Rishab Goyal

According to our database1, Rishab Goyal authored at least 38 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Incompressible Functional Encryption.
IACR Cryptol. ePrint Arch., 2024

Mutable Batch Arguments and Applications.
IACR Cryptol. ePrint Arch., 2024

Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2024

Boosting SNARKs and Rate-1 Barrier in Arguments of Knowledge.
IACR Cryptol. ePrint Arch., 2024

Non-interactive Blind Signatures from Lattices.
IACR Cryptol. ePrint Arch., 2024

Encrypted RAM Delegation: Applications to Rate-1 Extractable Arguments, Homomorphic NIZKs, MPC, and more.
IACR Cryptol. ePrint Arch., 2024

Leveled Fully-Homomorphic Signatures from Batch Arguments.
IACR Cryptol. ePrint Arch., 2024

Multi-authority Functional Encryption with Bounded Collusions from Standard Assumptions.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

2023
Physically Unclonable Function Using Schmitt Triggers.
WiPiEC Journal, 2023

2022
Locally Verifiable Signature and Key Aggregation.
IACR Cryptol. ePrint Arch., 2022

A Simple and Generic Approach to Dynamic Collusion Model.
IACR Cryptol. ePrint Arch., 2022

Rate-1 Non-Interactive Arguments for Batch-NP and Applications.
IACR Cryptol. ePrint Arch., 2022

Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality.
IACR Cryptol. ePrint Arch., 2022

2021
Bounded Collusion ABE for TMs from IBE.
IACR Cryptol. ePrint Arch., 2021

Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups.
IACR Cryptol. ePrint Arch., 2021

Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2021

Multi-Party Functional Encryption.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Multi-input Quadratic Functional Encryption from Pairings.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Collusion Resistant Traitor Tracing from Learning with Errors.
SIAM J. Comput., 2020

Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2020

Multi-Party Functional Encryption.
IACR Cryptol. ePrint Arch., 2020

2019
New Constructions of Hinting PRGs, OWFs with Encryption, and more.
IACR Cryptol. ePrint Arch., 2019

Collusion Resistant Broadcast and Trace from Positional Witness Encryption.
IACR Cryptol. ePrint Arch., 2019

Verifiable Registration-Based Encryption.
IACR Cryptol. ePrint Arch., 2019

Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2019

New Approaches to Traitor Tracing with Embedded Identities.
IACR Cryptol. ePrint Arch., 2019

On Perfect Correctness in (Lockable) Obfuscation.
IACR Cryptol. ePrint Arch., 2019

Watermarking Public-Key Cryptographic Primitives.
IACR Cryptol. ePrint Arch., 2019

Broadcast and Trace with N^ε Ciphertext Size from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits.
IACR Cryptol. ePrint Arch., 2018

2017
Lockable Obfuscation.
IACR Cryptol. ePrint Arch., 2017

Separating IND-CPA and Circular Security for Unbounded Length Key Cycles.
IACR Cryptol. ePrint Arch., 2017

Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption.
IACR Cryptol. ePrint Arch., 2017

Risky Traitor Tracing and New Differential Privacy Negative Results.
IACR Cryptol. ePrint Arch., 2017

A Generic Approach to Constructing and Proving Verifiable Random Functions.
IACR Cryptol. ePrint Arch., 2017

Overcoming Cryptographic Impossibility Results using Blockchains.
IACR Cryptol. ePrint Arch., 2017

Signature Schemes with Randomized Verification.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy.
IACR Cryptol. ePrint Arch., 2016


  Loading...