Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dakshita Khurana
@inproceedings{DBLP:conf/asiacrypt/KhuranaMT23, author = {Dakshita Khurana and Giulio Malavolta and Kabir Tomer}, editor = {Jian Guo and Ron Steinfeld}, title = {Weak Zero-Knowledge via the Goldreich-Levin Theorem}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14439}, pages = {142--173}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8724-5\_5}, doi = {10.1007/978-981-99-8724-5\_5}, timestamp = {Sun, 07 Jan 2024 14:24:23 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/KhuranaMT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekKP22, author = {James Bartusek and Dakshita Khurana and Alexander Poremba}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Publicly-Verifiable Deletion via Target-Collapsing Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {99--128}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_4}, doi = {10.1007/978-3-031-38554-4\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BartusekKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekK22, author = {James Bartusek and Dakshita Khurana}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Cryptography with Certified Deletion}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {192--223}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_7}, doi = {10.1007/978-3-031-38554-4\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BartusekK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekKS22, author = {James Bartusek and Dakshita Khurana and Akshayaram Srinivasan}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Secure Computation with Shared {EPR} Pairs (Or: How to Teleport in Zero-Knowledge)}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14085}, pages = {224--257}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38554-4\_8}, doi = {10.1007/978-3-031-38554-4\_8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BartusekKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKSS23, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Round-Optimal Black-Box {MPC} in the Plain Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {393--426}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_13}, doi = {10.1007/978-3-031-38557-5\_13}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiKSS23, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Carmit Hazay and Martijn Stam}, title = {Black-Box Reusable {NISC} with Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {68--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_3}, doi = {10.1007/978-3-031-30617-4\_3}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargKLW23, author = {Rachit Garg and Dakshita Khurana and George Lu and Brent Waters}, editor = {Carmit Hazay and Martijn Stam}, title = {On Non-uniform Security for Black-Box Non-interactive {CCA} Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {173--204}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_7}, doi = {10.1007/978-3-031-30545-0\_7}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargKLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgarwalBKK23, author = {Amit Agarwal and James Bartusek and Dakshita Khurana and Nishant Kumar}, editor = {Carmit Hazay and Martijn Stam}, title = {A New Framework for Quantum Oblivious Transfer}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {363--394}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_13}, doi = {10.1007/978-3-031-30545-0\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgarwalBKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgarwalAKRR23, author = {Amit Agarwal and Navid Alamati and Dakshita Khurana and Srinivasan Raghuraman and Peter Rindal}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {On Black-Box Verifiable Outsourcing}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14369}, pages = {158--187}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48615-9\_6}, doi = {10.1007/978-3-031-48615-9\_6}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AgarwalAKRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BartusekKMPW23, author = {James Bartusek and Dakshita Khurana and Giulio Malavolta and Alexander Poremba and Michael Walter}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Weakening Assumptions for Publicly-Verifiable Deletion}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14372}, pages = {183--197}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48624-1\_7}, doi = {10.1007/978-3-031-48624-1\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BartusekKMPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2303-08676, author = {James Bartusek and Dakshita Khurana and Alexander Poremba}, title = {Publicly-Verifiable Deletion via Target-Collapsing Functions}, journal = {CoRR}, volume = {abs/2303.08676}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.08676}, doi = {10.48550/ARXIV.2303.08676}, eprinttype = {arXiv}, eprint = {2303.08676}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-08676.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-09846, author = {James Bartusek and Dakshita Khurana and Giulio Malavolta and Alexander Poremba and Michael Walter}, title = {Weakening Assumptions for Publicly-Verifiable Deletion}, journal = {CoRR}, volume = {abs/2304.09846}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.09846}, doi = {10.48550/ARXIV.2304.09846}, eprinttype = {arXiv}, eprint = {2304.09846}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-09846.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-10480, author = {James Bartusek and Dakshita Khurana and Akshayaram Srinivasan}, title = {Secure Computation with Shared {EPR} Pairs (Or: How to Teleport in Zero-Knowledge)}, journal = {CoRR}, volume = {abs/2304.10480}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.10480}, doi = {10.48550/ARXIV.2304.10480}, eprinttype = {arXiv}, eprint = {2304.10480}, timestamp = {Wed, 26 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-10480.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-07118, author = {Ruta Jawale and Dakshita Khurana}, title = {Unclonable Non-Interactive Zero-Knowledge}, journal = {CoRR}, volume = {abs/2310.07118}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.07118}, doi = {10.48550/ARXIV.2310.07118}, eprinttype = {arXiv}, eprint = {2310.07118}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-07118.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-11526, author = {Dakshita Khurana and Kabir Tomer}, title = {Commitments from Quantum One-Wayness}, journal = {CoRR}, volume = {abs/2310.11526}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.11526}, doi = {10.48550/ARXIV.2310.11526}, eprinttype = {arXiv}, eprint = {2310.11526}, timestamp = {Tue, 31 Oct 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-11526.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekGGKMRR23, author = {James Bartusek and Sanjam Garg and Vipul Goyal and Dakshita Khurana and Giulio Malavolta and Justin Raizes and Bhaskar Roberts}, title = {Obfuscation and Outsourced Computation with Certified Deletion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2023}, url = {https://eprint.iacr.org/2023/265}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BartusekGGKMRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekKP23, author = {James Bartusek and Dakshita Khurana and Alexander Poremba}, title = {Publicly-Verifiable Deletion via Target-Collapsing Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2023}, url = {https://eprint.iacr.org/2023/370}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartusekKP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS23, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {Black-Box Reusable {NISC} with Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2023}, url = {https://eprint.iacr.org/2023/514}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekKMPW23, author = {James Bartusek and Dakshita Khurana and Giulio Malavolta and Alexander Poremba and Michael Walter}, title = {Weakening Assumptions for Publicly-Verifiable Deletion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {559}, year = {2023}, url = {https://eprint.iacr.org/2023/559}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartusekKMPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekKS23, author = {James Bartusek and Dakshita Khurana and Akshayaram Srinivasan}, title = {Secure Computation with Shared {EPR} Pairs (Or: How to Teleport in Zero-Knowledge)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {564}, year = {2023}, url = {https://eprint.iacr.org/2023/564}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartusekKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS23a, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {Round-Optimal Black-Box {MPC} in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1173}, year = {2023}, url = {https://eprint.iacr.org/2023/1173}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgarwalAKRR23, author = {Amit Agarwal and Navid Alamati and Dakshita Khurana and Srinivasan Raghuraman and Peter Rindal}, title = {On Black-Box Verifiable Outsourcing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1466}, year = {2023}, url = {https://eprint.iacr.org/2023/1466}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgarwalAKRR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JawaleK23, author = {Ruta Jawale and Dakshita Khurana}, title = {Unclonable Non-Interactive Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1532}, year = {2023}, url = {https://eprint.iacr.org/2023/1532}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JawaleK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaT23, author = {Dakshita Khurana and Kabir Tomer}, title = {Commitments from Quantum One-Wayness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1620}, year = {2023}, url = {https://eprint.iacr.org/2023/1620}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/BadrinarayananI22, author = {Saikrishna Badrinarayanan and Yuval Ishai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, editor = {Dana Dachman{-}Soled}, title = {Refuting the Dream {XOR} Lemma via Ideal Obfuscation and Resettable {MPC}}, booktitle = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, pages = {10:1--10:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITC.2022.10}, doi = {10.4230/LIPICS.ITC.2022.10}, timestamp = {Thu, 30 Jun 2022 16:13:48 +0200}, biburl = {https://dblp.org/rec/conf/citc/BadrinarayananI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiKSS22, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Round-Optimal Black-Box Protocol Compilers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {210--240}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_8}, doi = {10.1007/978-3-031-06944-4\_8}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HulettJKS22, author = {James Hulett and Ruta Jawale and Dakshita Khurana and Akshayaram Srinivasan}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {SNARGs for {P} from Sub-exponential {DDH} and {QR}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {520--549}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_18}, doi = {10.1007/978-3-031-07085-3\_18}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HulettJKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiCKKPP22, author = {Ran Canetti and Suvradip Chakraborty and Dakshita Khurana and Nishant Kumar and Oxana Poburinnaya and Manoj Prabhakaran}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {COA-Secure Obfuscation and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {731--758}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_25}, doi = {10.1007/978-3-031-06944-4\_25}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiCKKPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiKSS22, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Round-Optimal Black-Box Secure Computation from Two-Round Malicious {OT}}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {441--469}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_16}, doi = {10.1007/978-3-031-22365-5\_16}, timestamp = {Fri, 23 Dec 2022 17:47:38 +0100}, biburl = {https://dblp.org/rec/conf/tcc/IshaiKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-01754, author = {James Bartusek and Dakshita Khurana}, title = {Cryptography with Certified Deletion}, journal = {CoRR}, volume = {abs/2207.01754}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.01754}, doi = {10.48550/ARXIV.2207.01754}, eprinttype = {arXiv}, eprint = {2207.01754}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-01754.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-04520, author = {Amit Agarwal and James Bartusek and Dakshita Khurana and Nishant Kumar}, title = {A New Framework for Quantum Oblivious Transfer}, journal = {CoRR}, volume = {abs/2209.04520}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.04520}, doi = {10.48550/ARXIV.2209.04520}, eprinttype = {arXiv}, eprint = {2209.04520}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-04520.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HulettJKS22, author = {James Hulett and Ruta Jawale and Dakshita Khurana and Akshayaram Srinivasan}, title = {SNARGs for {P} from Sub-exponential {DDH} and {QR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2022}, url = {https://eprint.iacr.org/2022/353}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HulettJKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananI22, author = {Saikrishna Badrinarayanan and Yuval Ishai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, title = {Refuting the Dream {XOR} Lemma via Ideal Obfuscation and Resettable {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2022}, url = {https://eprint.iacr.org/2022/681}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS22, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {Round-Optimal Black-Box Protocol Compilers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {887}, year = {2022}, url = {https://eprint.iacr.org/2022/887}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001KLW22, author = {Rachit Garg and Dakshita Khurana and George Lu and Brent Waters}, title = {On Non-uniform Security for Black-box Non-Interactive {CCA} Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1032}, year = {2022}, url = {https://eprint.iacr.org/2022/1032}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001KLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekK22, author = {James Bartusek and Dakshita Khurana}, title = {Cryptography with Certified Deletion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1178}, year = {2022}, url = {https://eprint.iacr.org/2022/1178}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartusekK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgarwalBK022, author = {Amit Agarwal and James Bartusek and Dakshita Khurana and Nishant Kumar}, title = {A New Framework for Quantum Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1191}, year = {2022}, url = {https://eprint.iacr.org/2022/1191}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgarwalBK022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS22a, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {Round-Optimal Black-Box Secure Computation from Two-Round Malicious {OT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1288}, year = {2022}, url = {https://eprint.iacr.org/2022/1288}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCKKPP22, author = {Ran Canetti and Suvradip Chakraborty and Dakshita Khurana and Nishant Kumar and Oxana Poburinnaya and Manoj Prabhakaran}, title = {COA-Secure Obfuscation and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1781}, year = {2022}, url = {https://eprint.iacr.org/2022/1781}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCKKPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKSS21, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Tal Malkin and Chris Peikert}, title = {On the Round Complexity of Black-Box Secure {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {214--243}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_8}, doi = {10.1007/978-3-030-84245-1\_8}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChatterjeeGHKLM21, author = {Rohit Chatterjee and Sanjam Garg and Mohammad Hajiabadi and Dakshita Khurana and Xiao Liang and Giulio Malavolta and Omkant Pandey and Sina Shiehian}, editor = {Tal Malkin and Chris Peikert}, title = {Compact Ring Signatures from Learning with Errors}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {282--312}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_11}, doi = {10.1007/978-3-030-84242-0\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ChatterjeeGHKLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekCKM21, author = {James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma}, editor = {Tal Malkin and Chris Peikert}, title = {On the Round Complexity of Secure Quantum Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {406--435}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_15}, doi = {10.1007/978-3-030-84242-0\_15}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BartusekCKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BartusekCKM21a, author = {James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma}, editor = {Tal Malkin and Chris Peikert}, title = {One-Way Functions Imply Secure Computation in a Quantum World}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {467--496}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_17}, doi = {10.1007/978-3-030-84242-0\_17}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BartusekCKM21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KhuranaS21, author = {Dakshita Khurana and Akshayaram Srinivasan}, editor = {Tal Malkin and Chris Peikert}, title = {Improved Computational Extractors and Their Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {566--594}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_19}, doi = {10.1007/978-3-030-84252-9\_19}, timestamp = {Mon, 16 Aug 2021 09:08:12 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KhuranaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargKLW21, author = {Rachit Garg and Dakshita Khurana and George Lu and Brent Waters}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Black-Box Non-interactive Non-malleable Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {159--185}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_6}, doi = {10.1007/978-3-030-77883-5\_6}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargKLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Khurana21, author = {Dakshita Khurana}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Non-interactive Distributional Indistinguishability {(NIDI)} and Non-malleable Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {186--215}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_7}, doi = {10.1007/978-3-030-77883-5\_7}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Khurana21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgarwalBGKM21, author = {Amit Agarwal and James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Post-Quantum Multi-Party Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {435--464}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_16}, doi = {10.1007/978-3-030-77870-5\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgarwalBGKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KhuranaW21, author = {Dakshita Khurana and Brent Waters}, editor = {Juan A. Garay}, title = {On the {CCA} Compatibility of Public-Key Infrastructure}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {235--260}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_9}, doi = {10.1007/978-3-030-75248-4\_9}, timestamp = {Fri, 07 May 2021 15:40:46 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KhuranaW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/JawaleKKZ21, author = {Ruta Jawale and Yael Tauman Kalai and Dakshita Khurana and Rachel Yun Zhang}, editor = {Samir Khuller and Virginia Vassilevska Williams}, title = {SNARGs for bounded depth computations and {PPAD} hardness from sub-exponential {LWE}}, booktitle = {{STOC} '21: 53rd Annual {ACM} {SIGACT} Symposium on Theory of Computing, Virtual Event, Italy, June 21-25, 2021}, pages = {708--721}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3406325.3451055}, doi = {10.1145/3406325.3451055}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/JawaleKKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgarwalBGKM21, author = {Amit Agarwal and James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta}, editor = {Kobbi Nissim and Brent Waters}, title = {Two-Round Maliciously Secure Computation with Super-Polynomial Simulation}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13042}, pages = {654--685}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90459-3\_22}, doi = {10.1007/978-3-030-90459-3\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AgarwalBGKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaW21, author = {Dakshita Khurana and Brent Waters}, title = {On the {CCA} Compatibility of Public-Key Infrastructure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2021}, url = {https://eprint.iacr.org/2021/271}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeGHKLM21, author = {Rohit Chatterjee and Sanjam Garg and Mohammad Hajiabadi and Dakshita Khurana and Xiao Liang and Giulio Malavolta and Omkant Pandey and Sina Shiehian}, title = {Compact Ring Signatures from Learning With Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {942}, year = {2021}, url = {https://eprint.iacr.org/2021/942}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeGHKLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgarwalBGKM21, author = {Amit Agarwal and James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta}, title = {Two-Round Maliciously Secure Computation with Super-Polynomial Simulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1230}, year = {2021}, url = {https://eprint.iacr.org/2021/1230}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgarwalBGKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaS21, author = {Dakshita Khurana and Akshayaram Srinivasan}, title = {Improved Computational Extractors and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1336}, year = {2021}, url = {https://eprint.iacr.org/2021/1336}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Khurana21, author = {Dakshita Khurana}, title = {Non-interactive Distributional Indistinguishability {(NIDI)} and Non-Malleable Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1404}, year = {2021}, url = {https://eprint.iacr.org/2021/1404}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Khurana21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS21, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {On the Round Complexity of Black-box Secure {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1467}, year = {2021}, url = {https://eprint.iacr.org/2021/1467}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargKK20, author = {Ankit Garg and Yael Tauman Kalai and Dakshita Khurana}, editor = {Anne Canteaut and Yuval Ishai}, title = {Low Error Efficient Computational Extractors in the {CRS} Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {373--402}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_14}, doi = {10.1007/978-3-030-45721-1\_14}, timestamp = {Mon, 04 May 2020 14:27:11 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadrinarayananF20, author = {Saikrishna Badrinarayanan and Rex Fernando and Aayush Jain and Dakshita Khurana and Amit Sahai}, editor = {Anne Canteaut and Yuval Ishai}, title = {Statistical {ZAP} Arguments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {642--667}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_22}, doi = {10.1007/978-3-030-45727-3\_22}, timestamp = {Tue, 05 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadrinarayananF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KhuranaM20, author = {Dakshita Khurana and Muhammad Haris Mughees}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {On Statistical Security in Two-Party Computation}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12551}, pages = {532--561}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64378-2\_19}, doi = {10.1007/978-3-030-64378-2\_19}, timestamp = {Tue, 15 Dec 2020 12:01:12 +0100}, biburl = {https://dblp.org/rec/conf/tcc/KhuranaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-12904, author = {Amit Agarwal and James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta}, title = {Post-Quantum Multi-Party Computation in Constant Rounds}, journal = {CoRR}, volume = {abs/2005.12904}, year = {2020}, url = {https://arxiv.org/abs/2005.12904}, eprinttype = {arXiv}, eprint = {2005.12904}, timestamp = {Fri, 29 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-12904.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-11212, author = {James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma}, title = {On The Round Complexity of Two-Party Quantum Computation}, journal = {CoRR}, volume = {abs/2011.11212}, year = {2020}, url = {https://arxiv.org/abs/2011.11212}, eprinttype = {arXiv}, eprint = {2011.11212}, timestamp = {Thu, 26 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-11212.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-13486, author = {James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma}, title = {One-Way Functions Imply Secure Computation in a Quantum World}, journal = {CoRR}, volume = {abs/2011.13486}, year = {2020}, url = {https://arxiv.org/abs/2011.13486}, eprinttype = {arXiv}, eprint = {2011.13486}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-13486.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JawaleK20, author = {Ruta Jawale and Dakshita Khurana}, title = {Lossy Correlation Intractability and {PPAD} Hardness from Sub-exponential {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {911}, year = {2020}, url = {https://eprint.iacr.org/2020/911}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JawaleK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JawaleKKZ20, author = {Ruta Jawale and Yael Tauman Kalai and Dakshita Khurana and Rachel Yun Zhang}, title = {SNARGs for Bounded Depth Computations and {PPAD} Hardness from Sub-Exponential {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {980}, year = {2020}, url = {https://eprint.iacr.org/2020/980}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JawaleKKZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargKLW20, author = {Rachit Garg and Dakshita Khurana and George Lu and Brent Waters}, title = {Black-Box Non-Interactive Non-Malleable Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1197}, year = {2020}, url = {https://eprint.iacr.org/2020/1197}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GargKLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgarwalBGKM20, author = {Amit Agarwal and James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta}, title = {Post-Quantum Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1395}, year = {2020}, url = {https://eprint.iacr.org/2020/1395}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgarwalBGKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaM20, author = {Dakshita Khurana and Muhammad Haris Mughees}, title = {On Statistical Security in Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1428}, year = {2020}, url = {https://eprint.iacr.org/2020/1428}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekCKM20, author = {James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma}, title = {On The Round Complexity of Two-Party Quantum Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1471}, year = {2020}, url = {https://eprint.iacr.org/2020/1471}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BartusekCKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekCKM20a, author = {James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma}, title = {One-Way Functions Imply Secure Computation in a Quantum World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1487}, year = {2020}, url = {https://eprint.iacr.org/2020/1487}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BartusekCKM20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiK19, author = {Yael Tauman Kalai and Dakshita Khurana}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Non-interactive Non-malleability from Quantum Supremacy}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {552--582}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_18}, doi = {10.1007/978-3-030-26954-8\_18}, timestamp = {Fri, 09 Aug 2019 14:27:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BitanskyKP19, author = {Nir Bitansky and Dakshita Khurana and Omer Paneth}, editor = {Moses Charikar and Edith Cohen}, title = {Weak zero-knowledge beyond the black-box barrier}, booktitle = {Proceedings of the 51st Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2019, Phoenix, AZ, USA, June 23-26, 2019}, pages = {1091--1102}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3313276.3316382}, doi = {10.1145/3313276.3316382}, timestamp = {Sat, 22 Jun 2019 17:42:26 +0200}, biburl = {https://dblp.org/rec/conf/stoc/BitanskyKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayanFJK19, author = {Saikrishna Badrinarayanan and Rex Fernando and Aayush Jain and Dakshita Khurana and Amit Sahai}, title = {Statistical {ZAP} Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {780}, year = {2019}, url = {https://eprint.iacr.org/2019/780}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayanFJK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargKK19, author = {Ankit Garg and Yael Tauman Kalai and Dakshita Khurana}, title = {Computational Extractors with Negligible Error in the {CRS} Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1116}, year = {2019}, url = {https://eprint.iacr.org/2019/1116}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Khurana18, author = {Dakshita Khurana}, title = {How to Rewind with Minimal Interaction}, school = {University of California, Los Angeles, {USA}}, year = {2018}, url = {http://www.escholarship.org/uc/item/53s2w021}, timestamp = {Tue, 23 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Khurana18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BadrinarayananG18, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Promise Zero Knowledge and Its Applications to Round Optimal {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {459--487}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_16}, doi = {10.1007/978-3-319-96881-0\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BadrinarayananG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KalaiKS18, author = {Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Statistical Witness Indistinguishability (and more) in Two Messages}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {34--65}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_2}, doi = {10.1007/978-3-319-78372-7\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KalaiKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, editor = {Ilias Diakonikolas and David Kempe and Monika Henzinger}, title = {Succinct delegation for low-space non-deterministic computation}, booktitle = {Proceedings of the 50th Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2018, Los Angeles, CA, USA, June 25-29, 2018}, pages = {709--721}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3188745.3188924}, doi = {10.1145/3188745.3188924}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KhuranaOS18, author = {Dakshita Khurana and Rafail Ostrovsky and Akshayaram Srinivasan}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Round Optimal Black-Box "Commit-and-Prove"}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {286--313}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_11}, doi = {10.1007/978-3-030-03807-6\_11}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KhuranaOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Upgrading to Functional Encryption}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {629--658}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_23}, doi = {10.1007/978-3-030-03807-6\_23}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Yael Kalai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, title = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR18-009}}, year = {2018}, url = {https://eccc.weizmann.ac.il/report/2018/009}, eprinttype = {ECCC}, eprint = {TR18-009}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/KalaiK18, author = {Yael Kalai and Dakshita Khurana}, title = {Non-Interactive Non-Malleability from Quantum Supremacy}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR18-203}}, year = {2018}, url = {https://eccc.weizmann.ac.il/report/2018/203}, eprinttype = {ECCC}, eprint = {TR18-203}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/KalaiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiKS18, author = {Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, title = {Statistical Witness Indistinguishability (and more) in Two Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2018}, url = {http://eprint.iacr.org/2018/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters}, title = {Upgrading to Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2018}, url = {https://eprint.iacr.org/2018/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJKS18, author = {Prabhanjan Ananth and Aayush Jain and Dakshita Khurana and Amit Sahai}, title = {Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2018}, url = {https://eprint.iacr.org/2018/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaOS18, author = {Dakshita Khurana and Rafail Ostrovsky and Akshayaram Srinivasan}, title = {Round Optimal Black-Box {\textquotedblleft}Commit-and-Prove{\textquotedblright}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {921}, year = {2018}, url = {https://eprint.iacr.org/2018/921}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiK18, author = {Yael Tauman Kalai and Dakshita Khurana}, title = {Non-Interactive Non-Malleability from Quantum Supremacy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1118}, year = {2018}, url = {https://eprint.iacr.org/2018/1118}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0002KKR17, author = {Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Ron Rothblum}, editor = {Jonathan Katz and Hovav Shacham}, title = {Distinguisher-Dependent Simulation in Two Rounds and its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {158--189}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_6}, doi = {10.1007/978-3-319-63715-0\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0002KKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadrinarayananK17, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Rafail Ostrovsky and Ivan Visconti}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {382--411}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_14}, doi = {10.1007/978-3-319-56620-7\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadrinarayananK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KhuranaS17, author = {Dakshita Khurana and Amit Sahai}, editor = {Chris Umans}, title = {How to Achieve Non-Malleability in One or Two Rounds}, booktitle = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2017, Berkeley, CA, USA, October 15-17, 2017}, pages = {564--575}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/FOCS.2017.58}, doi = {10.1109/FOCS.2017.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KhuranaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Khurana17, author = {Dakshita Khurana}, editor = {Yael Kalai and Leonid Reyzin}, title = {Round Optimal Concurrent Non-malleability from Polynomial Hardness}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, pages = {139--171}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3\_5}, doi = {10.1007/978-3-319-70503-3\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Khurana17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BadrinarayananG17, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Dakshita Khurana and Amit Sahai}, editor = {Yael Kalai and Leonid Reyzin}, title = {Round Optimal Concurrent {MPC} via Strong Simulation}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {743--775}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_25}, doi = {10.1007/978-3-319-70500-2\_25}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BadrinarayananG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/KhuranaS17, author = {Dakshita Khurana and Amit Sahai}, title = {How to Achieve Non-Malleability in One or Two Rounds}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR17-100}}, year = {2017}, url = {https://eccc.weizmann.ac.il/report/2017/100}, eprinttype = {ECCC}, eprint = {TR17-100}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/KhuranaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaS17, author = {Dakshita Khurana and Amit Sahai}, title = {Two-Message Non-Malleable Commitments from Standard Sub-exponential Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2017}, url = {http://eprint.iacr.org/2017/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainKKR17, author = {Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Ron Rothblum}, title = {Distinguisher-Dependent Simulation in Two Rounds and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2017}, url = {http://eprint.iacr.org/2017/330}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainKKR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG17b, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Dakshita Khurana and Amit Sahai}, title = {Round Optimal Concurrent {MPC} via Strong Simulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2017}, url = {http://eprint.iacr.org/2017/597}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Khurana17, author = {Dakshita Khurana}, title = {Round Optimal Concurrent Non-Malleability from Polynomial Hardness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {734}, year = {2017}, url = {http://eprint.iacr.org/2017/734}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Khurana17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG17c, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, title = {Promise Zero Knowledge and its Applications to Round Optimal {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1088}, year = {2017}, url = {http://eprint.iacr.org/2017/1088}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG17c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananK17, author = {Saikrishna Badrinarayanan and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, title = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1250}, year = {2017}, url = {http://eprint.iacr.org/2017/1250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HofheinzJKSWZ16, author = {Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {How to Generate and Use Universal Samplers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {715--744}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_24}, doi = {10.1007/978-3-662-53890-6\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HofheinzJKSWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KhuranaMS16, author = {Dakshita Khurana and Hemanta K. Maji and Amit Sahai}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Secure Computation from Elastic Noisy Channels}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {184--212}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_7}, doi = {10.1007/978-3-662-49896-5\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KhuranaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KhuranaKMPS16, author = {Dakshita Khurana and Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {All Complete Functionalities are Reversible}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {213--242}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_8}, doi = {10.1007/978-3-662-49896-5\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KhuranaKMPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoyalKS16, author = {Vipul Goyal and Dakshita Khurana and Amit Sahai}, editor = {Irit Dinur}, title = {Breaking the Three Round Barrier for Non-malleable Commitments}, booktitle = {{IEEE} 57th Annual Symposium on Foundations of Computer Science, {FOCS} 2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey, {USA}}, pages = {21--30}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FOCS.2016.12}, doi = {10.1109/FOCS.2016.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoyalKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/GoyalKMPS16, author = {Vipul Goyal and Dakshita Khurana and Ilya Mironov and Omkant Pandey and Amit Sahai}, editor = {Ioannis Chatzigiannakis and Michael Mitzenmacher and Yuval Rabani and Davide Sangiorgi}, title = {Do Distributed Differentially-Private Protocols Require Oblivious Transfer?}, booktitle = {43rd International Colloquium on Automata, Languages, and Programming, {ICALP} 2016, July 11-15, 2016, Rome, Italy}, series = {LIPIcs}, volume = {55}, pages = {29:1--29:15}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2016}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2016.29}, doi = {10.4230/LIPICS.ICALP.2016.29}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/icalp/GoyalKMPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KraschewskiKMPS16, author = {Daniel Kraschewski and Dakshita Khurana and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai}, title = {All Complete Functionalities are Reversible}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2016}, url = {http://eprint.iacr.org/2016/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KraschewskiKMPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaMS16, author = {Dakshita Khurana and Hemanta K. Maji and Amit Sahai}, title = {Secure Computation from Elastic Noisy Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2016}, url = {http://eprint.iacr.org/2016/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananK16, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Rafail Ostrovsky and Ivan Visconti}, title = {New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {636}, year = {2016}, url = {http://eprint.iacr.org/2016/636}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KhuranaRS15, author = {Dakshita Khurana and Vanishree Rao and Amit Sahai}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {52--75}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_3}, doi = {10.1007/978-3-662-48797-6\_3}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KhuranaRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AgrawalIKP15, author = {Shweta Agrawal and Yuval Ishai and Dakshita Khurana and Anat Paskin{-}Cherniavsky}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Kazuo Iwama and Naoki Kobayashi and Bettina Speckmann}, title = {Statistical Randomized Encodings: {A} Complexity Theoretic View}, booktitle = {Automata, Languages, and Programming - 42nd International Colloquium, {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9134}, pages = {1--13}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47672-7\_1}, doi = {10.1007/978-3-662-47672-7\_1}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/AgrawalIKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKMPS15, author = {Vipul Goyal and Dakshita Khurana and Ilya Mironov and Omkant Pandey and Amit Sahai}, title = {Do Distributed Differentially-Private Protocols Require Oblivious Transfer?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1090}, year = {2015}, url = {http://eprint.iacr.org/2015/1090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKMPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalJK15, author = {Vipul Goyal and Aayush Jain and Dakshita Khurana}, title = {Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1095}, year = {2015}, url = {http://eprint.iacr.org/2015/1095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KhuranaMS14, author = {Dakshita Khurana and Hemanta K. Maji and Amit Sahai}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Black-Box Separations for Differentially Private Protocols}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {386--405}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_21}, doi = {10.1007/978-3-662-45608-8\_21}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KhuranaMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaSW14, author = {Dakshita Khurana and Amit Sahai and Brent Waters}, title = {How to Generate and use Universal Parameters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2014}, url = {http://eprint.iacr.org/2014/507}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaMS14, author = {Dakshita Khurana and Hemanta K. Maji and Amit Sahai}, title = {Black Box Separations for Differentially Private Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {957}, year = {2014}, url = {http://eprint.iacr.org/2014/957}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icvgip/KhuranaSSVKB12, author = {Dakshita Khurana and Surabhi Sankhla and Abhinav Shukla and Richa Varshney and Prem Kalra and Subhashis Banerjee}, editor = {Bill Triggs and Kavita Bala and Sharat Chandran}, title = {A grammar-based {GUI} for single view reconstruction}, booktitle = {The Eighth Indian Conference on Vision, Graphics and Image Processing, {ICVGIP} '12, Mumbai, India, December 16-19, 2012}, pages = {14}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2425333.2425347}, doi = {10.1145/2425333.2425347}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icvgip/KhuranaSSVKB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/KhuranaG11, author = {Dakshita Khurana and Aditya Gaurav}, title = {Ensuring tight computational security against higher-order {DPA} attacks}, booktitle = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011, 19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada}, pages = {96--101}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/PST.2011.5971970}, doi = {10.1109/PST.2011.5971970}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/KhuranaG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.