Vinod Vaikuntanathan Authors: Add personal information
Bibliometrics: publication history
SEARCH
ROLE
Author only

AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas

BOOKMARK & SHARE

 #resultstats2 { width:100%; padding: 10px; background-color:#ECE9D8; /*background:#9c9;*/ } #resultstats { width:100%; /*background-color:#ECE9D8;*/ font-size: 12px; /*background:#9c9;*/ } #resultstats a:link { text-decoration: none; } #resultstats div { padding-bottom: 5px; padding-top: 5px; } #resfound { background-color: #ece9d8; padding-left:5px } #searchtools { display:inline; float:right; padding-right: 10px; } #refinements { padding-top: 5px; } #refinements table { margin-left: 10px; } #refinements tr { vertical-align:top; } #refinements span { font-size: 12px; } .rectots { font-size:12px; } .problem { font-size:12px; color: red; } div.problem { height: 400px; } #results { /* float:right; */ /* width:80%; */ color: #000000; font-family: Verdana,Arial,Helvetica,sans-serif; font-size: 12px; padding-top: 10px; /*background:#9c9;*/ } #aggs { float:left; width:20%; font-family: Verdana,Arial,Helvetica,sans-serif; font-size:12px; } #pagelogic { font-family: Verdana,Arial,Helvetica,sans-serif; font-size:12px; float:right; padding-bottom: 10px; } #pagerange { font-family: Verdana,Arial,Helvetica,sans-serif; font-size:12px; float:left; padding-bottom: 10px; } #resultmenu { font-family: Verdana,Arial,Helvetica,sans-serif; font-size:12px; float:right; padding-bottom: 10px; } #resultmenu label { margin-right: 0px; vertical-align:bottom; } #resultmenu input { margin-right: 0px; vertical-align:bottom; } #resultmenu select { margin-right: 0px; background-color: #aff; border: 0; border-radius: 0; font-size: 12px; } #resultmenu option { font-size: 12px; background-color: white; } .aggHead { font-weight: bold; padding-bottom: 0; padding-top: 10px; } #aggs ul{ list-style-type: none; margin-top: 0.25em; padding-left: 0; font-size: 1em; } #upcevents li{ padding-bottom: 1.25em; } #upcevents div{ margin-top: 25px; } a.showhide:link { text-decoration: none; } #results .numbering{ font-size: 12px; font-weight:bold; width:30px; float:left; text-align: right; padding-top: 2px; } #results .details{ font-size: 12px; width:92%; float:right; padding-bottom: 20px; } #results .title{ font-size: 14px; padding-bottom:5px; } #results .authors{ font-size: 12px; padding-bottom:5px; } #results .source{ font-size: 12px; padding-bottom:5px; } #results .publisher{ font-size: 12px; padding-bottom:5px; } #results .metrics{ font-size: 12px; padding-bottom:5px; } #results .metricsCol1{ float: left; display:inline; padding-bottom:5px; } #results .metricsCol2{ float: right; display: inline; width: 590px; padding-bottom:5px; } #results .ft{ font-size: 12px; padding-bottom:5px; } #results .abstract{ font-size: 12px; padding-bottom:5px; } #results .kw{ font-size: 12px; padding-bottom:5px; } #results .pubother{ font-size: 12px; padding-bottom:5px; } .izers { margin-top: 10px; margin-bottom:10px; } .highlights em{ background-color: #FFFF00; font-style: normal; } .publicationDate { background-color: #aff; } .citedCount { } .download6Weeks { } .download12Months { } .downloadAll { } 70 results found Export Results: bibtex | endnote | acmref | csv Result 1 – 20 of 70 Result page: 1 2 3 4 Sort by: relevance publication date citation count downloads (6 Weeks) downloads (12 months) downloads (overall) 1 June 2018 STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing Publisher: ACM Bibliometrics: Citation Count: 0 Downloads (6 Weeks): 20,   Downloads (12 Months): 89,   Downloads (Overall): 89 Full text available: PDF We study secret sharing schemes for general (non-threshold) access structures. A general secret sharing scheme for n parties is associated to a monotone function F :{0,1} n →{0,1}. In such a scheme, a dealer distributes shares of a secret s among n parties. Any subset of parties T ⊆ [ ... Keywords: Information-Theoretic Cryptography, Secret Sharing 2 September 2017 ACM Transactions on Privacy and Security (TOPS): Volume 20 Issue 4, October 2017 Publisher: ACM Bibliometrics: Citation Count: 1 Downloads (6 Weeks): 19,   Downloads (12 Months): 158,   Downloads (Overall): 158 Full text available: PDF We develop two IND-CPA-secure multihop unidirectional Proxy Re-Encryption (PRE) schemes by applying the Ring-LWE (RLWE) key switching approach from the homomorphic encryption literature. Unidirectional PRE is ideal for secure publish-subscribe operations where a publisher encrypts information using a public key without knowing upfront who the subscriber will be and what ... Keywords: software engineering, Proxy re-encryption, delegating access control, lattice encryption 3 March 2017 Proceedings, Part II, of the 20th IACR International Conference on Public-Key Cryptography --- PKC 2017 - Volume 10175 Publisher: Springer-Verlag Bibliometrics: Citation Count: 1 We give three fully homomoprhic encryption FHE schemes that are secure against non-adaptive chosen ciphertext attacks CCA1. For the first two, we extend the generic transformation of Boneh, Canetti, Halevi and Katz to turn any multi-key identity-based FHE scheme into a CCA1-secure FHE scheme. We then show two instantiations of ... 4 March 2017 NSDI'17: Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation Publisher: USENIX Association Bibliometrics: Citation Count: 0 Many online services let users query public datasets such as maps, flight prices, or restaurant reviews. Unfortunately, the queries to these services reveal highly sensitive information that can compromise users' privacy. This paper presents Splinter, a system that protects users' queries on public data and scales to realistic applications. A ... 5 October 2016 Proceedings, Part I, of the 14th International Conference on Theory of Cryptography - Volume 9985 Publisher: Springer-Verlag New York, Inc. Bibliometrics: Citation Count: 0 The notion of Zero Knowledge has driven the field of cryptography since its conception over thirty years ago. It is well established that two-message zero-knowledge protocols for NP do not exist, and that four-message zero-knowledge arguments exist under the minimal assumption of one-way functions. Resolving the precise round complexity of ... 6 October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security Publisher: ACM Bibliometrics: Citation Count: 2 Downloads (6 Weeks): 20,   Downloads (12 Months): 267,   Downloads (Overall): 656 Full text available: PDF Motivated by the impossibility of achieving fairness in secure computation [Cleve, STOC 1986], recent works study a model of fairness in which an adversarial party that aborts on receiving output is forced to pay a mutually predefined monetary penalty to every other party that did not receive the output. These ... Keywords: bitcoin, fairness, secure computation 7 September 2016 IEEE Transactions on Computers: Volume 65 Issue 9, September 2016 Publisher: IEEE Computer Society Bibliometrics: Citation Count: 5 Homomorphic encryption (HE) systems enable computations on encrypted data, without decrypting and without knowledge of the secret key. In this work, we describe an optimized Ring Learning With Errors (RLWE) based implementation of a variant of the HE system recently proposed by Gentry, Sahai and Waters (GSW). Although this system ... 8 August 2016 Proceedings, Part III, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9816 Publisher: Springer-Verlag Bibliometrics: Citation Count: 1 Fine-grained cryptographic primitives are ones that are secure against adversaries with an a-priori bounded polynomial amount of resources time, space or parallel-time, where the honest algorithms use less resources than the adversaries they are designed to fool. Such primitives were previously studied in the context of time-bounded adversaries Merkle, CACM ... 9 August 2016 Proceedings, Part III, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9816 Publisher: Springer-Verlag Bibliometrics: Citation Count: 2 We construct an LWE-based key-policy attribute-based encryption ABE scheme that supports attributes of unbounded polynomial length. Namely, the size of the public parameters is a fixed polynomial in the security parameter and a depth bound, and with these fixed length parameters, one can encrypt attributes of arbitrary length. Similarly, any ... 10 June 2016 STOC '16: Proceedings of the forty-eighth annual ACM symposium on Theory of Computing Publisher: ACM Bibliometrics: Citation Count: 1 Downloads (6 Weeks): 5,   Downloads (12 Months): 39,   Downloads (Overall): 174 Full text available: PDF A watermarking scheme for programs embeds some information called a mark into a program while preserving its functionality. No adversary can remove the mark without damaging the functionality of the program. In this work, we study the problem of watermarking various cryptographic programs such as pseudorandom function (PRF) evaluation, decryption, ... Keywords: Watermarking, Indistinguishability obfuscation, Pseudorandom functions 11 March 2016 NSDI'16: Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation Publisher: USENIX Association Bibliometrics: Citation Count: 1 Modern web services rob users of low-level control over cloud storage--a user's single logical data set is scattered across multiple storage silos whose access controls are set by web services, not users. The consequence is that users lack the ultimate authority to determine how their data is shared with other ... 12 January 2016 ITCS '16: Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science Publisher: ACM Bibliometrics: Citation Count: 3 Downloads (6 Weeks): 5,   Downloads (12 Months): 71,   Downloads (Overall): 352 Full text available: PDF We show how to securely obfuscate conjunctions , which are functions f ( x 1 ,..., x n ) = ∧ i ∈ I y i where I ⊆ [ n ] and each literal y i is either just x i or ¬ x i e.g., f ( x ... Keywords: obfuscation 13 January 2016 ITCS '16: Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science Publisher: ACM Bibliometrics: Citation Count: 2 Downloads (6 Weeks): 5,   Downloads (12 Months): 36,   Downloads (Overall): 133 Full text available: PDF Time-lock puzzles are a mechanism for sending messages "to the future". A sender can quickly generate a puzzle with a solution s that remains hidden until a moderately large amount of time t has elapsed. The solution s should be hidden from any adversary that runs in time significantly less ... Keywords: proofs of work, time-lock puzzles, randomized encodings 14 January 2016 TCC 2016-A: Proceedings, Part I, of the 13th International Conference on Theory of Cryptography - Volume 9562 Publisher: Springer-Verlag Bibliometrics: Citation Count: 0 We show general transformations from subexponentially-secure approximate indistinguishability obfuscation IO where the obfuscated circuit agrees with the original circuit on a $$1/2+\epsilon$$ fraction of inputs on a certain samplable distribution, into exact indistinguishability obfuscation where the obfuscated circuit and the original circuit agree on all inputs. As a step ... 15 January 2016 TCC 2016-A: Proceedings, Part I, of the 13th International Conference on Theory of Cryptography - Volume 9562 Publisher: Springer-Verlag Bibliometrics: Citation Count: 0 The possibility of basing the security of cryptographic objects on the minimal assumption that $$\mathbf{NP } \nsubseteq \mathbf{BPP }$$ is at the very heart of complexity-theoretic cryptography. Most known results along these lines are negative, showing that assuming widely believed complexity-theoretic conjectures, there are no reductions from an ... 16 December 2015 Journal of the ACM (JACM): Volume 62 Issue 6, December 2015 Publisher: ACM Bibliometrics: Citation Count: 4 Downloads (6 Weeks): 7,   Downloads (12 Months): 112,   Downloads (Overall): 616 Full text available: PDF In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an ℓ-bit public index ind and a message m , and a secret key is associated with a Boolean predicate P . The secret key allows decrypting the ciphertext and learning m if and only if P (ind) = ... Keywords: Cryptography, attribute-based encryption, fine-grained access control, lattices, learning with errors 17 November 2015 Proceedings, Part I, of the 21st International Conference on Advances in Cryptology -- ASIACRYPT 2015 - Volume 9452 Publisher: Springer-Verlag New York, Inc. Bibliometrics: Citation Count: 0 We show a general connection between various types of statistical zero-knowledge SZK proof systems and unconditionally secure secret sharing schemes. Viewed through the SZK lens, we obtain several new results on secret-sharing:Characterizations: We obtain an almost-characterization of access structures for which there are secret-sharing schemes with an efficient sharing algorithm ... Keywords: Secret sharing, Statistical zero knowledge 18 October 2015 FOCS '15: Proceedings of the 2015 IEEE 56th Annual Symposium on Foundations of Computer Science (FOCS) Publisher: IEEE Computer Society Bibliometrics: Citation Count: 5 Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic object. So far, candidate IO constructions were based on specific assumptions on algebraic objects called multi-linear graded encodings. We present a generic construction of indistinguishability obfuscation from public-key functional encryption with succinct cipher ... 19 June 2015 STOC '15: Proceedings of the forty-seventh annual ACM symposium on Theory of computing Publisher: ACM Bibliometrics: Citation Count: 17 Downloads (6 Weeks): 5,   Downloads (12 Months): 26,   Downloads (Overall): 243 Full text available: PDF We show how to construct succinct Indistinguishability Obfuscation (IO) schemes for RAM programs. That is, given a RAM program whose computation requires space S and time T, we generate a RAM program with size and space requirements of ~O(S) and runtime ~O(T). The construction uses non-succinct IO (i.e., IO for ... Keywords: garbling, indistinguishability obfuscation, punctured programming, ram programs 20 June 2015 STOC '15: Proceedings of the forty-seventh annual ACM symposium on Theory of computing Publisher: ACM Bibliometrics: Citation Count: 20 Downloads (6 Weeks): 12,   Downloads (12 Months): 56,   Downloads (Overall): 371 Full text available: PDF In a homomorphic signature scheme, a user Alice signs some large dataset x using her secret signing key and uploads the signed data to an untrusted remote server. The server can then run some computation y=f(x) over the signed data and homomorphically derive a short signature σ f,y certifying that ... Keywords: sis, homomorphic signatures, lattices