Pratyay Mukherjee

Cryptography and Computer Security Researcher

Publications

Note: In most publications authors are ordered alphabetically according to their last names following the standard practice in cryptography/theory. Exceptions, where authors are ordered according to contribution, are *marked.


DBLP

Google Scholar


Preprints

  • InstaRand: Instantly Available and Instantly Verifiable On-chain Randomness [ePrint, pdf]
    • with Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Pratik Sarkar, Sri Aravinda Krishnan Thyagarajan
  • ANARKey: A New Approach to (Socially) Recover Keys [ePrint, pdf]
    • with Aniket Kate, Hamza Saleem, Pratik Sarkar, Bhaskar Roberts
  • Insta-Pok3r: Real-time Poker on Blockchain [ePrint, pdf]
    • with Sanjam Garg, Aniket Kate, Rohit Sinha, Sriram Sridhar
    • contributed talk at TPMPC Workshop 2025
  • Efficient Threshold FHE with Application to Real-Time Systems* [ePrint, pdf]
    • by Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, Debdeep Mukhopadhyay.

Peer Reviewed

  1. Traceable Bottom-Up Secret Sharing and Law & Order on Community Social Key Recovery
    • with Rittwik Hajra, Subha Kar, Pratyay Mukherjee and Soumit Pal
    • in INDOCRYPT 2025 (to appear)
  2. HiSE: Hierarchical (Threshold) Symmetric-key Encryption [ePrint, pdf]
    • with Pousali De, Swagata Sasmal, Rohit Sinha
    • in IACR Communications in Cryptology 2025 [Journal]
  3. CCA-Secure Traceable Threshold (ID-based) Encryption and Application [ePrint, pdf]
    • with Rishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Hussien Othman
    • in ACM CCS 2025 (to appear)
  4. VITARIT: Paying for Threshold Services on Bitcoin and Friends* [ePrint, pdf]
    • by Sri AravindaKrishnan Thyagarajan, Easwar Vivek Mangipudi, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee
    • in IEEE S&P 2025
  5. Dyna-hinTS: Silent Threshold Signatures for Dynamic Committees [ePrint, pdf]
    • with Aniket Kate, Samipa Samanta, and Pratik Sarkar
    • in CVCBT 2025
  6. VRaaS: Verifiable Randomness as a Service on Blockchains [ePrint, pdf]
    • with Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratik Sarkar, Sri AravindaKrishnan Thyagarajan
    • in CSF 2025
  7. Universally Composable Non-Interactive Zero-Knowledge from Sigma Protocols via a New Straight-line Compiler [ePrint, pdf]
    • with Megan Chen, Pousali Dey, Chaya Ganesh, Pratik Sarkar, Swagata Sasmal
    • in PKC 2025
  8. Scalable Multiparty Computation from Non-linear Secret Sharing [ePrint, pdf]
    • with Sanjam Garg, Abhishek Jain, Mingyuan Wang
    • in CRYPTO 2024
    • contributed talk at TPMPC 2024 workshop.
  9. Non-interactive VSS using Class Groups and Application to DKG [ePrint, pdf]
    • with Aniket Kate, Easwar Vivek Mangipudi, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan
    • in ACM CCS 2024
    • contributed talk at SBC 2024 workshop.
  10. hinTS: Threshold Signatures with Silent Setup [ePrint, pdf]
    • with Sanjam Garg, Abhishek Jain, Rohit Sinha, Mingyuan Wang, Yinuo Zhang.
    • in IEEE S&P 2024
  11. On the Round Complexity of Fully Secure Solitary MPC with Honest Majority [ePrint, pdf]
    • with Saikrishna Badrinarayanan, Peihan Miao, Divya Ravi
    • in TCC 2023 [proceeding]
  12. Cryptography with Weights: MPC, Encryption and Signatures [ePrint, pdf]
    • with Sanjam Garg, Abhishek Jain, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
    • in CRYPTO 2023 [proceeding].
  13. FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains [ePrint, pdf]
    • with Aniket Kate, Easwar Mangipudi, Siva Maradana
    • in ACM CCS 2023 [proceeding].
  14. Round-Optimal Oblivious Transfer and MPC from Computational CSIDH [ePrint, pdf]
    • with Saikrishna Badrinarayanan, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar
    • in PKC 2023 [proceeding].
  15. Threshold Signatures in the Multiverse [ePrint, pdf]
    • with Leemon Baird, Sanjam Garg, Abhishek Jain, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
    • in IEEE S&P 2023 [proceeding].
  16. ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model [ePrint, pdf]
    • with Shashank Agrawal, Wei Dai, Atul Luykx, Peter Rindal
    • in INDOCRYPT 2022. [proceeding]
  17. 𝔦-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains? [ePrint, pdf]
    • with Leemon Baird, Rohit Sinha
    • in ACM CCS 2022. [proceeding]
  18. A More Complete Analysis of the Signal Double Ratchet Algorithm [ePrint, pdf]
    • with Alexander Bienstock, Jaiden Fairoze, Sanjam Garg, Srinivasan Raghuraman
    • in CRYPTO 2022. [proceeding]
  19. Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security [ePrint, pdf]
    • with Saikrishna Badrinarayanan, Daniel Masny
    • in ACNS 2022. [proceeding]
  20. Amortized Threshold Symmetric-key Encryption [ePrint, pdf]
    • with Mihai Christodorescu, Sivanarayana Gaddam, Rohit Sinha
    • in ACM CCS 2021. [proceeding]
  21. BETA: Biometric Enabled Threshold Authentication [ePrint, pdf]
    • with Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Sikhar Patranabis
    • in PKC 2021. [proceeding]
  22. Adaptively secure Threshold Symmetric-key Encryption [ePrint, pdf ,video]
    • in INDOCRYPT 2020.
  23. Reusable Two-Round MPC from DDH [ePrint, pdf ,video]
    • with James Bartusek, Sanjam Garg, Daniel Masny 
    • in TCC 2020.
  24. Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching [ePrint, pdf]
    • with Shashank Agrawal, Saikrishna Badrinarayanan, Peter Rindal
    • in ACM CCS 2020.
  25. Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures [ePrint, pdf]
  26. Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space [ePrint, pdf]
    • with Binyi Chen, Yilei Chen, Kristina Hostáková
    • in CRYPTO 2019 [proceeding, video].
  27. Obfuscation from Low Noise Multilinear Maps [ePrint, pdf]
    • with Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao
    • in INDOCRYPT 2018 [proceeding].
  28. DiSE: Distributed Symmetric-key Encryption [ePrint, pdf, video]
  29. PASTA: PASsword-based Threshold Authentication [ePrint, pdf, shorter video, longer video]
    • with Shashank Agrawal, Peihan Miao, Payman Mohassel
    • in ACM CCS 2018 [proceeding].
  30. Non-Malleable Codes for Space-Bounded Tampering [ePrint, pdf, video]
    • with Sebastian Faust, Kristina Hostáková, Daniele Venturi
    • in CRYPTO 2017 [proceeding].
  31. Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 [ePrint, pdf]
    • with Daniel Apon, Nico Döttling, Sanjam Garg
    • in ICALP 2017 (Track-A) [proceeding].
  32. Secure Obfuscation in a Weak Multilinear Map Model [ePrint, pdf]
    • with Sanjam Garg, Eric Miles, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry
    • in TCC 2016-B [proceeding]. (merger of GMS and MSZ)
  33. Block-wise Non-malleable Codes [ePrint, pdf]
    • with Nishanth Chandran, Vipul Goyal, Omkant Pandey, Jalaj Upadhyay
    • in ICALP 2016 (Track-A) [proceeding].
  34. Two Round Multi-party Computation via Multi-Key FHE [ePrint, pdf, video]
    • with Daniel Wichs
    • in EUROCRYPT 2016 [proceeding].
  35. The Exact Round Complexity of Secure Computation[ePrint, pdf, video]
    • with Sanjam Garg, Omkant Pandey, Antigoni Polychroniadou
    • in EUROCRYPT 2016 [proceeding].
  36. The Chaining Lemma and its application [ePrint, pdf, slides]
    • with Ivan Damgård, Sebastian Faust, Daniele Venturi
    • in ICITS 2015 [proceeding].
  37. A Tamper and Leakage Resilient von Neumann Architecture [ePrint, pdf, slides]
    • with Sebastian Faust, Jesper Buus Nielsen, Daniele Venturi
    • in PKC 2015 [proceeding].
  38. Non-Adaptive Programmability of Random Oracle [pdf]
    • with Rishiraj Bhattacharyya
    • in Theoretical Computer Science 2015 [journal].
  39. Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits [ePrint, pdf, slides]
    • with Sebastian Faust, Daniele Venturi, Daniel Wichs.
    • in EUROCRYPT 2014 [proceeding]
    • extended version in IEEE Transactions on Information Theory 2016 [journal].
  40. Continuous Non-malleable Codes [ePrint, pdf, slides, video]
    • with Sebastian Faust, Jesper Buus Nielsen, Daniele Venturi
    • in TCC 2014 [proceeding]
    • extended version in Journal of Cryptology 2020 [journal].
  41. Bounded Tamper Resilience: How to go beyond the Algebraic Barrier [ePrint, pdf, slides]
    • with Ivan Damgård, Sebastian Faust, Daniele Venturi
    • in ASIACRYPT 2013 [proceeding]
    • extended version in Journal of Cryptology 2017 [journal].

Other

  • Protecting Cryptographic Memory against Tampering Attack [pdf, slides]
    • PhD Thesis, Aarhus University, 2015.
  • An Overview of eSTREAM Ciphers [pdf]
    • Survey, Centre of Excellence in Cryptology, Indian Statistical Institute, 2012.
  • Parallelization of the Wiedemann Large Sparse System Solver over Large Prime Fields [pdf, slides]
    • Master’s Thesis supervised by Abhijit Das, IIT Kharagpur, 2011.