Abhishek Jain

Assistant Professor
Department of Computer Science & Information Security Institute

Email: abhishek at cs dot jhu dot edu

Research Interests: Cryptography, Security and more broadly, Theoretical Computer Science.

I completed my Ph.D. in 2012 at UCLA where I was advised by Amit Sahai and Rafail Ostrovsky. After that, I was a postdoctoral researcher at MIT CSAIL and BU working with Shafi Goldwasser and Ran Canetti.

Advising

  • Postdoctoral Researcher: Nils Fleischhacker (joint with Vipul Goyal)
  • Ph.D. Students: Arka Rai Choudhuri, Aarushi Goel

Teaching

  • Fall 2017: Modern Cryptography (CS 601.642/442)
  • Spring 2017: Advanced Cryptography (CS 600.642)
  • Fall 2016: Modern Cryptography (CS 600.442)

Manuscripts

  • Indistinguishability Obfuscation from Functional Encryption for Simple Functions
    with Prabhanjan Ananth, Amit Sahai
    [pdf]

Publications

  • Non-Interactive Multiparty Computation without Correlated Randomness
    with Shai Halevi, Yuval Ishai, Ilan Komargodski, Amit Sahai, Eylon Yogev

    ASIACRYPT 2017

  • Fairness in an Unfair World: Fair Multiparty Computation from Public Bulletin Boards
    with Arka Rai Choudhuri, Matthew Green, Gabriel Kaptchuk, Ian Miers

    ACM CCS 2017

  • A New Approach to Round-Optimal Secure Multiparty Computation
    with Prabhanjan Ananth, Arka Rai Choudhuri

    CRYPTO 2017 [pdf]

  • Distinguisher Dependent Simulation in Two Rounds and its Applications
    with Yael Tauman Kalai, Dakshita Khuarana, Ron Rothblum

    CRYPTO 2017 [pdf]

  • Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization
    with Prabhanjan Ananth, Amit Sahai

    CRYPTO 2017 [pdf]

  • Cryptography with Updates
    with Prabhanjan Ananth, Aloni Cohen

    EUROCRYPT 2017 [pdf]

  • Patchable Indistinguishability Obfuscation: iO for Evolving Software
    with Prabhanjan Ananth, Amit Sahai

    EUROCRYPT 2017 [pdf]

  • Secure Multiparty Computation with General Interaction Patterns
    with Shai Halevi, Yuval Ishai, Eyal Kushilevitz, Tal Rabin

    ITCS 2016 [pdf]

  • Time-Lock Puzzles from Randomized Encodings
    with Nir Bitansky, Shafi Goldwasser, Omer Paneth, Vinod Vaikuntanathan, Brent Waters

    ITCS 2016 [pdf]

  • Multi-Input Functional Encryption for Unbounded Arity Functions
    with Saikrishna Badrinarayanan, Divya Gupta, Amit Sahai

    ASIACRYPT 2015 [pdf]

  • Function-Hiding Inner Product Encryption
    with Allison Bishop, Lucas Kowalczyk

    ASIACRYPT 2015 [pdf]

  • Indistinguishability Obfuscation from Compact Functional Encryption
    with Prabhanjan Ananth

    CRYPTO 2015 [pdf]

  • Concurrent Secure Computation with Optimal Query Complexity
    with Ran Canetti, Vipul Goyal

    CRYPTO 2015 [pdf]

  • Succinct Garbling and Indistinguishability Obfuscation for RAM Programs
    with Ran Canetti, Justin Holmgren, Vinod Vaikuntanathan

    STOC 2015 [pdf]
    Invited to special issue of Siam Journal on Computing

  • Functional Encryption for Randomized Functionalities
    with Vipul Goyal, Venkata Koppula, Amit Sahai

    TCC 2015 [pdf]

  • Interactive Coding for Multiparty Protocols
    with Yael Tauman Kalai, Allison Lewko

    ITCS 2015 [pdf]

  • Practical UC Security with a Global Random Oracle
    with Ran Canetti, Alessandra Scafuro

    ACM CCS 2014 [pdf]

  • Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity
    with Ran Canetti, Omer Paneth

    CRYPTO 2014 [pdf]

  • Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships
    with Omkant Pandey

    SCN 2014 [pdf]

  • Multi-Input Functional Encryption
    with Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou

    EUROCRYPT 2014
    (Merge of [GGJS] and [GKLSZ])

  • Constant Round Concurrent Zero Knowledge in the Bounded Player Model
    with Vipul Goyal, Rafail Ostrovsky, Silas Richelson, Ivan Visconti

    ASIACRYPT 2013 [pdf]

  • On the Achievability of Simulation-Based Security for Functional Encryption
    with Angelo De Caro, Vincenzo Iovino, Adam O'Neill, Omer Paneth, Giuseppe Persiano

    CRYPTO 2013 [pdf]

  • What Information is Leaked Under Concurrent Composition?
    with Vipul Goyal, Divya Gupta

    CRYPTO 2013 [pdf]
    Invited to Journal of Cryptology

  • Secure Computation Against Adaptive Auxiliary Information
    with Elette Boyle, Sanjam Garg, Yael Kalai, Amit Sahai

    CRYPTO 2013 [pdf]

  • On Concurrently Secure Computation in the Multiple Ideal Query Model
    with Vipul Goyal

    EUROCRYPT 2013 [pdf]

  • Why "Fiat-Shamir for Proofs" Lacks a Proof
    with Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Yael Kalai, Adriana López-Alt, Daniel Wichs

    TCC 2013
    (Merge of [BGW] and [DJKL])

  • Concurrent Zero Knowledge in the Bounded Player Model
    with Vipul Goyal, Rafail Ostrovsky, Silas Richelson, Ivan Visconti

    TCC 2013 [pdf]

  • Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise
    with Stephan Krenn, Krzysztof Pietrzak, Aris Tentes

    ASIACRYPT 2012 [pdf]

  • New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation
    with Shweta Agrawal, Vipul Goyal, Manoj Prabhakaran, Amit Sahai

    CRYPTO 2012 [pdf]

  • Multiparty Computation Secure Against Continual Memory Leakage
    with Elette Boyle, Shafi Goldwasser, Yael Tauman Kalai

    STOC 2012 [pdf]

  • Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
    with Gilad Asharov, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan, Daniel Wichs

    EUROCRYPT 2012[pdf]
    (Merge of [AJW] and [LTV])

  • Concurrently Secure Computation in Constant Rounds
    with Sanjam Garg, Vipul Goyal, Amit Sahai

    EUROCRYPT 2012 [pdf]

  • Hardness Preserving Constructions of Pseudorandom Functions
    with Krzysztof Pietrzak, Aris Tentes

    TCC 2012 [pdf]

  • Counterexamples to Hardness Amplification Beyond Negligible
    with Yevgeniy Dodis, Tal Moran, Daniel Wichs

    TCC 2012 [pdf]

  • Leakage-Resilient Zero Knowledge
    with Sanjam Garg, Amit Sahai

    CRYPTO 2011 [pdf]

  • Efficient Authentication from Hard Learning Problems
    with Eike Kiltz, Krzysztof Pietrzak, David Cash, Daniele Venturi

    EUROCRYPT 2011 [pdf]
    Best paper award

  • Parallel Repetition for Leakage Resilience Amplification, Revisited
    with Krzysztof Pietrzak

    TCC 2011 [pdf]

  • Bringing People of Different Beliefs Together to do UC
    with Sanjam Garg, Vipul Goyal, Amit Sahai

    TCC 2011 [pdf]

  • Password-Authenticated Session-Key Generation on the Internet in the Plain Model
    with Vipul Goyal, Rafail Ostrovsky

    CRYPTO 2010 [pdf]

  • On the Round Complexity of Covert Computation
    with Vipul Goyal

    STOC 2010 [pdf]

  • Bounded Ciphertext Policy Attribute Based Encryption
    with Vipul Goyal, Omkant Pandey, Amit Sahai

    ICALP 2008 [pdf]

  • Packet Dropping Adversary Identification for Data Plane Security
    with Xin Zhang, Adrian Perrig

    CoNEXT 2008

Book Chapter

  • The IPS Compiler
    with Amit Sahai

    Secure Multi-party Computation, IOS Press, Cryptology and Information Security Series, 2013
    [Link]

Program Committees

Contact

315 Malone Hall,
3400 N. Charles St.,
Johns Hopkins University
Phone: 410-516-4276