Saikrishna Badrinarayanan

According to our database1, Saikrishna Badrinarayanan authored at least 43 papers between 2013 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Updatable Private Set Intersection.
Proc. Priv. Enhancing Technol., 2022

Statistical Security in Two-Party Computation Revisited.
IACR Cryptol. ePrint Arch., 2022

Round-Optimal Oblivious Transfer and MPC from Computational CSIDH.
IACR Cryptol. ePrint Arch., 2022

Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security.
IACR Cryptol. ePrint Arch., 2022

A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets.
IACR Cryptol. ePrint Arch., 2022

Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC.
IACR Cryptol. ePrint Arch., 2022

Secret-Shared Joins with Multiplicity from Aggregation Trees.
IACR Cryptol. ePrint Arch., 2022

Avoiding Lock Outs: Proactive FIDO Account Recovery using Managerless Group Signatures.
IACR Cryptol. ePrint Arch., 2022

Two-Round Concurrent 2PC from Sub-Exponential LWE.
IACR Cryptol. ePrint Arch., 2022

2021
On the Round Complexity of Fully Secure Solitary MPC with Honest Majority.
IACR Cryptol. ePrint Arch., 2021

Concurrent-Secure Two-Party Computation in Two Rounds from Subexponential LWE.
IACR Cryptol. ePrint Arch., 2021

Multi-party Threshold Private Set Intersection with Sublinear Communication.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

2020
Multi-Party Threshold Private Set Intersection with Sublinear Communication.
IACR Cryptol. ePrint Arch., 2020

Reusable Two-Round MPC from DDH.
IACR Cryptol. ePrint Arch., 2020

Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching.
IACR Cryptol. ePrint Arch., 2020

BETA: Biometric Enabled Threshold Authentication.
IACR Cryptol. ePrint Arch., 2020

2019
Towards Optimality in Secure Computation.
PhD thesis, 2019

Statistical ZAP Arguments.
IACR Cryptol. ePrint Arch., 2019

UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Revisiting Non-Malleable Secret Sharing.
IACR Cryptol. ePrint Arch., 2018

Upgrading to Functional Encryption.
IACR Cryptol. ePrint Arch., 2018

Non-Interactive Secure Computation from One-Way Functions.
IACR Cryptol. ePrint Arch., 2018

Secure MPC: Laziness Leads to GOD.
IACR Cryptol. ePrint Arch., 2018

Output Compression, MPC, and iO for Turing Machines.
IACR Cryptol. ePrint Arch., 2018

From FE Combiners to Secure MPC and Back.
IACR Cryptol. ePrint Arch., 2018

Non-Interactive Delegation for Low-Space Non-Deterministic Computation.
Electron. Colloquium Comput. Complex., 2018

Succinct delegation for low-space non-deterministic computation.
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018

2017
Promise Zero Knowledge and its Applications to Round Optimal MPC.
IACR Cryptol. ePrint Arch., 2017

Round Optimal Concurrent MPC via Strong Simulation.
IACR Cryptol. ePrint Arch., 2017

Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions.
IACR Cryptol. ePrint Arch., 2017

A note on VRFs from Verifiable Functional Encryption.
IACR Cryptol. ePrint Arch., 2017

Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs.
IACR Cryptol. ePrint Arch., 2016

Verifiable Functional Encryption.
IACR Cryptol. ePrint Arch., 2016

Big Data Analytics over Encrypted Datasets with Seabed.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
Post-Zeroizing Obfuscation: The case of Evasive Circuits.
IACR Cryptol. ePrint Arch., 2015

Multi-Input Functional Encryption for Unbounded Arity Functions.
IACR Cryptol. ePrint Arch., 2015

On the Practical Security of Inner Product Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

2014
Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols.
Proceedings of the SECRYPT 2014, 2014

Certificateless and Identity based Authenticated Key Exchange Protocols.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

2013
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results.
IACR Cryptol. ePrint Arch., 2013

A Revocable Online-Offline Certificateless Signature Scheme without Pairing.
IACR Cryptol. ePrint Arch., 2013


  Loading...