Bounded ciphertext policy attribute based encryption V Goyal, A Jain, O Pandey, A Sahai International Colloquium on Automata, Languages, and Programming, 579-591, 2008 | 787 | 2008 |
Multiparty computation with low communication, computation and interaction via threshold FHE G Asharov, A Jain, A López-Alt, E Tromer, V Vaikuntanathan, D Wichs Annual International Conference on the Theory and Applications of …, 2012 | 534 | 2012 |
Multi-input functional encryption S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ... Annual International Conference on the Theory and Applications of …, 2014 | 422 | 2014 |
Indistinguishability obfuscation from compact functional encryption P Ananth, A Jain Advances in Cryptology--CRYPTO 2015, 308-326, 2015 | 264 | 2015 |
Time-lock puzzles from randomized encodings N Bitansky, S Goldwasser, A Jain, O Paneth, V Vaikuntanathan, B Waters Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016 | 175 | 2016 |
Function-hiding inner product encryption A Bishop, A Jain, L Kowalczyk Advances in Cryptology–ASIACRYPT 2015, 470-491, 2015 | 154 | 2015 |
Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards AR Choudhuri, M Green, A Jain, G Kaptchuk, I Miers Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 151 | 2017 |
Practical UC security with a global random oracle R Canetti, A Jain, A Scafuro Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 138 | 2014 |
Commitments and efficient zero-knowledge proofs from learning parity with noise A Jain, S Krenn, K Pietrzak, A Tentes Advances in Cryptology–ASIACRYPT 2012, 663-680, 2012 | 135 | 2012 |
Efficient Authentication from Hard Learning Problems E Kiltz, K Pietrzak, D Venturi, D Cash, A Jain Journal of Cryptology 30 (4), 1238-1275, 2017 | 131 | 2017 |
Efficient authentication from hard learning problems E Kiltz, K Pietrzak, D Cash, A Jain, D Venturi Advances in Cryptology–EUROCRYPT 2011, 7-26, 2011 | 131* | 2011 |
Succinct garbling and indistinguishability obfuscation for ram programs R Canetti, J Holmgren, A Jain, V Vaikuntanathan Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of …, 2015 | 127* | 2015 |
On the achievability of simulation-based security for functional encryption A De Caro, V Iovino, A Jain, A O’Neill, O Paneth, G Persiano Advances in Cryptology–CRYPTO 2013, 519-535, 2013 | 113 | 2013 |
Leakage-resilient zero knowledge S Garg, A Jain, A Sahai Advances in Cryptology–CRYPTO 2011, 297-315, 2011 | 89 | 2011 |
Packet-dropping adversary identification for data plane security X Zhang, A Jain, A Perrig Proceedings of the 2008 ACM CoNEXT Conference, 1-12, 2008 | 86 | 2008 |
SNARGs for P from LWE. AR Choudhuri, A Jain, Z Jin IACR Cryptol. ePrint Arch. 2021, 808, 2021 | 84* | 2021 |
Why “fiat-shamir for proofs” lacks a proof N Bitansky, D Dachman-Soled, S Garg, A Jain, YT Kalai, A López-Alt, ... Theory of Cryptography, 182-201, 2013 | 71 | 2013 |
Distinguisher-dependent simulation in two rounds and its applications A Jain, YT Kalai, D Khurana, R Rothblum Annual International Cryptology Conference, 158-189, 2017 | 70 | 2017 |
Promise zero knowledge and its applications to round optimal MPC S Badrinarayanan, V Goyal, A Jain, YT Kalai, D Khurana, A Sahai Annual International Cryptology Conference, 459-487, 2018 | 68 | 2018 |
A new approach to round-optimal secure multiparty computation P Ananth, AR Choudhuri, A Jain Annual International Cryptology Conference, 468-499, 2017 | 68 | 2017 |