Search Results - "Ananth, Prabhanjan"
-
1
Complexity of Gröbner basis detection and border basis detection
Published in Theoretical computer science (09-11-2012)“…Gröbner basis detection (GBD) is defined as follows: given a set of polynomials, decide whether there exists–and if “yes” find–a term order such that the set…”
Get full text
Journal Article -
2
A Modular Approach to Unclonable Cryptography
Published 20-11-2023“…We explore a new pathway to designing unclonable cryptographic primitives. We propose a new notion called unclonable puncturable obfuscation (UPO) and study…”
Get full text
Journal Article -
3
A Note on Copy-Protection from Random Oracles
Published 26-08-2022“…Quantum copy-protection, introduced by Aaronson (CCC'09), uses the no-cloning principle of quantum mechanics to protect software from being illegally…”
Get full text
Journal Article -
4
Revocable Encryption, Programs, and More: The Case of Multi-Copy Security
Published 16-10-2024“…Fundamental principles of quantum mechanics have inspired many new research directions, particularly in quantum cryptography. One such principle is quantum…”
Get full text
Journal Article -
5
Cryptography in the Common Haar State Model: Feasibility Results and Separations
Published 30-06-2024“…Common random string model is a popular model in classical cryptography. We study a quantum analogue of this model called the common Haar state (CHS) model. In…”
Get full text
Journal Article -
6
Post-Quantum Zero-Knowledge with Space-Bounded Simulation
Published 12-10-2022“…The traditional definition of quantum zero-knowledge stipulates that the knowledge gained by any quantum polynomial-time verifier in an interactive protocol…”
Get full text
Journal Article -
7
Unclonable Encryption, Revisited
Published 27-03-2021“…Unclonable encryption, introduced by Broadbent and Lord (TQC'20), is an encryption scheme with the following attractive feature: given a ciphertext, an…”
Get full text
Journal Article -
8
Simultaneous Haar Indistinguishability with Applications to Unclonable Cryptography
Published 16-05-2024“…Unclonable cryptography is concerned with leveraging the no-cloning principle to build cryptographic primitives that are otherwise impossible to achieve…”
Get full text
Journal Article -
9
A Note on the Common Haar State Model
Published 08-04-2024“…Common random string model is a popular model in classical cryptography with many constructions proposed in this model. We study a quantum analogue of this…”
Get full text
Journal Article -
10
Indistinguishability Obfuscation from Low Degree Multilinear Maps
Published 2017“…Program Obfuscation is the art of making computer programs "unintelligible" while preserving its functionality. There have been many attempts to formalize this…”
Get full text
Dissertation -
11
Pseudorandom Strings from Pseudorandom Quantum States
Published 08-06-2023“…We study the relationship between notions of pseudorandomness in the quantum and classical worlds. Pseudorandom quantum state generator (PRSG), a…”
Get full text
Journal Article -
12
Ideal Pseudorandom Codes
Published 08-11-2024“…Pseudorandom codes are error-correcting codes with the property that no efficient adversary can distinguish encodings from uniformly random strings. They were…”
Get full text
Journal Article -
13
Revocable Cryptography from Learning with Errors
Published 28-02-2023“…Quantum cryptography leverages many unique features of quantum information in order to construct cryptographic primitives that are oftentimes impossible…”
Get full text
Journal Article -
14
Pseudorandomness in the (Inverseless) Haar Random Oracle Model
Published 25-10-2024“…We study the (in)feasibility of quantum pseudorandom notions in a quantum analog of the random oracle model, where all the parties, including the adversary,…”
Get full text
Journal Article -
15
Cloning Games: A General Framework for Unclonable Primitives
Published 03-02-2023“…The powerful no-cloning principle of quantum mechanics can be leveraged to achieve interesting primitives, referred to as unclonable primitives, that are…”
Get full text
Journal Article -
16
On the (Im)plausibility of Public-Key Quantum Money from Collision-Resistant Hash Functions
Published 22-01-2023“…Public-key quantum money is a cryptographic proposal for using highly entangled quantum states as currency that is publicly verifiable yet resistant to…”
Get full text
Journal Article -
17
Unclonable Secret Sharing
Published 16-06-2024“…Unclonable cryptography utilizes the principles of quantum mechanics to addresses cryptographic tasks that are impossible classically. We introduce a novel…”
Get full text
Journal Article -
18
Pseudorandom Isometries
Published 06-11-2023“…We introduce a new notion called ${\cal Q}$-secure pseudorandom isometries (PRI). A pseudorandom isometry is an efficient quantum circuit that maps an…”
Get full text
Journal Article -
19
Cryptography from Pseudorandom Quantum States
Published 18-12-2021“…Pseudorandom states, introduced by Ji, Liu and Song (Crypto'18), are efficiently-computable quantum states that are computationally indistinguishable from…”
Get full text
Journal Article -
20
Provable Robust Watermarking for AI-Generated Text
Published 30-06-2023“…We study the problem of watermarking large language models (LLMs) generated text -- one of the most promising approaches for addressing the safety challenges…”
Get full text
Journal Article