Author of the publication

SNARGs for bounded depth computations and PPAD hardness from sub-exponential LWE.

, , , and . STOC, page 708-721. ACM, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC., , , , and . ITC, volume 230 of LIPIcs, page 10:1-10:21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Weakening Assumptions for Publicly-Verifiable Deletion., , , , and . TCC (4), volume 14372 of Lecture Notes in Computer Science, page 183-197. Springer, (2023)Weak Zero-Knowledge via the Goldreich-Levin Theorem., , and . ASIACRYPT (2), volume 14439 of Lecture Notes in Computer Science, page 142-173. Springer, (2023)Black-Box Non-interactive Non-malleable Commitments., , , and . EUROCRYPT (3), volume 12698 of Lecture Notes in Computer Science, page 159-185. Springer, (2021)Compact Ring Signatures from Learning with Errors., , , , , , , and . CRYPTO (1), volume 12825 of Lecture Notes in Computer Science, page 282-312. Springer, (2021)Software with Certified Deletion., , , , , and . EUROCRYPT (4), volume 14654 of Lecture Notes in Computer Science, page 85-111. Springer, (2024)On The Round Complexity of Two-Party Quantum Computation., , , and . IACR Cryptol. ePrint Arch., (2020)A New Framework for Quantum Oblivious Transfer., , , and . EUROCRYPT (1), volume 14004 of Lecture Notes in Computer Science, page 363-394. Springer, (2023)SNARGs for P from Sub-exponential DDH and QR., , , and . EUROCRYPT (2), volume 13276 of Lecture Notes in Computer Science, page 520-549. Springer, (2022)Publicly-Verifiable Deletion via Target-Collapsing Functions., , and . CRYPTO (5), volume 14085 of Lecture Notes in Computer Science, page 99-128. Springer, (2023)