Venkata Koppula

Orcid: 0000-0002-4429-2872

According to our database1, Venkata Koppula authored at least 36 papers between 2010 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Incompressible Encryption Beyond CPA/CCA Security.
IACR Commun. Cryptol., 2025

Non-committing Identity Based Encryption: Constructions and Applications.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Incompressible Functional Encryption.
Proceedings of the 16th Innovations in Theoretical Computer Science Conference, 2025

A Note on Adaptive Security in Hierarchical Identity-Based Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Quantum Polynomial Hierarchies: Karp-Lipton, Error Reduction, and Lower Bounds.
Proceedings of the 49th International Symposium on Mathematical Foundations of Computer Science, 2024

Homomorphic Indistinguishability Obfuscation and Its Applications.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

Leakage-Resilient Incompressible Cryptography: Constructions and Barriers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2022
Adaptive Multiparty NIKE.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

2020
Simpler Proofs of Quantumness.
Proceedings of the 15th Conference on the Theory of Quantum Computation, 2020

On Perfect Correctness in (Lockable) Obfuscation.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Chosen Ciphertext Security from Injective Trapdoor Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
New Approaches to Traitor Tracing with Embedded Identities.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Adaptively Secure Constrained Pseudorandom Functions.
Proceedings of the Financial Cryptography and Data Security, 2019

Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Output Compression, MPC, and iO for Turing Machines.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Collusion resistant traitor tracing from learning with errors.
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018

Risky Traitor Tracing and New Differential Privacy Negative Results.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
A Generic Approach to Constructing and Proving Verifiable Random Functions.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Universal Samplers with Fast Verification.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Separating IND-CPA and Circular Security for Unbounded Length Key Cycles.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Lockable Obfuscation.
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017

Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Signature Schemes with Randomized Verification.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Circular Security Counterexamples for Arbitrary Length Cycles from LWE.
IACR Cryptol. ePrint Arch., 2016

Semi-adaptive Security and Bundling Functionalities Made Generic and Easy.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Constrained Pseudorandom Functions for Unconstrained Inputs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Circular Security Separations for Arbitrary Length Cycles from LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Deterministic Public-Key Encryption Under Continual Leakage.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Separations in Circular Security for Arbitrary Length Key Cycles.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Functional Encryption for Randomized Functionalities.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Indistinguishability Obfuscation for Turing Machines with Unbounded Memory.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

Universal Signature Aggregators.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2010
On the Kernelization Complexity of Colorful Motifs.
Proceedings of the Parameterized and Exact Computation - 5th International Symposium, 2010


  Loading...