Pratyay Mukherjee

Orcid: 0000-0002-0995-9555

According to our database1, Pratyay Mukherjee authored at least 51 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ANARKey: A New Approach to (Socially) Recover Keys.
IACR Cryptol. ePrint Arch., 2025

InstaRand: Instantly Available and Instantly Verifiable On-chain Randomness.
IACR Cryptol. ePrint Arch., 2025

HiSE: Hierarchical (Threshold) Symmetric-key Encryption.
IACR Commun. Cryptol., 2025

Vitārit: Paying for Threshold Services on Bitcoin and Friends.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Universally Composable Non-interactive Zero-Knowledge from Sigma Protocols via a New Straight-Line Compiler.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Dyna-hinTS: Silent Threshold Signatures for Dynamic Committees.
Proceedings of the Crypto Valley Conference, 2025

VRaaS: Verifiable Randomness as a Service on Blockchains.
Proceedings of the 38th IEEE Computer Security Foundations Symposium, 2025

CCA-Secure Traceable Threshold (ID-based) Encryption and Application.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Insta-Pok3r: Real-time Poker on Blockchain.
IACR Cryptol. ePrint Arch., 2024

hinTS: Threshold Signatures with Silent Setup.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Scalable Multiparty Computation from Non-linear Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Non-interactive VSS using Class Groups and Application to DKG.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
On the Round Complexity of Fully Secure Solitary MPC with Honest Majority.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Threshold Signatures in the Multiverse.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Round-Optimal Oblivious Transfer and MPC from Computational CSIDH.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Efficient Vehicle Routing Problem: A Machine Learning and Evolutionary Computation Approach.
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023

Cryptography with Weights: MPC, Encryption and Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Efficient Threshold FHE with Application to Real-Time Systems.
IACR Cryptol. ePrint Arch., 2022

ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

A More Complete Analysis of the Signal Double Ratchet Algorithm.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
TEMP: Time-locked Encryption Made Practical.
IACR Cryptol. ePrint Arch., 2021

BETA: Biometric-Enabled Threshold Authentication.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Amortized Threshold Symmetric-key Encryption.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Continuously Non-malleable Codes in the Split-State Model.
J. Cryptol., 2020

Reusable Two-Round MPC from DDH.
IACR Cryptol. ePrint Arch., 2020

Reusable Two-Round MPC from DDH.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Adaptively Secure Threshold Symmetric-Key Encryption.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Obfuscation from Low Noise Multilinear Maps.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

DiSE: Distributed Symmetric-key Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

PASTA: PASsword-based Threshold Authentication.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13.
Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, 2017

Non-Malleable Codes for Space-Bounded Tampering.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Obfuscation without the Vulnerabilities of Multilinear Maps.
IACR Cryptol. ePrint Arch., 2016

Secure Obfuscation in a Weak Multilinear Map Model.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Block-Wise Non-Malleable Codes.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

Two Round Multiparty Computation via Multi-key FHE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

The Exact Round Complexity of Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
Non-adaptive programmability of random oracle.
Theor. Comput. Sci., 2015

Two Round MPC from LWE via Multi-Key FHE.
IACR Cryptol. ePrint Arch., 2015

A Tamper and Leakage Resilient von Neumann Architecture.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

The Chaining Lemma and Its Application.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

2014
A Tamper and Leakage Resilient Random Access Machine.
IACR Cryptol. ePrint Arch., 2014

Continuous Non-malleable Codes.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013


  Loading...