Selected Recent Publications

  • Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE. Shweta Agrawal and Monosij Maitra and Narasimha Sai Vempati and Shota Yamada. In Proceedings of Crypto, 2021.

  • Deniable Fully Homomorphic Encryption from LWE. Shweta Agrawal and Shafi Goldwasser and Saleet Mossel. In Proceedings of Crypto, 2021.

  • Multi-Input Quadratic Functional Encryption from Pairings. Shweta Agrawal and Rishab Goyal and Junichi Tomida. In Proceedings of Crypto, 2021.

  • Secure Computation from One-Way Noisy Communication, or, Anti-Correlation via Anti-Concentration. Shweta Agrawal and Yuval Ishai and Eyal Kushilevitz and Varun Narayanan and Manoj Prabhakaran and Vinod M. Prabhakaran and Alon Rosen. In Proceedings of Crypto, 2021.

  • Efficient Distributed Algorithms for the k-machine model via PRAM Simulations. John Augustine, Kishore Kothapalli, and Gopal Pandurangan. IPDPS, 2021.

  • CP-ABE for Circuits (and more) in the Symmetric Key Setting. Shweta Agrawal and Shota Yamada. In Proceedings of Theory of Cryptography Conference (TCC), 2020.

  • Optimal Broadcast Encryption from Pairings and LWE in the Standard Model. Shweta Agrawal and Daniel Wichs and Shota Yamada. In Proceedings of Theory of Cryptography Conference (TCC), 2020.

  • Shortest Paths in a Hybrid Network Model. John Augustine, Kristian Hinnenthal, Fabian Kuhn, Christian Scheideler, and Philipp Schneider. In Symposium of Discrete Algorithms (SODA) 2020.

  • Cache Me if You Can: Capacitated Selfish Replication Games in Networks. Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Naga Naresh Karuturi, C. Pandu Rangan, Rajmohan Rajaraman, Ravi Sundaram. In Theory Comput. Syst. Vol 64, 2020.

  • Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE. Shweta Agrawal and Alice Pellet-Mary. In proceedings of Eurocrypt 2020.

  • Optimal Broadcast Encryption from Pairings and LWE. Shweta Agrawal and Shota Yamada. In proceedings of Eurocrypt 2020.

  • Latency, Capacity, and Distributed Minimum Spanning Tree. John Augustine, Seth Gilbert, Fabian Kuhn, Peter Robinson and Suman Sourav. In International Conference on Distributed Computing Systems (ICDCS) 2020.

  • Witness Maps and Applications. Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs. In Public Key Cryptography (PKC) 2020.

  • Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks. Suvradip Chakraborty, C. Pandu Rangan In Topics in Cryptology - CT-RSA 2019.

  • Attribute Based Encryption (and more) for Nondeterministic Finite Automata from Learning With Errors. Shweta Agrawal, Monosij Maitra and Shota Yamada. In proceedings of Crypto, 2019.

  • Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption. Benoit Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen et Huaxiong Wang. In Theoretical Computer Science, 2019.

  • Provable Time-Memory Tradeoffs: Symmetric Cryptography against Memory-Bounded Adversaries. Stefano Tessaro and Aishwarya Thiruvengadam. In Theory of Cryptography Conference (TCC) 2018.

  • The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. Viet Tung Hoang, Stefano Tessaro and Aishwarya Thiruvengadam. In ACM Conference on Computer and Communications Security (CCS), 2018.

  • Sublinear Message Bounds for Randomized Agreement. John Augustine, Anisur Rahaman Molla, and Gopal Pandurangan. In Principles of Distributed Computing (PODC), 2018.

  • Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks. Benoit Cogliati, Yevgeniy Dodis, Jonathan Katz, Jooyoung Lee, John Steinberger, Aishwarya Thiruvengadam and Zhe Zhang. In Crypto 2018.