Vipul Goyal

Affiliations:
  • Carnegie Mellon University, Pittsburgh, PA, USA


According to our database1, Vipul Goyal authored at least 156 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Proofs of No Intrusion.
IACR Cryptol. ePrint Arch., 2025

Round-Efficient Composable Two-Party Quantum Computation.
IACR Cryptol. ePrint Arch., 2025

Public-Key Quantum Fire and Key-Fire From Classical Oracles.
IACR Cryptol. ePrint Arch., 2025

Multi-Copy Security in Unclonable Cryptography.
IACR Cryptol. ePrint Arch., 2025

How to Copy-Protect Malleable-Puncturable Cryptographic Functionalities Under Arbitrary Challenge Distributions.
IACR Cryptol. ePrint Arch., 2025

How to Copy-Protect All Puncturable Functionalities Without Conjectures: A Unified Solution to Quantum Protection.
IACR Cryptol. ePrint Arch., 2025

Unconditional Quantum Cryptography with a Bounded Number of Keys.
IACR Commun. Cryptol., 2025

Quantum Key Leasing for PKE and FHE with a Classical Lessor.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Towards Building Scalable Constant-Round MPC from Minimal Assumptions via Round Collapsing.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Anonymous Public-Key Quantum Money and Quantum Voting.
IACR Cryptol. ePrint Arch., 2024

How to Delete Without a Trace: Certified Deniability in a Quantum World.
IACR Cryptol. ePrint Arch., 2024

Unbounded Leakage-Resilient Encryption and Signatures.
IACR Cryptol. ePrint Arch., 2024

Unclonable Commitments and Proofs.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Unbounded Leakage-Resilience and Intrusion-Detection in a Quantum World.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Unclonable Cryptography with Unbounded Collusions and Impossibility of Hyperefficient Shadow Tomography.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Split-State Non-malleable Codes and Secret Sharing Schemes for Quantum Messages.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Software with Certified Deletion.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Towards Achieving Asynchronous MPC with Linear Communication and Optimal Resilience.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Dishonest Majority Constant-Round MPC with Linear Communication from DDH.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Unclonable Secret Sharing.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Unbounded Leakage-Resilience and Leakage-Detection in a Quantum World.
IACR Cryptol. ePrint Arch., 2023

Unclonable Cryptography with Unbounded Collusions.
IACR Cryptol. ePrint Arch., 2023

Obfuscation and Outsourced Computation with Certified Deletion.
IACR Cryptol. ePrint Arch., 2023

Computational Quantum Secret Sharing.
Proceedings of the 18th Conference on the Theory of Quantum Computation, 2023

Asynchronous Multi-Party Quantum Computation.
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

SuperPack: Dishonest Majority MPC with Constant Online Communication.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Reusable Secure Computation in the Plain Model.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

On Concurrent Multi-party Quantum Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Asymmetric Multi-Party Computation.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

2022
Logic Locking - Connecting Theory and Practice.
IACR Cryptol. ePrint Arch., 2022

Steganography-Free Zero-Knowledge.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Storing and Retrieving Secrets on a Blockchain.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Time-Traveling Simulators Using Blockchains and Their Applications.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Interaction-Preserving Compilers for Secure Computation.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Private Circuits with Quasilinear Randomness.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Round-Optimal Byzantine Agreement.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Tight Bounds on the Randomness Complexity of Secure Multiparty Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

TurboPack: Honest Majority MPC with Constant Online Communication.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
An Algebraic Approach to Nonmalleability.
SIAM J. Comput., 2021

Blockchains Enable Non-interactive MPC.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Oblivious Transfer from Trapdoor Permutations in Minimal Rounds.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Instant Block Confirmation in the Sleepy Model.
Proceedings of the Financial Cryptography and Data Security, 2021

Cryptocurrencies with Security Policies and Two-Factor Authentication.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Multi-source Non-malleable Extractors and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Threshold Garbled Circuits and Ad Hoc Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Towards Accountability in CRS Generation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Post-Quantum Multi-Party Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Traceable Secret Sharing and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Unconditional Communication-Efficient MPC via Hall's Marriage Theorem.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

ATLAS: Efficient and Scalable MPC in the Honest Majority Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

ACCO: Algebraic Computation with Comparison.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

2020
Nonmalleable Extractors and Codes, with Their Many Tampered Extensions.
SIAM J. Comput., 2020

Malicious Security Comes Free in Honest-Majority MPC.
IACR Cryptol. ePrint Arch., 2020

Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols.
Electron. Colloquium Comput. Complex., 2020

Post-Quantum Multi-Party Computation in Constant Rounds.
CoRR, 2020

Round Optimal Secure Multiparty Computation from Minimal Assumptions.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Extractors for adversarial sources via extremal hypergraphs.
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020

The Round Complexity of Secure Computation Against Covert Adversaries.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Extractors and Secret Sharing Against Bounded Collusion Protocols.
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

Statistical Zaps and New Oblivious Transfer Protocols.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Guaranteed Output Delivery Comes Free in Honest Majority MPC.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Talek: Private Group Messaging with Hidden Access Patterns.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Interactive Non-malleable Codes.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Non-Malleable Commitments using Goldreich-Levin List Decoding.
Proceedings of the 60th IEEE Annual Symposium on Foundations of Computer Science, 2019

Laconic Conditional Disclosure of Secrets and Applications.
Proceedings of the 60th IEEE Annual Symposium on Foundations of Computer Science, 2019

Correlated-Source Extractors and Cryptography with Correlated-Random Tapes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Founding Secure Computation on Blockchains.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Communication-Efficient Unconditional MPC with Guaranteed Output Delivery.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Non-malleable secret sharing.
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018

Predicting the Algorithmic Time Complexity of Single Parametric Algorithms Using Multiclass Classification with Gradient Boosted Trees.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018

On the Existence of Three Round Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Non-malleable Secret Sharing for General Access Structures.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Promise Zero Knowledge and Its Applications to Round Optimal MPC.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
A note on VRFs from Verifiable Functional Encryption.
IACR Cryptol. ePrint Arch., 2017

Overcoming Cryptographic Impossibility Results Using Blockchains.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Round Optimal Concurrent MPC via Strong Simulation.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

HOP: Hardware makes Obfuscation Practical.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Hierarchical Functional Encryption.
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

2016
Textbook non-malleable commitments.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

Non-malleable extractors and codes, with their many tampered extensions.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

Do Distributed Differentially-Private Protocols Require Oblivious Transfer?.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

Block-Wise Non-Malleable Codes.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

Breaking the Three Round Barrier for Non-malleable Commitments.
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016

Bounded-Communication Leakage Resilience via Parity-Resilient Circuits.
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016

Multi-input Functional Encryption with Unbounded-Message Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Verifiable Functional Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2015

Functional Encryption: Decentralised and Delegatable.
IACR Cryptol. ePrint Arch., 2015

Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Functional Encryption for Randomized Functionalities.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Concurrent Secure Computation via Non-Black Box Simulation.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Concurrent Secure Computation with Optimal Query Complexity.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Fast Non-Malleable Commitments.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Lower Bounds in the Hardware Token Model.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Black-box non-black-box zero knowledge.
Proceedings of the Symposium on Theory of Computing, 2014

Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

An Algebraic Approach to Non-malleability.
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014

Multi-input Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Interactive Proofs under Continual Memory Leakage.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Multi-Input Functional Encryption.
IACR Cryptol. ePrint Arch., 2013

Concurrent Zero Knowledge in the Bounded Player Model.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

On the (In)security of Fischlin's Paradigm.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Non-black-box simulation in the fully concurrent setting.
Proceedings of the Symposium on Theory of Computing Conference, 2013

On Concurrently Secure Computation in the Multiple Ideal Query Model.
Proceedings of the Advances in Cryptology, 2013

Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

What Information Is Leaked under Concurrent Composition?
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Constant-Round Concurrent Zero Knowledge in the Bounded Player Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma.
IACR Cryptol. ePrint Arch., 2012

On Black-Box Reductions between Predicate Encryption Schemes.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

On-Line/Off-Line Leakage Resilient Secure Computation Protocols.
Proceedings of the Progress in Cryptology, 2012

Constructing Non-malleable Commitments: A Black-Box Approach.
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012

Positive Results for Concurrently Secure Computation in the Plain Model.
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012

Concurrently Secure Computation in Constant Rounds.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Correlated-Input Secure Hash Functions.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Bringing People of Different Beliefs Together to Do UC.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Constant round non-malleable protocols using one way functions.
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011

Secure Composition of Cryptographic Protocols.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Stateless Cryptographic Protocols.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

Position-Based Quantum Cryptography: Impossibility and Constructions.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Noiseless Database Privacy.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Vcache: Caching Dynamic Documents
CoRR, 2010

Founding Cryptography on Tamper-Proof Hardware Tokens.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

On the round complexity of covert computation.
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010

Password-Authenticated Session-Key Generation on the Internet in the Plain Model.
Proceedings of the Advances in Cryptology, 2010

Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.
Proceedings of the Advances in Cryptology, 2010

2009
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy.
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009

Resettably Secure Computation.
Proceedings of the Advances in Cryptology, 2009

Position Based Cryptography.
Proceedings of the Advances in Cryptology, 2009

2008
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy.
IACR Cryptol. ePrint Arch., 2008

Universally Composable Multi-party Computation with an Unreliable Common Reference String.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Bounded Ciphertext Policy Attribute Based Encryption.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Efficient Two Party and Multi Party Computation Against Covert Adversaries.
Proceedings of the Advances in Cryptology, 2008

New Constructions for UC Secure Computation Using Tamper-Proof Hardware.
Proceedings of the Advances in Cryptology, 2008

Black-box accountable authority identity-based encryption.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Identity-based encryption with efficient revocation.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Covert Multi-Party Computation.
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007

Certificate Revocation Using Fine Grained Certificate Space Partitioning.
Proceedings of the Financial Cryptography and Data Security, 2007

Reducing Trust in the PKG in Identity Based Cryptosystems.
Proceedings of the Advances in Cryptology, 2007

Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions.
Proceedings of the Advances in Cryptology, 2007

2006
A new protocol to counter online dictionary attacks.
Comput. Secur., 2006

Attribute-based encryption for fine-grained access control of encrypted data.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
CompChall: Addressing Password Guessing Attacks.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

The N/R One Time Password System.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

Improvements to Mitchell's Remote User Authentication Protocol.
Proceedings of the Information Security and Cryptology, 2005

An Efficient Solution to the ARP Cache Poisoning Problem.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Construction and Traversal of Hash Chain with Public Links.
IACR Cryptol. ePrint Arch., 2004

More Efficient Server Assisted One Time Signatures.
IACR Cryptol. ePrint Arch., 2004

How To Re-initialize a Hash Chain.
IACR Cryptol. ePrint Arch., 2004

Certificate Revocation Lists or Online Mechanisms.
Proceedings of the Security In Information Systems, 2004

Fast Digital Certificate Revocation.
Proceedings of the Security and Protection in Information Processing Systems, 2004


  Loading...