Dakshita Khurana

Orcid: 0000-0001-5315-4503

Affiliations:
  • University of Illinois at Urbana-Champaign, IL, USA


According to our database1, Dakshita Khurana authored at least 70 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
MPC in the Quantum Head (or: Superposition-Secure (Quantum) Zero-Knowledge).
CoRR, June, 2025

Founding Quantum Cryptography on Quantum Advantage, or, Towards Cryptography from #P Hardness.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

On Weak NIZKs, One-Way Functions and Amplification.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

On the Power of Oblivious State Preparation.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Commitments from Quantum One-Wayness.
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024

Software with Certified Deletion.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Unclonable Non-interactive Zero-Knowledge.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Obfuscation and Outsourced Computation with Certified Deletion.
IACR Cryptol. ePrint Arch., 2023

Weakening Assumptions for Publicly-Verifiable Deletion.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

On Black-Box Verifiable Outsourcing.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Black-Box Reusable NISC with Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

On Non-uniform Security for Black-Box Non-interactive CCA Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

A New Framework for Quantum Oblivious Transfer.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Round-Optimal Black-Box MPC in the Plain Model.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge).
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Publicly-Verifiable Deletion via Target-Collapsing Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Cryptography with Certified Deletion.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Weak Zero-Knowledge via the Goldreich-Levin Theorem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Round-Optimal Black-Box Protocol Compilers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

SNARGs for P from Sub-exponential DDH and QR.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

COA-Secure Obfuscation and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE.
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021

On the CCA Compatibility of Public-Key Infrastructure.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Non-interactive Distributional Indistinguishability (NIDI) and Non-malleable Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Black-Box Non-interactive Non-malleable Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Post-Quantum Multi-Party Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Improved Computational Extractors and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

On the Round Complexity of Black-Box Secure MPC.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Compact Ring Signatures from Learning with Errors.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

One-Way Functions Imply Secure Computation in a Quantum World.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

On the Round Complexity of Secure Quantum Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE.
IACR Cryptol. ePrint Arch., 2020

On The Round Complexity of Two-Party Quantum Computation.
IACR Cryptol. ePrint Arch., 2020

Post-Quantum Multi-Party Computation in Constant Rounds.
CoRR, 2020

On Statistical Security in Two-Party Computation.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Low Error Efficient Computational Extractors in the CRS Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Statistical ZAP Arguments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Computational Extractors with Negligible Error in the CRS Model.
IACR Cryptol. ePrint Arch., 2019

Weak zero-knowledge beyond the black-box barrier.
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019

Non-interactive Non-malleability from Quantum Supremacy.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
How to Rewind with Minimal Interaction.
PhD thesis, 2018

Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness.
IACR Cryptol. ePrint Arch., 2018

Non-Interactive Delegation for Low-Space Non-Deterministic Computation.
Electron. Colloquium Comput. Complex., 2018

Round Optimal Black-Box "Commit-and-Prove".
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Upgrading to Functional Encryption.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Succinct delegation for low-space non-deterministic computation.
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018

Statistical Witness Indistinguishability (and more) in Two Messages.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Promise Zero Knowledge and Its Applications to Round Optimal MPC.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Two-Message Non-Malleable Commitments from Standard Sub-exponential Assumptions.
IACR Cryptol. ePrint Arch., 2017

Round Optimal Concurrent Non-malleability from Polynomial Hardness.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Round Optimal Concurrent MPC via Strong Simulation.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

How to Achieve Non-Malleability in One or Two Rounds.
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017

Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Distinguisher-Dependent Simulation in Two Rounds and its Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs.
IACR Cryptol. ePrint Arch., 2016

Do Distributed Differentially-Private Protocols Require Oblivious Transfer?.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

Breaking the Three Round Barrier for Non-malleable Commitments.
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016

Secure Computation from Elastic Noisy Channels.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

All Complete Functionalities are Reversible.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

How to Generate and Use Universal Samplers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2015

Statistical Randomized Encodings: A Complexity Theoretic View.
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015

Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
How to Generate and use Universal Parameters.
IACR Cryptol. ePrint Arch., 2014

Black-Box Separations for Differentially Private Protocols.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2012
A grammar-based GUI for single view reconstruction.
Proceedings of the Eighth Indian Conference on Vision, Graphics and Image Processing, 2012

2011
Ensuring tight computational security against higher-order DPA attacks.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011


  Loading...