Follow
Dakshita Khurana
Dakshita Khurana
Verified email at illinois.edu - Homepage
Title
Cited by
Cited by
Year
Promise zero knowledge and its applications to round optimal MPC
S Badrinarayanan, V Goyal, A Jain, YT Kalai, D Khurana, A Sahai
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
622018
How to achieve non-malleability in one or two rounds
D Khurana, A Sahai
2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS …, 2017
60*2017
Distinguisher-dependent simulation in two rounds and its applications
A Jain, YT Kalai, D Khurana, R Rothblum
Annual International Cryptology Conference, 158-189, 2017
602017
How to generate and use universal samplers
D Hofheinz, T Jager, D Khurana, A Sahai, B Waters, M Zhandry
International Conference on the Theory and Application of Cryptology and …, 2016
542016
Indistinguishability obfuscation without multilinear maps: iO from LWE, bilinear maps, and weak pseudorandomness
P Ananth, A Jain, A Sahai
Cryptology ePrint Archive, 2018
492018
SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE
R Jawale, YT Kalai, D Khurana, R Zhang
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing …, 2021
392021
Statistical witness indistinguishability (and more) in two messages
YT Kalai, D Khurana, A Sahai
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
392018
Statistical ZAP arguments
S Badrinarayanan, R Fernando, A Jain, D Khurana, A Sahai
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
38*2020
Round optimal concurrent MPC via strong simulation
S Badrinarayanan, V Goyal, A Jain, D Khurana, A Sahai
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
382017
Round optimal concurrent non-malleability from polynomial hardness
D Khurana
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
382017
Non-interactive delegation for low-space non-deterministic computation
S Badrinarayanan, YT Kalai, D Khurana, A Sahai, D Wichs
Cryptology ePrint Archive, 2017
35*2017
Weak zero-knowledge beyond the black-box barrier
N Bitansky, D Khurana, O Paneth
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing …, 2019
342019
One-way functions imply secure computation in a quantum world
J Bartusek, A Coladangelo, D Khurana, F Ma
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
332021
Post-quantum multi-party computation
A Agarwal, J Bartusek, V Goyal, D Khurana, G Malavolta
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
242021
Breaking the three round barrier for non-malleable commitments
V Goyal, D Khurana, A Sahai
2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), 21-30, 2016
222016
Secure computation from elastic noisy channels
D Khurana, HK Maji, A Sahai
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
202016
Unconditional UC-secure computation with (stronger-malicious) PUFs
S Badrinarayanan, D Khurana, R Ostrovsky, I Visconti
Annual International Conference on the Theory and Applications of …, 2017
19*2017
On the round complexity of secure quantum computation
J Bartusek, A Coladangelo, D Khurana, F Ma
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
182021
Non-interactive non-malleability from quantum supremacy
YT Kalai, D Khurana
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
172019
Do distributed differentially-private protocols require oblivious transfer?
V Goyal, D Khurana, I Mironov, O Pandey, A Sahai
Cryptology ePrint Archive, 2015
172015
The system can't perform the operation now. Try again later.
Articles 1–20