Manoj Prabhakaran

Affiliations:
  • IIT Bombay, Department of Computer Science, Mumbai, India
  • University of Illinois, Urbana-Champaign


According to our database1, Manoj Prabhakaran authored at least 105 papers between 2002 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Towards Building Efficient SCALES Protocols.
IACR Cryptol. ePrint Arch., 2025

2024
R3PO: Reach-Restricted Reactive Program Obfuscation and its Application to MA-ABE.
IACR Cryptol. ePrint Arch., 2024

R3PO: Reach-Restricted Reactive Program Obfuscation and Its Applications.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Utilitarian Privacy and Private Sampling.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Homomorphic Indistinguishability Obfuscation and Its Applications.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

Malicious Security for SCALES - Outsourced Computation with Ephemeral Servers.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Communication Complexity vs Randomness Complexity in Interactive Proofs.
Proceedings of the 5th Conference on Information-Theoretic Cryptography, 2024

Leakage-Resilient Incompressible Cryptography: Constructions and Barriers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Randomness in Private Sequential Stateless Protocols.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
CASE: A New Frontier in Public-Key Authenticated Encryption.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

A Map of Witness Maps: New Definitions and Connections.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Randomness Requirements for Three-Secret Sharing.
Proceedings of the IEEE International Symposium on Information Theory, 2023

2022
Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Secure Non-interactive Reducibility is Decidable.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

SCALES - MPC with Small Clients and Larger Ephemeral Servers.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

COA-Secure Obfuscation and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Secure Non-interactive Reduction and Spectral Analysis of Correlations.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Flexible Accuracy for Differential Privacy.
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022

2021
On Communication Models and Best-Achievable Security in Two-Round MPC.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Group Structure in Correlations and Its Applications in Cryptography.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020
Zero-Communication Reductions.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Witness Maps and Applications.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing.
Proceedings of the Computer Security - ESORICS 2020, 2020

Cryptography from One-Way Communication: On Completeness of Finite Channels.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
CellTree: A New Paradigm for Distributed Data Repositories.
IACR Cryptol. ePrint Arch., 2019

Optimality of a Protocol by Feige-Kilian-Naor for Three-Party Secure Computation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

An Introduction to the CellTree Paradigm (Invited Paper).
Proceedings of the Information Systems Security - 15th International Conference, 2019

Uncovering Algebraic Structures in the MPC Landscape.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Towards Characterizing Securely Computable Two-Party Randomized Functions.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

The Bottleneck Complexity of Secure Multiparty Computation.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018

Brief Announcement: On Secure m-Party Computation, Commuting Permutation Systems and Unassisted Non-Interactive MPC.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018

2017
Reconciling Non-malleability with Homomorphic Encryption.
J. Cryptol., 2017

2016
Communication and Randomness Lower Bounds for Secure Computation.
IEEE Trans. Inf. Theory, 2016

Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Optimal Computational Split-state Non-malleable Codes.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Rényi Information Complexity and an Information Theoretic Characterization of the Partition Bound.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

All Complete Functionalities are Reversible.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Secure Protocol Transformations.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

On the Practical Security of Inner Product Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Assisted Common Information With an Application to Secure Two-Party Sampling.
IEEE Trans. Inf. Theory, 2014

Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations.
IACR Cryptol. ePrint Arch., 2014

Explicit Non-malleable Codes Resistant to Permutations and Perturbations.
IACR Cryptol. ePrint Arch., 2014

Towards a Unified Theory of Cryptographic Agents.
IACR Cryptol. ePrint Arch., 2014

Explicit Non-Malleable Codes Resistant to Permutations.
Electron. Colloquium Comput. Complex., 2014

Tension Bounds for Information Complexity.
CoRR, 2014

On the Power of Public-Key Encryption in Secure Computation.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Lower Bounds in the Hardware Token Model.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Circuits resilient to additive attacks with applications to secure computation.
Proceedings of the Symposium on Theory of Computing, 2014

Dynamic Searchable Encryption via Blind Storage.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Limits of random oracles in secure computation.
Proceedings of the Innovations in Theoretical Computer Science, 2014

Secure Computation Using Leaky Tokens.
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

A Full Characterization of Completeness for Two-Party Randomized Function Evaluation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

On the Communication Complexity of Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Controlled Functional Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Complexity of Multi-Party Computation Functionalities.
Proceedings of the Secure Multi-Party Computation, 2013

Complexity of Multi-Party Computation Functionalities.
IACR Cryptol. ePrint Arch., 2013

Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results.
IACR Cryptol. ePrint Arch., 2013

Robust Pseudorandom Generators.
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013

On Fair Exchange, Fair Coins and Fair Sampling.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
On secure multiparty sampling for more than two parties.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

A Unified Characterization of Completeness and Triviality for Secure Function Evaluation.
Proceedings of the Progress in Cryptology, 2012

New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Assisted common information: Further results.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

The Limits of Common Coins: Further Results.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Efficient Non-interactive Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Attribute-Based Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Constant-Rate Oblivious Transfer from Noisy Channels.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
Attribute-Based Messaging: Access Control and Confidentiality.
ACM Trans. Inf. Syst. Secur., 2010

A Zero-One Law for Deterministic 2-Party Secure Computation.
IACR Cryptol. ePrint Arch., 2010

Assisted Common Information with Applications to Secure Two-Party Computation
CoRR, 2010

Assisted common information.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Cryptographic Complexity Classes and Computational Intractability Assumptions.
Proceedings of the Innovations in Computer Science, 2010

On the Computational Complexity of Coin Flipping.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.
Proceedings of the Advances in Cryptology, 2010

2009
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Secure Arithmetic Computation with No Honest Majority.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption.
Proceedings of the Computer Security, 2009

Statistically Hiding Sets.
Proceedings of the Topics in Cryptology, 2009

2008
Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
IACR Cryptol. ePrint Arch., 2008

Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance.
IACR Cryptol. ePrint Arch., 2008

Homomorphic Encryption with CCA Security.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations.
Proceedings of the Advances in Cryptology, 2008

Founding Cryptography on Oblivious Transfer - Efficiently.
Proceedings of the Advances in Cryptology, 2008

Towards Robust Computation on Encrypted Data.
Proceedings of the Advances in Cryptology, 2008

2007
Rerandomizable RCCA Encryption.
Proceedings of the Advances in Cryptology, 2007

2006
Resource Fairness and Composability of Cryptographic Protocols.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

Concurrent Non-Malleable Zero Knowledge.
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, 2006

Private Circuits II: Keeping Secrets in Tamperable Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

2005
The smallest grammar problem.
IEEE Trans. Inf. Theory, 2005

Concurrent Composition of Secure Protocols in the Timing Model.
IACR Cryptol. ePrint Arch., 2005

Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

Concurrent general composition of secure protocols in the timing model.
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005

2004
New notions of security: achieving universal composability without trusted setup.
Proceedings of the 36th Annual ACM Symposium on Theory of Computing, 2004

On the (Im)possibility of Cryptography with Imperfect Randomness.
Proceedings of the 45th Symposium on Foundations of Computer Science, 2004

Positive Results and Techniques for Obfuscation.
Proceedings of the Advances in Cryptology, 2004

2002
Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity.
IACR Cryptol. ePrint Arch., 2002

Approximating the smallest grammar: Kolmogorov complexity in natural models.
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002

Concurrent Zero Knowledge with Logarithmic Round-Complexity.
Proceedings of the 43rd Symposium on Foundations of Computer Science, 2002

On Randomized Broadcasting and Gossiping in Radio Networks.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002


  Loading...