What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Dakshita Khurana
Google Scholar
ORCID:
0000-0001-5315-4503
45
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
On Weak NIZKs, One-Way Functions and Amplification.
Suvradip Chakraborty
James Hulett
Dakshita Khurana
2025
conf/crypto
On the Power of Oblivious State Preparation.
James Bartusek
Dakshita Khurana
2024
conf/eurocrypt
Software with Certified Deletion.
James Bartusek
Vipul Goyal
Dakshita Khurana
Giulio Malavolta
Justin Raizes
Bhaskar Roberts
2024
conf/asiacrypt
Unclonable Non-interactive Zero-Knowledge.
Ruta Jawale
Dakshita Khurana
2023
conf/crypto
Publicly-Verifiable Deletion via Target-Collapsing Functions.
James Bartusek
Dakshita Khurana
Alexander Poremba
2023
conf/crypto
Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge).
James Bartusek
Dakshita Khurana
Akshayaram Srinivasan
2023
conf/crypto
Round-Optimal Black-Box MPC in the Plain Model.
Yuval Ishai
Dakshita Khurana
Amit Sahai
Akshayaram Srinivasan
2023
conf/crypto
Cryptography with Certified Deletion.
James Bartusek
Dakshita Khurana
2023
conf/eurocrypt
A New Framework for Quantum Oblivious Transfer.
Amit Agarwal
James Bartusek
Dakshita Khurana
Nishant Kumar
2023
conf/eurocrypt
Black-Box Reusable NISC with Random Oracles.
Yuval Ishai
Dakshita Khurana
Amit Sahai
Akshayaram Srinivasan
2023
conf/eurocrypt
On Non-uniform Security for Black-Box Non-interactive CCA Commitments.
Rachit Garg
Dakshita Khurana
George Lu
Brent Waters
2023
conf/asiacrypt
Weak Zero-Knowledge via the Goldreich-Levin Theorem.
Dakshita Khurana
Giulio Malavolta
Kabir Tomer
2023
conf/tcc
Weakening Assumptions for Publicly-Verifiable Deletion.
James Bartusek
Dakshita Khurana
Giulio Malavolta
Alexander Poremba
Michael Walter
2023
conf/tcc
On Black-Box Verifiable Outsourcing.
Amit Agarwal
Navid Alamati
Dakshita Khurana
Srinivasan Raghuraman
Peter Rindal
2022
conf/eurocrypt
Round-Optimal Black-Box Protocol Compilers.
Yuval Ishai
Dakshita Khurana
Amit Sahai
Akshayaram Srinivasan
2022
conf/eurocrypt
SNARGs for P from Sub-exponential DDH and QR.
James Hulett
Ruta Jawale
Dakshita Khurana
Akshayaram Srinivasan
2022
conf/eurocrypt
COA-Secure Obfuscation and Applications.
Ran Canetti
Suvradip Chakraborty
Dakshita Khurana
Nishant Kumar
Oxana Poburinnaya
Manoj Prabhakaran
2022
conf/tcc
Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT.
Yuval Ishai
Dakshita Khurana
Amit Sahai
Akshayaram Srinivasan
2021
conf/crypto
On the Round Complexity of Secure Quantum Computation.
James Bartusek
Andrea Coladangelo
Dakshita Khurana
Fermi Ma
2021
conf/crypto
On the Round Complexity of Black-Box Secure MPC.
Yuval Ishai
Dakshita Khurana
Amit Sahai
Akshayaram Srinivasan
2021
conf/crypto
One-Way Functions Imply Secure Computation in a Quantum World.
James Bartusek
Andrea Coladangelo
Dakshita Khurana
Fermi Ma
2021
conf/crypto
Improved Computational Extractors and Their Applications.
Dakshita Khurana
Akshayaram Srinivasan
2021
conf/crypto
Compact Ring Signatures from Learning with Errors.
Rohit Chatterjee
Sanjam Garg
Mohammad Hajiabadi
Dakshita Khurana
Xiao Liang
Giulio Malavolta
Omkant Pandey
Sina Shiehian
2021
conf/pkc
On the CCA Compatibility of Public-Key Infrastructure.
Dakshita Khurana
Brent Waters
2021
conf/eurocrypt
Non-interactive Distributional Indistinguishability (NIDI) and Non-malleable Commitments.
Dakshita Khurana
2021
conf/eurocrypt
Post-Quantum Multi-Party Computation.
Amit Agarwal
James Bartusek
Vipul Goyal
Dakshita Khurana
Giulio Malavolta
2021
conf/eurocrypt
Black-Box Non-interactive Non-malleable Commitments.
Rachit Garg
Dakshita Khurana
George Lu
Brent Waters
2021
conf/tcc
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation.
Amit Agarwal
James Bartusek
Vipul Goyal
Dakshita Khurana
Giulio Malavolta
2020
conf/eurocrypt
Low Error Efficient Computational Extractors in the CRS Model.
Ankit Garg
Yael Tauman Kalai
Dakshita Khurana
2020
conf/eurocrypt
Statistical ZAP Arguments.
Saikrishna Badrinarayanan
Rex Fernando
Aayush Jain
Dakshita Khurana
Amit Sahai
2020
conf/tcc
On Statistical Security in Two-Party Computation.
Dakshita Khurana
Muhammad Haris Mughees
2019
conf/crypto
Non-interactive Non-malleability from Quantum Supremacy.
Yael Tauman Kalai
Dakshita Khurana
2018
conf/crypto
Promise Zero Knowledge and Its Applications to Round Optimal MPC.
Saikrishna Badrinarayanan
Vipul Goyal
Abhishek Jain
Yael Tauman Kalai
Dakshita Khurana
Amit Sahai
2018
conf/eurocrypt
Statistical Witness Indistinguishability (and more) in Two Messages.
Yael Tauman Kalai
Dakshita Khurana
Amit Sahai
2018
conf/tcc
Upgrading to Functional Encryption.
Saikrishna Badrinarayanan
Dakshita Khurana
Amit Sahai
Brent Waters
2018
conf/tcc
Round Optimal Black-Box "Commit-and-Prove".
Dakshita Khurana
Rafail Ostrovsky
Akshayaram Srinivasan
2017
conf/crypto
Distinguisher-Dependent Simulation in Two Rounds and its Applications.
Abhishek Jain
Yael Tauman Kalai
Dakshita Khurana
Ron Rothblum
2017
conf/eurocrypt
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs.
Saikrishna Badrinarayanan
Dakshita Khurana
Rafail Ostrovsky
Ivan Visconti
2017
conf/tcc
Round Optimal Concurrent Non-malleability from Polynomial Hardness.
Dakshita Khurana
2017
conf/tcc
Round Optimal Concurrent MPC via Strong Simulation.
Saikrishna Badrinarayanan
Vipul Goyal
Abhishek Jain
Dakshita Khurana
Amit Sahai
2016
conf/eurocrypt
All Complete Functionalities are Reversible.
Dakshita Khurana
Daniel Kraschewski
Hemanta K. Maji
Manoj Prabhakaran
Amit Sahai
2016
conf/eurocrypt
Secure Computation from Elastic Noisy Channels.
Dakshita Khurana
Hemanta K. Maji
Amit Sahai
2016
conf/asiacrypt
How to Generate and Use Universal Samplers.
Dennis Hofheinz
Tibor Jager
Dakshita Khurana
Amit Sahai
Brent Waters
Mark Zhandry
2015
conf/asiacrypt
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation.
Dakshita Khurana
Vanishree Rao
Amit Sahai
2014
conf/asiacrypt
Black-Box Separations for Differentially Private Protocols.
Dakshita Khurana
Hemanta K. Maji
Amit Sahai
Coauthors
Aayush Jain
(1)
Abhishek Jain
(3)
Akshayaram Srinivasan
(9)
Alexander Poremba
(2)
Amit Agarwal
(4)
Amit Sahai
(15)
Andrea Coladangelo
(2)
Ankit Garg
(1)
Bhaskar Roberts
(1)
Brent Waters
(5)
Dakshita Khurana
(45)
Daniel Kraschewski
(1)
Dennis Hofheinz
(1)
Fermi Ma
(2)
George Lu
(2)
Giulio Malavolta
(6)
Hemanta K. Maji
(3)
Ivan Visconti
(1)
James Bartusek
(11)
James Hulett
(2)
Justin Raizes
(1)
Kabir Tomer
(1)
Manoj Prabhakaran
(2)
Mark Zhandry
(1)
Michael Walter
(1)
Mohammad Hajiabadi
(1)
Muhammad Haris Mughees
(1)
Navid Alamati
(1)
Nishant Kumar
(2)
Omkant Pandey
(1)
Oxana Poburinnaya
(1)
Peter Rindal
(1)
Rachit Garg
(2)
Rafail Ostrovsky
(2)
Ran Canetti
(1)
Rex Fernando
(1)
Rohit Chatterjee
(1)
Ron Rothblum
(1)
Ruta Jawale
(2)
Saikrishna Badrinarayanan
(5)
Sanjam Garg
(1)
Sina Shiehian
(1)
Srinivasan Raghuraman
(1)
Suvradip Chakraborty
(2)
Tibor Jager
(1)
Vanishree Rao
(1)
Vipul Goyal
(5)
Xiao Liang
(1)
Yael Tauman Kalai
(5)
Yuval Ishai
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to