Rishab Goyal

According to our database1, Rishab Goyal authored at least 47 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Multi-Authority Functional Encryption: Corrupt Authorities, Dynamic Collusion, Lower Bounds, and More.
IACR Cryptol. ePrint Arch., 2025

Delegatable ABE with Full Security from Witness Encryption.
IACR Cryptol. ePrint Arch., 2025

Batched & Non-interactive Blind Signatures from Lattices.
IACR Cryptol. ePrint Arch., 2025

Verifiable Streaming Computation and Step-by-Step Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2025

Non-committing Identity Based Encryption: Constructions and Applications.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Incompressible Functional Encryption.
Proceedings of the 16th Innovations in Theoretical Computer Science Conference, 2025

Boosting SNARKs and Rate-1 Barrier in Arguments of Knowledge.
Proceedings of the 52nd International Colloquium on Automata, Languages, and Programming, 2025

A Note on Adaptive Security in Hierarchical Identity-Based Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Succinct Arguments for sfBatchsfQMA and Friends Under 8 Rounds.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Mutable Batch Arguments and Applications.
IACR Cryptol. ePrint Arch., 2024

Non-interactive Blind Signatures from Lattices.
IACR Cryptol. ePrint Arch., 2024

Encrypted RAM Delegation: Applications to Rate-1 Extractable Arguments, Homomorphic NIZKs, MPC, and more.
IACR Cryptol. ePrint Arch., 2024

Leveled Fully-Homomorphic Signatures from Batch Arguments.
IACR Cryptol. ePrint Arch., 2024

Multi-authority Functional Encryption with Bounded Collusions from Standard Assumptions.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Leakage-Resilient Incompressible Cryptography: Constructions and Barriers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Non-Interactive Blind Signatures: Post-Quantum and Stronger Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Physically Unclonable Function Using Schmitt Triggers.
WiPiEC Journal, 2023

2022
A Simple and Generic Approach to Dynamic Collusion Model.
IACR Cryptol. ePrint Arch., 2022

Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Rate-1 Non-Interactive Arguments for Batch-NP and Applications.
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Locally Verifiable Signature and Key Aggregation.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Multi-Party Functional Encryption.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Multi-input Quadratic Functional Encryption from Pairings.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Bounded Collusion ABE for TMs from IBE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Multi-Party Functional Encryption.
IACR Cryptol. ePrint Arch., 2020

On Perfect Correctness in (Lockable) Obfuscation.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

New Constructions of Hinting PRGs, OWFs with Encryption, and More.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Verifiable Registration-Based Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2019

New Approaches to Traitor Tracing with Embedded Identities.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Collusion Resistant Broadcast and Trace from Positional Witness Encryption.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Broadcast and Trace with N^ε Ciphertext Size from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Watermarking Public-Key Cryptographic Primitives.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits.
IACR Cryptol. ePrint Arch., 2018

Collusion resistant traitor tracing from learning with errors.
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018

Risky Traitor Tracing and New Differential Privacy Negative Results.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
A Generic Approach to Constructing and Proving Verifiable Random Functions.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Overcoming Cryptographic Impossibility Results Using Blockchains.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Separating IND-CPA and Circular Security for Unbounded Length Key Cycles.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Lockable Obfuscation.
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017

Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Signature Schemes with Randomized Verification.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Semi-adaptive Security and Bundling Functionalities Made Generic and Easy.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016


  Loading...