Saikrishna Badrinarayanan

According to our database1, Saikrishna Badrinarayanan authored at least 46 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improved Multi-Party Fixed-Point Multiplication.
IACR Cryptol. ePrint Arch., 2024

Privacy-Preserving Race/Ethnicity Estimation for Algorithmic Bias Measurement in the U.S.
CoRR, 2024

Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
On the Round Complexity of Fully Secure Solitary MPC with Honest Majority.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Round-Optimal Oblivious Transfer and MPC from Computational CSIDH.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-Sized Sets.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

Two-Round Concurrent 2PC from Sub-exponential LWE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures.
IACR Cryptol. ePrint Arch., 2022

Statistical Security in Two-Party Computation Revisited.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

Secret-Shared Joins with Multiplicity from Aggregation Trees.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Updatable Private Set Intersection.
IACR Cryptol. ePrint Arch., 2021

Concurrent-Secure Two-Party Computation in Two Rounds from Subexponential LWE.
IACR Cryptol. ePrint Arch., 2021

Multi-party Threshold Private Set Intersection with Sublinear Communication.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

BETA: Biometric-Enabled Threshold Authentication.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

2020
Multi-Party Threshold Private Set Intersection with Sublinear Communication.
IACR Cryptol. ePrint Arch., 2020

Reusable Two-Round MPC from DDH.
IACR Cryptol. ePrint Arch., 2020

Statistical ZAP Arguments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Secure MPC: Laziness Leads to GOD.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Towards Optimality in Secure Computation.
PhD thesis, 2019

From FE Combiners to Secure MPC and Back.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Revisiting Non-Malleable Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Output Compression, MPC, and iO for Turing Machines.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Non-Interactive Delegation for Low-Space Non-Deterministic Computation.
Electron. Colloquium Comput. Complex., 2018

Upgrading to Functional Encryption.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Succinct delegation for low-space non-deterministic computation.
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018

Promise Zero Knowledge and Its Applications to Round Optimal MPC.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Non-interactive Secure Computation from One-Way Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
A note on VRFs from Verifiable Functional Encryption.
IACR Cryptol. ePrint Arch., 2017

Round Optimal Concurrent MPC via Strong Simulation.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs.
IACR Cryptol. ePrint Arch., 2016

Big Data Analytics over Encrypted Datasets with Seabed.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Verifiable Functional Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Post-Zeroizing Obfuscation: The case of Evasive Circuits.
IACR Cryptol. ePrint Arch., 2015

On the Practical Security of Inner Product Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Multi-input Functional Encryption for Unbounded Arity Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols.
Proceedings of the SECRYPT 2014, 2014

Certificateless and Identity based Authenticated Key Exchange Protocols.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

2013
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results.
IACR Cryptol. ePrint Arch., 2013

A Revocable Online-Offline Certificateless Signature Scheme without Pairing.
IACR Cryptol. ePrint Arch., 2013


  Loading...