Follow
Abhishek Jain
Abhishek Jain
Associate Professor, Johns Hopkins University
Verified email at cs.jhu.edu - Homepage
Title
Cited by
Cited by
Year
Bounded ciphertext policy attribute based encryption
V Goyal, A Jain, O Pandey, A Sahai
International Colloquium on Automata, Languages, and Programming, 579-591, 2008
7332008
Multiparty computation with low communication, computation and interaction via threshold FHE
G Asharov, A Jain, A López-Alt, E Tromer, V Vaikuntanathan, D Wichs
Annual International Conference on the Theory and Applications of …, 2012
3822012
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Annual International Conference on the Theory and Applications of …, 2014
3252014
Indistinguishability obfuscation from compact functional encryption
P Ananth, A Jain
Advances in Cryptology--CRYPTO 2015, 308-326, 2015
2052015
Time-lock puzzles from randomized encodings
N Bitansky, S Goldwasser, A Jain, O Paneth, V Vaikuntanathan, B Waters
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
1252016
Function-hiding inner product encryption
A Bishop, A Jain, L Kowalczyk
Advances in Cryptology–ASIACRYPT 2015, 470-491, 2015
1222015
Efficient Authentication from Hard Learning Problems
E Kiltz, K Pietrzak, D Venturi, D Cash, A Jain
Journal of Cryptology 30 (4), 1238-1275, 2017
1212017
Efficient authentication from hard learning problems
E Kiltz, K Pietrzak, D Cash, A Jain, D Venturi
Advances in Cryptology–EUROCRYPT 2011, 7-26, 2011
121*2011
Succinct garbling and indistinguishability obfuscation for ram programs
R Canetti, J Holmgren, A Jain, V Vaikuntanathan
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of …, 2015
112*2015
Commitments and efficient zero-knowledge proofs from learning parity with noise
A Jain, S Krenn, K Pietrzak, A Tentes
Advances in Cryptology–ASIACRYPT 2012, 663-680, 2012
1042012
Practical UC security with a global random oracle
R Canetti, A Jain, A Scafuro
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1002014
On the achievability of simulation-based security for functional encryption
A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano
Advances in Cryptology–CRYPTO 2013, 519-535, 2013
992013
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards
AR Choudhuri, M Green, A Jain, G Kaptchuk, I Miers
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
832017
Leakage-resilient zero knowledge
S Garg, A Jain, A Sahai
Advances in Cryptology–CRYPTO 2011, 297-315, 2011
812011
Packet-dropping adversary identification for data plane security
X Zhang, A Jain, A Perrig
Proceedings of the 2008 ACM CoNEXT Conference, 1-12, 2008
772008
Distinguisher-dependent simulation in two rounds and its applications
A Jain, YT Kalai, D Khurana, R Rothblum
Annual International Cryptology Conference, 158-189, 2017
552017
Why “fiat-shamir for proofs” lacks a proof
N Bitansky, D Dachman-Soled, S Garg, A Jain, YT Kalai, A López-Alt, ...
Theory of Cryptography, 182-201, 2013
542013
Multiparty computation secure against continual memory leakage
E Boyle, S Goldwasser, A Jain, YT Kalai
Proceedings of the forty-fourth annual ACM symposium on Theory of computing …, 2012
522012
A new approach to round-optimal secure multiparty computation
P Ananth, AR Choudhuri, A Jain
Annual International Cryptology Conference, 468-499, 2017
512017
Functional encryption for randomized functionalities
V Goyal, A Jain, V Koppula, A Sahai
Theory of Cryptography Conference, 325-351, 2015
512015
The system can't perform the operation now. Try again later.
Articles 1–20