Different Beliefs Together to Do UC.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Efficient Authentication from Hard Learning Problems.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Leakage-Resilient Zero Knowledge.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
On the round complexity of covert computation.
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010

Password-Authenticated Session-Key Generation on the Internet in the Plain Model.
Proceedings of the Advances in Cryptology, 2010

2008
Bounded Ciphertext Policy Attribute Based Encryption.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Packet-dropping adversary identification for data plane security.
Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, 2008

2005
Improvements to Mitchell's Remote User Authentication Protocol.
Proceedings of the Information Security and Cryptology, 2005


  Loading...