
Vinod Vaikuntanathan
Person information
- affiliation: MIT, Cambridge, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [c105]Alex Lombardi, Vinod Vaikuntanathan:
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs. CRYPTO (3) 2020: 632-651 - [c104]Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
Extracting Randomness from Extractor-Dependent Sources. EUROCRYPT (1) 2020: 313-342 - [c103]Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs:
Statistical ZAPR Arguments from Bilinear Maps. EUROCRYPT (3) 2020: 620-641 - [c102]Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Cryptography from Information Loss. ITCS 2020: 81:1-81:27 - [c101]Alexander Golovnev, Siyao Guo, Thibaut Horel, Sunoo Park, Vinod Vaikuntanathan:
Data structures meet cryptography: 3SUM with preprocessing. STOC 2020: 294-307 - [i100]Zvika Brakerski, Noah Stephens-Davidowitz, Vinod Vaikuntanathan:
On the Hardness of Average-case k-SUM. CoRR abs/2010.08821 (2020) - [i99]Alex B. Grilo, Huijia Lin, Fang Song, Vinod Vaikuntanathan:
Oblivious Transfer is in MiniQCrypt. CoRR abs/2011.14980 (2020) - [i98]Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Cryptography from Information Loss. Electron. Colloquium Comput. Complex. 27: 44 (2020) - [i97]Zvika Brakerski, Vinod Vaikuntanathan:
Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE. IACR Cryptol. ePrint Arch. 2020: 191 (2020) - [i96]Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs:
Statistical ZAPR Arguments from Bilinear Maps. IACR Cryptol. ePrint Arch. 2020: 256 (2020) - [i95]Marshall Ball, Elette Boyle, Akshay Degwekar, Apoorvaa Deshpande, Alon Rosen, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Cryptography from Information Loss. IACR Cryptol. ePrint Arch. 2020: 395 (2020) - [i94]Leo de Castro, Chiraag Juvekar, Vinod Vaikuntanathan:
Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors. IACR Cryptol. ePrint Arch. 2020: 685 (2020) - [i93]Alex Lombardi, Vinod Vaikuntanathan:
Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs. IACR Cryptol. ePrint Arch. 2020: 772 (2020) - [i92]Alex Lombardi, Vinod Vaikuntanathan:
Multi-Input Correlation-Intractable Hash Functions via Shift-Hiding. IACR Cryptol. ePrint Arch. 2020: 1378 (2020) - [i91]Alex B. Grilo, Huijia Lin, Fang Song, Vinod Vaikuntanathan:
Oblivious Transfer is in MiniQCrypt. IACR Cryptol. ePrint Arch. 2020: 1500 (2020)
2010 – 2019
- 2019
- [c100]Akshay Degwekar, Preetum Nakkiran, Vinod Vaikuntanathan:
Computational Limitations in Robust Classification and Win-Win Results. COLT 2019: 994-1028 - [c99]Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan:
Reusable Non-Interactive Secure Computation. CRYPTO (3) 2019: 462-488 - [c98]Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs:
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing. EUROCRYPT (3) 2019: 619-635 - [c97]Noah Stephens-Davidowitz, Vinod Vaikuntanathan:
SETH-Hardness of Coding Problems. FOCS 2019: 287-301 - [c96]Elette Boyle, Rio LaVigne, Vinod Vaikuntanathan:
Adversarially Robust Property-Preserving Hash Functions. ITCS 2019: 16:1-16:20 - [c95]Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan:
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts. ITCS 2019: 42:1-42:20 - [c94]Alex Lombardi, Vinod Vaikuntanathan, Thuy Duong Vuong:
Lattice Trapdoors and IBE from Middle-Product LWE. TCC (1) 2019: 24-54 - [c93]Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee:
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation. TCC (1) 2019: 55-80 - [c92]Prabhanjan Ananth, Vinod Vaikuntanathan:
Optimal Bounded-Collusion Secure Functional Encryption. TCC (1) 2019: 174-198 - [i90]Akshay Degwekar, Vinod Vaikuntanathan:
Computational Limitations in Robust Classification and Win-Win Results. CoRR abs/1902.01086 (2019) - [i89]Alexander Golovnev, Siyao Guo, Thibaut Horel, Sunoo Park, Vinod Vaikuntanathan:
3SUM with Preprocessing: Algorithms, Lower Bounds and Cryptographic Applications. CoRR abs/1907.08355 (2019) - [i88]Noah Stephens-Davidowitz, Vinod Vaikuntanathan:
SETH-hardness of Coding Problems. Electron. Colloquium Comput. Complex. 26: 159 (2019) - [i87]Akshay Degwekar, Vinod Vaikuntanathan:
Computational Limitations in Robust Classification and Win-Win Results. IACR Cryptol. ePrint Arch. 2019: 218 (2019) - [i86]Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, Vinod Vaikuntanathan:
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies. IACR Cryptol. ePrint Arch. 2019: 223 (2019) - [i85]Prabhanjan Ananth, Vinod Vaikuntanathan:
Optimal Bounded-Collusion Secure Functional Encryption. IACR Cryptol. ePrint Arch. 2019: 314 (2019) - [i84]Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs:
2-Message Publicly Verifiable WI from (Subexponential) LWE. IACR Cryptol. ePrint Arch. 2019: 808 (2019) - [i83]Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan:
Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch. 2019: 939 (2019) - [i82]Alex Lombardi, Vinod Vaikuntanathan, Thuy Duong Vuong:
Lattice Trapdoors and IBE from Middle-Product LWE. IACR Cryptol. ePrint Arch. 2019: 1067 (2019) - [i81]Yilei Chen, Minki Hhan, Vinod Vaikuntanathan, Hoeteck Wee:
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation. IACR Cryptol. ePrint Arch. 2019: 1085 (2019) - [i80]Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
Extracting Randomness from Extractor-Dependent Sources. IACR Cryptol. ePrint Arch. 2019: 1339 (2019) - 2018
- [j13]Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from Functional Encryption. J. ACM 65(6): 39:1-39:37 (2018) - [j12]Nir Bitansky, Ran Canetti, Sanjam Garg, Justin Holmgren, Abhishek Jain, Huijia Lin, Rafael Pass, Sidharth Telang, Vinod Vaikuntanathan:
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings. SIAM J. Comput. 47(3): 1123-1210 (2018) - [j11]Aloni Cohen, Justin Holmgren, Ryo Nishimaki
, Vinod Vaikuntanathan, Daniel Wichs:
Watermarking Cryptographic Capabilities. SIAM J. Comput. 47(6): 2157-2202 (2018) - [c91]Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee:
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates. CRYPTO (2) 2018: 577-607 - [c90]Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan:
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions. EUROCRYPT (1) 2018: 535-564 - [c89]Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
Towards Breaking the Exponential Barrier for General Secret Sharing. EUROCRYPT (1) 2018: 567-596 - [c88]Itay Berman, Ron D. Rothblum, Vinod Vaikuntanathan:
Zero-Knowledge Proofs of Proximity. ITCS 2018: 19:1-19:20 - [c87]Tianren Liu, Vinod Vaikuntanathan:
Breaking the circuit-size barrier in secret sharing. STOC 2018: 699-708 - [c86]Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs:
Traitor-Tracing from LWE Made Simple and Attribute-Based. TCC (2) 2018: 341-369 - [c85]Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan:
GAZELLE: A Low Latency Framework for Secure Neural Network Inference. USENIX Security Symposium 2018: 1651-1669 - [i79]Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan:
Gazelle: A Low Latency Framework for Secure Neural Network Inference. CoRR abs/1801.05507 (2018) - [i78]Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan:
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts. CoRR abs/1802.07381 (2018) - [i77]Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs:
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing. Electron. Colloquium Comput. Complex. 25: 56 (2018) - [i76]Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan:
GAZELLE: A Low Latency Framework for Secure Neural Network Inference. IACR Cryptol. ePrint Arch. 2018: 73 (2018) - [i75]Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan:
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts. IACR Cryptol. ePrint Arch. 2018: 212 (2018) - [i74]Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs:
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing. IACR Cryptol. ePrint Arch. 2018: 279 (2018) - [i73]Tianren Liu, Vinod Vaikuntanathan:
Breaking the Circuit-Size Barrier in Secret Sharing. IACR Cryptol. ePrint Arch. 2018: 333 (2018) - [i72]Yilei Chen, Vinod Vaikuntanathan, Hoeteck Wee:
GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates. IACR Cryptol. ePrint Arch. 2018: 360 (2018) - [i71]Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs:
Traitor-Tracing from LWE Made Simple and Attribute-Based. IACR Cryptol. ePrint Arch. 2018: 897 (2018) - [i70]Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan:
Reusable Non-Interactive Secure Computation. IACR Cryptol. ePrint Arch. 2018: 940 (2018) - [i69]Elette Boyle, Rio LaVigne, Vinod Vaikuntanathan:
Adversarially Robust Property Preserving Hash Functions. IACR Cryptol. ePrint Arch. 2018: 1158 (2018) - 2017
- [j10]Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan:
Multikey Fully Homomorphic Encryption and Applications. SIAM J. Comput. 46(6): 1827-1892 (2017) - [j9]Yuriy Polyakov
, Kurt Rohloff
, Gyana Sahu, Vinod Vaikuntanathan:
Fast Proxy Re-Encryption for Publish/Subscribe Systems. ACM Trans. Priv. Secur. 20(4): 14:1-14:31 (2017) - [c84]Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan:
Structure vs. Hardness Through the Obfuscation Lens. CRYPTO (1) 2017: 696-723 - [c83]Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
Conditional Disclosure of Secrets via Non-linear Reconstruction. CRYPTO (1) 2017: 758-790 - [c82]Nir Bitansky, Vinod Vaikuntanathan:
A Note on Perfect Correctness by Derandomization. EUROCRYPT (2) 2017: 592-606 - [c81]Vinod Vaikuntanathan:
Some Open Problems in Information-Theoretic Cryptography. FSTTCS 2017: 5:1-5:7 - [c80]Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan:
Low-Complexity Cryptographic Hash Functions . ITCS 2017: 7:1-7:31 - [c79]Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, Matei Zaharia:
Splinter: Practical Private Queries on Public Data. NSDI 2017: 299-313 - [c78]Ran Canetti, Srinivasan Raghuraman, Silas Richelson, Vinod Vaikuntanathan:
Chosen-Ciphertext Secure Fully Homomorphic Encryption. Public Key Cryptography (2) 2017: 213-240 - [c77]Alex Lombardi, Vinod Vaikuntanathan:
Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation. TCC (1) 2017: 119-137 - [c76]Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee:
Private Constrained PRFs (and More) from LWE. TCC (1) 2017: 264-302 - [i68]Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan:
Low-Complexity Cryptographic Hash Functions. Electron. Colloquium Comput. Complex. 24: 8 (2017) - [i67]Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
New Protocols for Conditional Disclosure of Secrets (and More). Electron. Colloquium Comput. Complex. 24: 76 (2017) - [i66]Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan:
Low-Complexity Cryptographic Hash Functions. IACR Cryptol. ePrint Arch. 2017: 36 (2017) - [i65]Itay Berman, Ron D. Rothblum, Vinod Vaikuntanathan:
Zero-Knowledge Proofs of Proximity. IACR Cryptol. ePrint Arch. 2017: 114 (2017) - [i64]Alex Lombardi, Vinod Vaikuntanathan:
Minimizing the Complexity of Goldreich's Pseudorandom Generator. IACR Cryptol. ePrint Arch. 2017: 277 (2017) - [i63]Alex Lombardi, Vinod Vaikuntanathan:
On the Non-Existence of Blockwise 2-Local PRGs with Applications to Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2017: 301 (2017) - [i62]Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
New Protocols for Conditional Disclosure of Secrets (and More). IACR Cryptol. ePrint Arch. 2017: 359 (2017) - [i61]Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, Vinod Vaikuntanathan:
Fast Proxy Re-Encryption for Publish/Subscribe Systems. IACR Cryptol. ePrint Arch. 2017: 410 (2017) - [i60]Zvika Brakerski, Rotem Tsabary, Vinod Vaikuntanathan, Hoeteck Wee:
Private Constrained PRFs (and More) from LWE. IACR Cryptol. ePrint Arch. 2017: 795 (2017) - [i59]Zvika Brakerski, Alex Lombardi, Gil Segev, Vinod Vaikuntanathan:
Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions. IACR Cryptol. ePrint Arch. 2017: 967 (2017) - [i58]Tianren Liu, Vinod Vaikuntanathan, Hoeteck Wee:
Towards Breaking the Exponential Barrier for General Secret Sharing. IACR Cryptol. ePrint Arch. 2017: 1062 (2017) - 2016
- [j8]Alhassan Khedr
, P. Glenn Gulak, Vinod Vaikuntanathan:
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers. IEEE Trans. Computers 65(9): 2848-2858 (2016) - [c75]Ranjit Kumaresan, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Improvements to Secure Computation with Penalties. CCS 2016: 406-417 - [c74]Zvika Brakerski, Vinod Vaikuntanathan:
Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security. CRYPTO (3) 2016: 363-384 - [c73]Akshay Degwekar, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Fine-Grained Cryptography. CRYPTO (3) 2016: 533-562 - [c72]Huijia Lin, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree Graded Encodings. FOCS 2016: 11-20 - [c71]Zvika Brakerski, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs:
Obfuscating Conjunctions under Entropic Ring LWE. ITCS 2016: 147-156 - [c70]Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters:
Time-Lock Puzzles from Randomized Encodings. ITCS 2016: 345-356 - [c69]Frank Wang, James Mickens, Nickolai Zeldovich, Vinod Vaikuntanathan:
Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds. NSDI 2016: 611-626 - [c68]Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs:
Watermarking cryptographic capabilities. STOC 2016: 1115-1127 - [c67]Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai, Omer Paneth, Vinod Vaikuntanathan:
3-Message Zero Knowledge Against Human Ignorance. TCC (B1) 2016: 57-83 - [c66]Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation: From Approximate to Exact. TCC (A1) 2016: 67-95 - [c65]Tianren Liu, Vinod Vaikuntanathan:
On Basing Private Information Retrieval on NP-Hardness. TCC (A1) 2016: 372-386 - [i57]Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan:
Structure vs Hardness through the Obfuscation Lens. Electron. Colloquium Comput. Complex. 23: 91 (2016) - [i56]Zvika Brakerski, Vinod Vaikuntanathan:
Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security. IACR Cryptol. ePrint Arch. 2016: 118 (2016) - [i55]Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai, Omer Paneth, Vinod Vaikuntanathan:
3-Message Zero Knowledge Against Human Ignorance. IACR Cryptol. ePrint Arch. 2016: 213 (2016) - [i54]Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan:
Structure vs Hardness through the Obfuscation Lens. IACR Cryptol. ePrint Arch. 2016: 574 (2016) - [i53]Akshay Degwekar, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Fine-grained Cryptography. IACR Cryptol. ePrint Arch. 2016: 580 (2016) - [i52]Huijia Lin, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings. IACR Cryptol. ePrint Arch. 2016: 795 (2016) - [i51]Frank Wang, Catherine Yun, Shafi Goldwasser, Vinod Vaikuntanathan, Matei Zaharia:
Splinter: Practical Private Queries on Public Data. IACR Cryptol. ePrint Arch. 2016: 1148 (2016) - 2015
- [j7]Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Attribute-Based Encryption for Circuits. J. ACM 62(6): 45:1-45:33 (2015) - [c64]Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
Secret Sharing and Statistical Zero Knowledge. ASIACRYPT (1) 2015: 656-680 - [c63]Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Predicate Encryption for Circuits from LWE. CRYPTO (2) 2015: 503-523 - [c62]Prabhanjan Ananth, Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan:
From Selective to Adaptive Security in Functional Encryption. CRYPTO (2) 2015: 657-677 - [c61]Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from Functional Encryption. FOCS 2015: 171-190 - [c60]Ran Canetti, Justin Holmgren, Abhishek Jain, Vinod Vaikuntanathan:
Succinct Garbling and Indistinguishability Obfuscation for RAM Programs. STOC 2015: 429-437 - [c59]Sergey Gorbunov, Vinod Vaikuntanathan, Daniel Wichs:
Leveled Fully Homomorphic Signatures from Standard Lattices. STOC 2015: 469-477 - [c58]Zvika Brakerski, Vinod Vaikuntanathan:
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions - Or: How to Secretly Embed a Circuit in Your PRF. TCC (2) 2015: 1-30 - [c57]Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregate Pseudorandom Functions and Connections to Learning. TCC (2) 2015: 61-89 - [c56]Ran Canetti, Huijia Lin, Stefano Tessaro, Vinod Vaikuntanathan:
Obfuscation of Probabilistic Circuits and Applications. TCC (2) 2015: 468-497 - [i50]Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregate Pseudorandom Functions and Connections to Learning. Electron. Colloquium Comput. Complex. 22: 9 (2015) - [i49]Nir Bitansky, Vinod Vaikuntanathan:
A Note on Perfect Correctness by Derandomization. Electron. Colloquium Comput. Complex. 22: 187 (2015) - [i48]Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:
Predicate Encryption for Circuits from LWE. IACR Cryptol. ePrint Arch. 2015: 29 (2015) - [i47]Zvika Brakerski, Vinod Vaikuntanathan:
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF. IACR Cryptol. ePrint Arch. 2015: 32 (2015) - [i46]Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:
Aggregatable Pseudorandom Functions and Connections to Learning. IACR Cryptol. ePrint Arch. 2015: 38 (2015) - [i45]Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation from Functional Encryption. IACR Cryptol. ePrint Arch. 2015: 163 (2015) - [i44]Vinod Vaikuntanathan, Prashant Nalini Vasudevan:
From Statistical Zero Knowledge to Secret Sharing. IACR Cryptol. ePrint Arch. 2015: 281 (2015) - [i43]Aloni Cohen, Justin Holmgren, Vinod Vaikuntanathan:
Publicly Verifiable Software Watermarking. IACR Cryptol. ePrint Arch. 2015: 373 (2015) - [i42]Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, Brent Waters:
Time-Lock Puzzles from Randomized Encodings. IACR Cryptol. ePrint Arch. 2015: 514 (2015) - [i41]Nir Bitansky, Vinod Vaikuntanathan:
Indistinguishability Obfuscation: from Approximate to Exact. IACR Cryptol. ePrint Arch. 2015: 704 (2015) - [i40]Tianren Liu, Vinod Vaikuntanathan:
On Basing Private Information Retrieval on NP-Hardness. IACR Cryptol. ePrint Arch. 2015: 1061 (2015) - [i39]Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs:
Watermarking Cryptographic Capabilities. IACR Cryptol. ePrint Arch. 2015: 1096 (2015) - [i38]Nir Bitansky, Vinod Vaikuntanathan:
A Note on Perfect Correctness by Derandomization. IACR Cryptol. ePrint Arch. 2015: 1130 (2015) - 2014
- [j6]Zvika Brakerski, Vinod Vaikuntanathan:
Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$. SIAM J. Comput. 43(2): 831-871 (2014) - [j5]Sebastian Faust, Tal Rabin, Leonid Reyzin, Eran Tromer, Vinod Vaikuntanathan:
Protecting Circuits from Computationally Bounded and Noisy Leakage. SIAM J. Comput. 43(5): 1564-1614 (2014) - [j4]Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan:
(Leveled) Fully Homomorphic Encryption without Bootstrapping. ACM Trans. Comput. Theory 6(3): 13:1-13:36 (2014) - [c55]Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits. EUROCRYPT 2014: 533-556 - [c54]Zvika Brakerski, Vinod Vaikuntanathan:
Lattice-based FHE as secure as PKE. ITCS 2014: 1-12 - [i37]Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits. IACR Cryptol. ePrint Arch. 2014: 356 (2014) - [i36]Sergey Gorbunov, Vinod Vaikuntanathan:
(Leveled) Fully Homomorphic Signatures from Lattices. IACR Cryptol. ePrint Arch. 2014: 463 (2014) - [i35]Ran Canetti, Justin Holmgren, Abhishek Jain, Vinod Vaikuntanathan:
Indistinguishability Obfuscation of Iterated Circuits and RAM Programs. IACR Cryptol. ePrint Arch. 2014: 769 (2014) - [i34]Alhassan Khedr, P. Glenn Gulak, Vinod Vaikuntanathan:
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers. IACR Cryptol. ePrint Arch. 2014: 838 (2014) - [i33]Ran Canetti, Huijia Lin, Stefano Tessaro,