Остановите войну!
for scientists:
default search action
Aayush Jain
- > Home > Persons > Aayush Jain
Publications
- 2024
- [j3]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. Commun. ACM 67(3): 97-105 (2024) - [i46]Quang Dao, Aayush Jain:
Lossy Cryptography from Code-Based Assumptions. CoRR abs/2402.03633 (2024) - [i44]Quang Dao, Aayush Jain:
Lossy Cryptography from Code-Based Assumptions. IACR Cryptol. ePrint Arch. 2024: 175 (2024) - 2023
- [c31]Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs:
The Pseudorandom Oracle Model and Ideal Obfuscation. CRYPTO (4) 2023: 233-262 - [c30]Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry:
Computational Wiretap Coding from Indistinguishability Obfuscation. CRYPTO (4) 2023: 263-293 - [c29]Quang Dao, Yuval Ishai, Aayush Jain, Huijia Lin:
Multi-party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN. CRYPTO (2) 2023: 315-348 - [c28]Rex Fernando, Aayush Jain, Ilan Komargodski:
Maliciously-Secure MrNISC in the Plain Model. EUROCRYPT (2) 2023: 98-128 - [c27]Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai:
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum i풪. EUROCRYPT (1) 2023: 205-235 - [c26]Aayush Jain, Huijia Lin, Ji Luo:
On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption. EUROCRYPT (3) 2023: 479-510 - [i43]Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu:
Quantum Key Leasing for PKE and FHE with a Classical Lessor. CoRR abs/2310.14328 (2023) - [i42]Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry:
Computational Wiretap Coding from Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2023: 1270 (2023) - [i41]Quang Dao, Yuval Ishai, Aayush Jain, Huijia Lin:
Multi-Party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN. IACR Cryptol. ePrint Arch. 2023: 1593 (2023) - [i40]Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu:
Quantum Key Leasing for PKE and FHE with a Classical Lessor. IACR Cryptol. ePrint Arch. 2023: 1640 (2023) - 2022
- [c24]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from LPN over $\mathbb {F}_p$, DLIN, and PRGs in NC0. EUROCRYPT (1) 2022: 670-699 - [i38]Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs:
The Pseudorandom Oracle Model and Ideal Obfuscation. IACR Cryptol. ePrint Arch. 2022: 1204 (2022) - [i37]Aayush Jain, Huijia Lin, Ji Luo:
On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2022: 1317 (2022) - [i36]Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai:
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum i풪. IACR Cryptol. ePrint Arch. 2022: 1637 (2022) - 2021
- [c23]Samuel B. Hopkins, Aayush Jain, Huijia Lin:
Counterexamples to New Circular Security Assumptions Underlying iO. CRYPTO (2) 2021: 673-700 - [c22]Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification. EUROCRYPT (3) 2021: 97-126 - [c21]Fabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin:
Multiparty Reusable Non-interactive Secure Computation from LWE. EUROCRYPT (2) 2021: 724-753 - [c20]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability obfuscation from well-founded assumptions. STOC 2021: 60-73 - [i34]Fabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin:
Multiparty Reusable Non-Interactive Secure Computation from LWE. IACR Cryptol. ePrint Arch. 2021: 378 (2021) - [i33]Samuel B. Hopkins, Aayush Jain, Huijia Lin:
Counterexamples to New Circular Security Assumptions Underlying iO. IACR Cryptol. ePrint Arch. 2021: 889 (2021) - [i32]Rex Fernando, Aayush Jain, Ilan Komargodski:
Maliciously-Secure MrNISC in the Plain Model. IACR Cryptol. ePrint Arch. 2021: 1319 (2021) - [i31]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0. IACR Cryptol. ePrint Arch. 2021: 1334 (2021) - [i30]Aayush Jain, Alexis Korb, Paul Lou, Amit Sahai:
A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers. IACR Cryptol. ePrint Arch. 2021: 1415 (2021) - 2020
- [c19]Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
Secure MPC: Laziness Leads to GOD. ASIACRYPT (3) 2020: 120-150 - [c18]Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai:
Amplifying the Security of Functional Encryption, Unconditionally. CRYPTO (1) 2020: 717-746 - [c17]Aayush Jain, Nathan Manohar, Amit Sahai:
Combiners for Functional Encryption, Unconditionally. EUROCRYPT (1) 2020: 141-168 - [c16]Saikrishna Badrinarayanan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai:
Statistical ZAP Arguments. EUROCRYPT (3) 2020: 642-667 - [c15]James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry:
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption. ITCS 2020: 82:1-82:39 - [i29]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. CoRR abs/2008.09317 (2020) - [i28]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. Electron. Colloquium Comput. Complex. TR20 (2020) - [i27]Aayush Jain, Nathan Manohar, Amit Sahai:
Combiners for Functional Encryption, Unconditionally. IACR Cryptol. ePrint Arch. 2020: 154 (2020) - [i26]Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification. IACR Cryptol. ePrint Arch. 2020: 764 (2020) - [i24]James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry:
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption. IACR Cryptol. ePrint Arch. 2020: 889 (2020) - [i23]Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai:
Amplifying the Security of Functional Encryption, Unconditionally. IACR Cryptol. ePrint Arch. 2020: 951 (2020) - [i22]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. IACR Cryptol. ePrint Arch. 2020: 1003 (2020) - 2019
- [c13]Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. CRYPTO (3) 2019: 284-332 - [c12]Vipul Goyal, Aayush Jain, Amit Sahai:
Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge. CRYPTO (2) 2019: 608-637 - [c11]Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai:
Sum-of-Squares Meets Program Obfuscation, Revisited. EUROCRYPT (1) 2019: 226-250 - [c10]Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
How to Leverage Hardness of Constant-Degree Expanding Polynomials over \mathbb R R to build i풪 i O. EUROCRYPT (1) 2019: 251-281 - [c9]Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
From FE Combiners to Secure MPC and Back. TCC (1) 2019: 199-228 - [i21]Vipul Goyal, Aayush Jain, Amit Sahai:
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge. IACR Cryptol. ePrint Arch. 2019: 626 (2019) - [i20]Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. IACR Cryptol. ePrint Arch. 2019: 643 (2019) - [i19]Saikrishna Badrinarayanan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai:
Statistical ZAP Arguments. IACR Cryptol. ePrint Arch. 2019: 780 (2019) - [i18]Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
How to leverage hardness of constant degree expanding polynomials over R to build iO. IACR Cryptol. ePrint Arch. 2019: 1030 (2019) - [i17]Aayush Jain, Huijia Lin, Amit Sahai:
Simplifying Constructions and Assumptions for i풪. IACR Cryptol. ePrint Arch. 2019: 1252 (2019) - 2018
- [c8]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption. CRYPTO (1) 2018: 565-596 - [c7]Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelègue, Daniel Wichs:
Non-trivial Witness Encryption and Null-iO from Standard Assumptions. SCN 2018: 425-441 - [i16]Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
From FE Combiners to Secure MPC and Back. IACR Cryptol. ePrint Arch. 2018: 457 (2018) - [i15]Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
Secure MPC: Laziness Leads to GOD. IACR Cryptol. ePrint Arch. 2018: 580 (2018) - [i14]Prabhanjan Ananth, Aayush Jain, Dakshita Khurana, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness. IACR Cryptol. ePrint Arch. 2018: 615 (2018) - [i13]Aayush Jain, Amit Sahai:
How to leverage hardness of constant-degree expanding polynomials over ℝ to build iO. IACR Cryptol. ePrint Arch. 2018: 973 (2018) - [i12]Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai:
Sum-of-Squares Meets Program Obfuscation, Revisited. IACR Cryptol. ePrint Arch. 2018: 1237 (2018) - 2017
- [c6]Prabhanjan Ananth, Aayush Jain, Amit Sahai:
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption. EUROCRYPT (1) 2017: 91-121 - [c5]Zvika Brakerski, Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai, Gil Segev:
Hierarchical Functional Encryption. ITCS 2017: 8:1-8:27 - [i11]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
A note on VRFs from Verifiable Functional Encryption. IACR Cryptol. ePrint Arch. 2017: 51 (2017) - [i10]Prabhanjan Ananth, Aayush Jain, Amit Sahai:
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption. IACR Cryptol. ePrint Arch. 2017: 127 (2017) - [i9]Aayush Jain, Peter M. R. Rasmussen, Amit Sahai:
Threshold Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 257 (2017) - [i8]Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelègue, Daniel Wichs:
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions. IACR Cryptol. ePrint Arch. 2017: 874 (2017) - [i7]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 956 (2017) - 2016
- [c4]Vipul Goyal, Aayush Jain, Adam O'Neill:
Multi-input Functional Encryption with Unbounded-Message Security. ASIACRYPT (2) 2016: 531-556 - [c3]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
Verifiable Functional Encryption. ASIACRYPT (2) 2016: 557-587 - [c2]Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev:
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption. CRYPTO (2) 2016: 491-520 - [i6]Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev:
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security. IACR Cryptol. ePrint Arch. 2016: 281 (2016) - [i5]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
Verifiable Functional Encryption. IACR Cryptol. ePrint Arch. 2016: 629 (2016) - 2015
- [i4]Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai:
Functional Encryption: Decentralised and Delegatable. IACR Cryptol. ePrint Arch. 2015: 1017 (2015) - [i3]Vipul Goyal, Aayush Jain, Dakshita Khurana:
Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs. IACR Cryptol. ePrint Arch. 2015: 1095 (2015) - [i2]Vipul Goyal, Aayush Jain, Adam O'Neill:
Multi-Input Functional Encryption with Unbounded-Message Security. IACR Cryptol. ePrint Arch. 2015: 1113 (2015)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-03 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint