Vipul Goyal

From MaRDI portal
Person:1653070

Available identifiers

zbMath Open goyal.vipulMaRDI QIDQ1653070

List of research outcomes

PublicationDate of PublicationType
https://portal.mardi4nfdi.de/entity/Q61262902024-04-09Paper
https://portal.mardi4nfdi.de/entity/Q61263222024-04-09Paper
On concurrent multi-party quantum computation2024-02-06Paper
Reusable secure computation in the plain model2024-02-02Paper
\textsc{SuperPack}: dishonest majority MPC with constant online communication2023-12-08Paper
Steganography-free zero-knowledge2023-08-14Paper
Sharing transformation and dishonest majority MPC with packed secret sharing2023-07-07Paper
Tight bounds on the randomness complexity of secure multiparty computation2023-07-07Paper
Blockchains enable non-interactive MPC2023-04-13Paper
Oblivious transfer from trapdoor permutations in minimal rounds2023-04-13Paper
Two-round maliciously secure computation with super-polynomial simulation2023-03-31Paper
The round complexity of secure computation against covert adversaries2022-12-16Paper
Guaranteed output delivery comes free in honest majority MPC2022-11-09Paper
Round-optimal Byzantine agreement2022-08-30Paper
Private circuits with quasilinear randomness2022-08-30Paper
Storing and Retrieving Secrets on a Blockchain2022-07-08Paper
Instant block confirmation in the sleepy model2022-06-22Paper
ATLAS: efficient and scalable MPC in the honest majority setting2022-04-22Paper
Unconditional communication-efficient MPC via Hall's marriage theorem2022-04-22Paper
Traceable secret sharing and applications2022-04-22Paper
Round optimal secure multiparty computation from minimal assumptions2022-03-23Paper
Post-quantum multi-party computation2021-12-08Paper
Multi-source non-malleable extractors and applications2021-12-08Paper
Threshold garbled circuits and ad hoc secure computation2021-12-08Paper
Towards accountability in CRS generation2021-12-08Paper
Statistical Zaps and new oblivious transfer protocols2021-12-01Paper
An Algebraic Approach to Nonmalleability2021-10-18Paper
Extractors for adversarial sources via extremal hypergraphs2021-01-19Paper
Nonmalleable Extractors and Codes, with Their Many Tampered Extensions2020-10-26Paper
Interactive non-malleable codes2020-04-30Paper
Communication-efficient unconditional MPC with guaranteed output delivery2020-03-09Paper
Simultaneous amplification: the case of non-interactive zero-knowledge2020-03-09Paper
Founding secure computation on blockchains2020-02-06Paper
Correlated-source extractors and cryptography with correlated-random tapes2020-02-04Paper
Non-malleable secret sharing2019-08-22Paper
Promise zero knowledge and its applications to round optimal MPC2018-09-26Paper
Non-malleable secret sharing for general access structures2018-09-12Paper
On the existence of three round zero-knowledge proofs2018-07-17Paper
https://portal.mardi4nfdi.de/entity/Q46380572018-05-03Paper
Overcoming cryptographic impossibility results using blockchains2018-01-19Paper
Round optimal concurrent MPC via strong simulation2018-01-19Paper
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?2017-12-19Paper
https://portal.mardi4nfdi.de/entity/Q45981672017-12-19Paper
Non-malleable extractors and codes, with their many tampered extensions2017-09-29Paper
Textbook non-malleable commitments2017-09-29Paper
Multi-input Functional Encryption with Unbounded-Message Security2017-01-06Paper
Verifiable Functional Encryption2017-01-06Paper
Concurrent Secure Computation via Non-Black Box Simulation2015-12-10Paper
Concurrent Secure Computation with Optimal Query Complexity2015-12-10Paper
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma2015-07-06Paper
Functional Encryption for Randomized Functionalities2015-07-06Paper
Black-box non-black-box zero knowledge2015-06-26Paper
Position-Based Cryptography2014-11-14Paper
On-Line/Off-Line Leakage Resilient Secure Computation Protocols2014-08-20Paper
On the round complexity of covert computation2014-08-13Paper
Interactive Proofs under Continual Memory Leakage2014-08-07Paper
Non-black-box simulation in the fully concurrent setting2014-08-07Paper
Stateless Cryptographic Protocols2014-07-30Paper
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy2014-07-25Paper
Constant round non-malleable protocols using one way functions2014-06-05Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2014-06-04Paper
Multi-input Functional Encryption2014-05-27Paper
Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing2014-03-25Paper
Lower Bounds in the Hardware Token Model2014-02-18Paper
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model2013-12-10Paper
What Information Is Leaked under Concurrent Composition?2013-09-17Paper
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols2013-09-02Paper
On Concurrently Secure Computation in the Multiple Ideal Query Model2013-05-31Paper
Concurrent Zero Knowledge in the Bounded Player Model2013-03-18Paper
On the (In)security of Fischlin’s Paradigm2013-03-18Paper
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation2012-09-25Paper
Concurrently Secure Computation in Constant Rounds2012-06-29Paper
On Black-Box Reductions between Predicate Encryption Schemes2012-06-15Paper
Noiseless Database Privacy2011-12-02Paper
Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge2011-12-02Paper
Secure Composition of Cryptographic Protocols2011-09-16Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2011-08-12Paper
Correlated-Input Secure Hash Functions2011-05-19Paper
Bringing People of Different Beliefs Together to Do UC2011-05-19Paper
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography2010-08-24Paper
Password-Authenticated Session-Key Generation on the Internet in the Plain Model2010-08-24Paper
Founding Cryptography on Tamper-Proof Hardware Tokens2010-02-24Paper
Position Based Cryptography2009-10-20Paper
Resettably Secure Computation2009-05-12Paper
Reducing Trust in the PKG in Identity Based Cryptosystems2009-03-10Paper
Bounded Ciphertext Policy Attribute Based Encryption2008-08-19Paper
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions2008-05-15Paper
New Constructions for UC Secure Computation Using Tamper-Proof Hardware2008-04-15Paper
Universally Composable Multi-party Computation with an Unreliable Common Reference String2008-03-05Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Information Security and Privacy2006-06-22Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Vipul Goyal