Note: In most publications authors are ordered alphabetically according to their last names following the standard practice in cryptography/theory. Exceptions, where authors are ordered according to contribution, are *marked.
DBLP
Google Scholar
Preprints
- InstaRand: Instantly Available and Instantly Verifiable On-chain Randomness [ePrint, pdf]
- with Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Pratik Sarkar, Sri Aravinda Krishnan Thyagarajan
- ANARKey: A New Approach to (Socially) Recover Keys [ePrint, pdf]
- with Aniket Kate, Hamza Saleem, Pratik Sarkar, Bhaskar Roberts
- Insta-Pok3r: Real-time Poker on Blockchain [ePrint, pdf]
- with Sanjam Garg, Aniket Kate, Rohit Sinha, Sriram Sridhar
- contributed talk at TPMPC Workshop 2025
- Efficient Threshold FHE with Application to Real-Time Systems* [ePrint, pdf]
- by Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, Debdeep Mukhopadhyay.
Peer Reviewed
- Traceable Bottom-Up Secret Sharing and Law & Order on Community Social Key Recovery
- with Rittwik Hajra, Subha Kar, Pratyay Mukherjee and Soumit Pal
- in INDOCRYPT 2025 (to appear)
- HiSE: Hierarchical (Threshold) Symmetric-key Encryption [ePrint, pdf]
- with Pousali De, Swagata Sasmal, Rohit Sinha
- in IACR Communications in Cryptology 2025 [Journal]
- CCA-Secure Traceable Threshold (ID-based) Encryption and Application [ePrint, pdf]
- with Rishiraj Bhattacharyya, Jan Bormet, Sebastian Faust, Hussien Othman
- in ACM CCS 2025 (to appear)
- VITARIT: Paying for Threshold Services on Bitcoin and Friends* [ePrint, pdf]
- by Sri AravindaKrishnan Thyagarajan, Easwar Vivek Mangipudi, Lucjan Hanzlik, Aniket Kate, Pratyay Mukherjee
- in IEEE S&P 2025
- Dyna-hinTS: Silent Threshold Signatures for Dynamic Committees [ePrint, pdf]
- with Aniket Kate, Samipa Samanta, and Pratik Sarkar
- in CVCBT 2025
- VRaaS: Verifiable Randomness as a Service on Blockchains [ePrint, pdf]
- with Jacob Gorman, Lucjan Hanzlik, Aniket Kate, Easwar Vivek Mangipudi, Pratik Sarkar, Sri AravindaKrishnan Thyagarajan
- in CSF 2025
- Universally Composable Non-Interactive Zero-Knowledge from Sigma Protocols via a New Straight-line Compiler [ePrint, pdf]
- with Megan Chen, Pousali Dey, Chaya Ganesh, Pratik Sarkar, Swagata Sasmal
- in PKC 2025
- Scalable Multiparty Computation from Non-linear Secret Sharing [ePrint, pdf]
- with Sanjam Garg, Abhishek Jain, Mingyuan Wang
- in CRYPTO 2024
- contributed talk at TPMPC 2024 workshop.
- Non-interactive VSS using Class Groups and Application to DKG [ePrint, pdf]
- with Aniket Kate, Easwar Vivek Mangipudi, Hamza Saleem, Sri Aravinda Krishnan Thyagarajan
- in ACM CCS 2024
- contributed talk at SBC 2024 workshop.
- hinTS: Threshold Signatures with Silent Setup [ePrint, pdf]
- with Sanjam Garg, Abhishek Jain, Rohit Sinha, Mingyuan Wang, Yinuo Zhang.
- in IEEE S&P 2024
- On the Round Complexity of Fully Secure Solitary MPC with Honest Majority [ePrint, pdf]
- with Saikrishna Badrinarayanan, Peihan Miao, Divya Ravi
- in TCC 2023 [proceeding]
- Cryptography with Weights: MPC, Encryption and Signatures [ePrint, pdf]
- with Sanjam Garg, Abhishek Jain, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
- in CRYPTO 2023 [proceeding].
- FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains [ePrint, pdf]
- with Aniket Kate, Easwar Mangipudi, Siva Maradana
- in ACM CCS 2023 [proceeding].
- Round-Optimal Oblivious Transfer and MPC from Computational CSIDH [ePrint, pdf]
- with Saikrishna Badrinarayanan, Daniel Masny, Sikhar Patranabis, Srinivasan Raghuraman, Pratik Sarkar
- in PKC 2023 [proceeding].
- Threshold Signatures in the Multiverse [ePrint, pdf]
- with Leemon Baird, Sanjam Garg, Abhishek Jain, Rohit Sinha, Mingyuan Wang, Yinuo Zhang
- in IEEE S&P 2023 [proceeding].
- ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model [ePrint, pdf]
- with Shashank Agrawal, Wei Dai, Atul Luykx, Peter Rindal
- in INDOCRYPT 2022. [proceeding]
- 𝔦-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains? [ePrint, pdf]
- with Leemon Baird, Rohit Sinha
- in ACM CCS 2022. [proceeding]
- A More Complete Analysis of the Signal Double Ratchet Algorithm [ePrint, pdf]
- with Alexander Bienstock, Jaiden Fairoze, Sanjam Garg, Srinivasan Raghuraman
- in CRYPTO 2022. [proceeding]
- Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security [ePrint, pdf]
- with Saikrishna Badrinarayanan, Daniel Masny
- in ACNS 2022. [proceeding]
- Amortized Threshold Symmetric-key Encryption [ePrint, pdf]
- with Mihai Christodorescu, Sivanarayana Gaddam, Rohit Sinha
- in ACM CCS 2021. [proceeding]
- BETA: Biometric Enabled Threshold Authentication [ePrint, pdf]
- with Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Sikhar Patranabis
- in PKC 2021. [proceeding]
- Adaptively secure Threshold Symmetric-key Encryption [ePrint, pdf ,video]
- in INDOCRYPT 2020.
- Reusable Two-Round MPC from DDH [ePrint, pdf ,video]
- with James Bartusek, Sanjam Garg, Daniel Masny
- in TCC 2020.
- Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching [ePrint, pdf]
- with Shashank Agrawal, Saikrishna Badrinarayanan, Peter Rindal
- in ACM CCS 2020.
- Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures [ePrint, pdf]
- with Yilei Chen, Nicholas Genise
- in ASIACRYPT 2019 [proceeding]
- preliminary version inSecond NIST PQC Standardization Conference [pdf].
- Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space [ePrint, pdf]
- with Binyi Chen, Yilei Chen, Kristina Hostáková
- in CRYPTO 2019 [proceeding, video].
- Obfuscation from Low Noise Multilinear Maps [ePrint, pdf]
- with Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao
- in INDOCRYPT 2018 [proceeding].
- DiSE: Distributed Symmetric-key Encryption [ePrint, pdf, video]
- with Shashank Agrawal, Payman Mohassel, Peter Rindal
- in ACM CCS 2018 [proceeding].
- contributed talk at Real World Crypto, 2020 [video].
- PASTA: PASsword-based Threshold Authentication [ePrint, pdf, shorter video, longer video]
- with Shashank Agrawal, Peihan Miao, Payman Mohassel
- in ACM CCS 2018 [proceeding].
- Non-Malleable Codes for Space-Bounded Tampering [ePrint, pdf, video]
- with Sebastian Faust, Kristina Hostáková, Daniele Venturi
- in CRYPTO 2017 [proceeding].
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 [ePrint, pdf]
- with Daniel Apon, Nico Döttling, Sanjam Garg
- in ICALP 2017 (Track-A) [proceeding].
- Secure Obfuscation in a Weak Multilinear Map Model [ePrint, pdf]
- with Sanjam Garg, Eric Miles, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry
- in TCC 2016-B [proceeding]. (merger of GMS and MSZ)
- Block-wise Non-malleable Codes [ePrint, pdf]
- with Nishanth Chandran, Vipul Goyal, Omkant Pandey, Jalaj Upadhyay
- in ICALP 2016 (Track-A) [proceeding].
- Two Round Multi-party Computation via Multi-Key FHE [ePrint, pdf, video]
- with Daniel Wichs
- in EUROCRYPT 2016 [proceeding].
- The Exact Round Complexity of Secure Computation[ePrint, pdf, video]
- with Sanjam Garg, Omkant Pandey, Antigoni Polychroniadou
- in EUROCRYPT 2016 [proceeding].
- The Chaining Lemma and its application [ePrint, pdf, slides]
- with Ivan Damgård, Sebastian Faust, Daniele Venturi
- in ICITS 2015 [proceeding].
- A Tamper and Leakage Resilient von Neumann Architecture [ePrint, pdf, slides]
- with Sebastian Faust, Jesper Buus Nielsen, Daniele Venturi
- in PKC 2015 [proceeding].
- Non-Adaptive Programmability of Random Oracle [pdf]
- with Rishiraj Bhattacharyya
- in Theoretical Computer Science 2015 [journal].
- Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits [ePrint, pdf, slides]
- with Sebastian Faust, Daniele Venturi, Daniel Wichs.
- in EUROCRYPT 2014 [proceeding]
- extended version in IEEE Transactions on Information Theory 2016 [journal].
- Continuous Non-malleable Codes [ePrint, pdf, slides, video]
- with Sebastian Faust, Jesper Buus Nielsen, Daniele Venturi
- in TCC 2014 [proceeding]
- extended version in Journal of Cryptology 2020 [journal].
- Bounded Tamper Resilience: How to go beyond the Algebraic Barrier [ePrint, pdf, slides]
- with Ivan Damgård, Sebastian Faust, Daniele Venturi
- in ASIACRYPT 2013 [proceeding]
- extended version in Journal of Cryptology 2017 [journal].
Other
- Protecting Cryptographic Memory against Tampering Attack [pdf, slides]
- PhD Thesis, Aarhus University, 2015.
- An Overview of eSTREAM Ciphers [pdf]
- Survey, Centre of Excellence in Cryptology, Indian Statistical Institute, 2012.
- Parallelization of the Wiedemann Large Sparse System Solver over Large Prime Fields [pdf, slides]
- Master’s Thesis supervised by Abhijit Das, IIT Kharagpur, 2011.
