default search action
Rishab Goyal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Foteini Baldimtsi, Jiaqi Cheng, Rishab Goyal, Aayush Yadav:
Non-Interactive Blind Signatures: Post-Quantum and Stronger Security. ASIACRYPT (2) 2024: 70-104 - [c28]Kaartik Bhushan, Rishab Goyal, Venkata Koppula, Varun Narayanan, Manoj Prabhakaran, Mahesh Sreekumar Rajasree:
Leakage-Resilient Incompressible Cryptography: Constructions and Barriers. ASIACRYPT (7) 2024: 201-234 - [c27]Rachit Garg, Rishab Goyal, George Lu:
Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption. Public Key Cryptography (4) 2024: 69-104 - [c26]Rishab Goyal, Saikumar Yadugiri:
Multi-authority Functional Encryption with Bounded Collusions from Standard Assumptions. TCC (3) 2024: 3-30 - [i32]Foteini Baldimtsi, Jiaqi Cheng, Rishab Goyal, Aayush Yadav:
Non-interactive Blind Signatures from Lattices. IACR Cryptol. ePrint Arch. 2024: 614 (2024) - [i31]Rishab Goyal:
Mutable Batch Arguments and Applications. IACR Cryptol. ePrint Arch. 2024: 737 (2024) - [i30]Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree, Aman Verma:
Incompressible Functional Encryption. IACR Cryptol. ePrint Arch. 2024: 798 (2024) - [i29]Abtin Afshar, Jiaqi Cheng, Rishab Goyal:
Leveled Fully-Homomorphic Signatures from Batch Arguments. IACR Cryptol. ePrint Arch. 2024: 931 (2024) - [i28]Rachit Garg, Rishab Goyal, George Lu:
Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2024: 1238 (2024) - [i27]Jiaqi Cheng, Rishab Goyal:
Boosting SNARKs and Rate-1 Barrier in Arguments of Knowledge. IACR Cryptol. ePrint Arch. 2024: 1603 (2024) - [i26]Abtin Afshar, Jiaqi Cheng, Rishab Goyal, Aayush Yadav, Saikumar Yadugiri:
Encrypted RAM Delegation: Applications to Rate-1 Extractable Arguments, Homomorphic NIZKs, MPC, and more. IACR Cryptol. ePrint Arch. 2024: 1806 (2024) - 2023
- [j2]Ritu Singh, Rishab Goyal:
Physically Unclonable Function Using Schmitt Triggers. WiPiEC Journal 9(1) (2023) - 2022
- [c25]Rishab Goyal, Vinod Vaikuntanathan:
Locally Verifiable Signature and Key Aggregation. CRYPTO (2) 2022: 761-791 - [c24]Rachit Garg, Rishab Goyal, George Lu, Brent Waters:
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption. EUROCRYPT (2) 2022: 736-763 - [c23]Lalita Devadas, Rishab Goyal, Yael Kalai, Vinod Vaikuntanathan:
Rate-1 Non-Interactive Arguments for Batch-NP and Applications. FOCS 2022: 1057-1068 - [c22]Shweta Agrawal, Rishab Goyal, Junichi Tomida:
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality. TCC (1) 2022: 711-740 - [i25]Rishab Goyal, Vinod Vaikuntanathan:
Locally Verifiable Signature and Key Aggregation. IACR Cryptol. ePrint Arch. 2022: 179 (2022) - [i24]Rachit Garg, Rishab Goyal, George Lu:
A Simple and Generic Approach to Dynamic Collusion Model. IACR Cryptol. ePrint Arch. 2022: 330 (2022) - [i23]Shweta Agrawal, Rishab Goyal, Junichi Tomida:
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality. IACR Cryptol. ePrint Arch. 2022: 1168 (2022) - [i22]Lalita Devadas, Rishab Goyal, Yael Kalai, Vinod Vaikuntanathan:
Rate-1 Non-Interactive Arguments for Batch-NP and Applications. IACR Cryptol. ePrint Arch. 2022: 1236 (2022) - 2021
- [c21]Rishab Goyal, Sam Kim, Brent Waters, David J. Wu:
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions. ASIACRYPT (3) 2021: 250-280 - [c20]Rishab Goyal, Jiahui Liu, Brent Waters:
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups. ASIACRYPT (4) 2021: 311-341 - [c19]Rishab Goyal, Ridwan Syed, Brent Waters:
Bounded Collusion ABE for TMs from IBE. ASIACRYPT (4) 2021: 371-402 - [c18]Shweta Agrawal, Rishab Goyal, Junichi Tomida:
Multi-input Quadratic Functional Encryption from Pairings. CRYPTO (4) 2021: 208-238 - [c17]Shweta Agrawal, Rishab Goyal, Junichi Tomida:
Multi-Party Functional Encryption. TCC (2) 2021: 224-255 - [i21]Rishab Goyal, Jiahui Liu, Brent Waters:
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups. IACR Cryptol. ePrint Arch. 2021: 343 (2021) - [i20]Rishab Goyal, Ridwan Syed, Brent Waters:
Bounded Collusion ABE for TMs from IBE. IACR Cryptol. ePrint Arch. 2021: 709 (2021) - [i19]Rachit Garg, Rishab Goyal, George Lu, Brent Waters:
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2021: 847 (2021) - 2020
- [j1]Rishab Goyal, Venkata Koppula, Brent Waters:
Collusion Resistant Traitor Tracing from Learning with Errors. SIAM J. Comput. 49(5) (2020) - [c16]Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:
New Constructions of Hinting PRGs, OWFs with Encryption, and More. CRYPTO (1) 2020: 527-558 - [c15]Rishab Goyal, Satyanarayana Vusirikala:
Verifiable Registration-Based Encryption. CRYPTO (1) 2020: 621-651 - [c14]Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters:
On Perfect Correctness in (Lockable) Obfuscation. TCC (1) 2020: 229-259 - [i18]Rishab Goyal, Sam Kim, Brent Waters, David J. Wu:
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2020: 316 (2020) - [i17]Shweta Agrawal, Rishab Goyal, Fabrice Mouhartem:
Multi-Party Functional Encryption. IACR Cryptol. ePrint Arch. 2020: 1266 (2020)
2010 – 2019
- 2019
- [c13]Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu:
Watermarking Public-Key Cryptographic Primitives. CRYPTO (3) 2019: 367-398 - [c12]Rishab Goyal, Willy Quach, Brent Waters, Daniel Wichs:
Broadcast and Trace with N^ε Ciphertext Size from Standard Assumptions. CRYPTO (3) 2019: 826-855 - [c11]Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:
Collusion Resistant Broadcast and Trace from Positional Witness Encryption. Public Key Cryptography (2) 2019: 3-33 - [c10]Rishab Goyal, Venkata Koppula, Brent Waters:
New Approaches to Traitor Tracing with Embedded Identities. TCC (2) 2019: 149-179 - [i16]Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:
Collusion Resistant Broadcast and Trace from Positional Witness Encryption. IACR Cryptol. ePrint Arch. 2019: 31 (2019) - [i15]Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, David J. Wu:
Watermarking Public-Key Cryptographic Primitives. IACR Cryptol. ePrint Arch. 2019: 628 (2019) - [i14]Rishab Goyal, Willy Quach, Brent Waters, Daniel Wichs:
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions. IACR Cryptol. ePrint Arch. 2019: 636 (2019) - [i13]Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:
New Constructions of Hinting PRGs, OWFs with Encryption, and more. IACR Cryptol. ePrint Arch. 2019: 962 (2019) - [i12]Rishab Goyal, Venkata Koppula, Brent Waters:
New Approaches to Traitor Tracing with Embedded Identities. IACR Cryptol. ePrint Arch. 2019: 980 (2019) - [i11]Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters:
On Perfect Correctness in (Lockable) Obfuscation. IACR Cryptol. ePrint Arch. 2019: 1010 (2019) - [i10]Rishab Goyal, Satyanarayana Vusirikala:
Verifiable Registration-Based Encryption. IACR Cryptol. ePrint Arch. 2019: 1044 (2019) - 2018
- [c9]Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters:
Risky Traitor Tracing and New Differential Privacy Negative Results. CRYPTO (1) 2018: 467-497 - [c8]Rishab Goyal, Venkata Koppula, Brent Waters:
Collusion resistant traitor tracing from learning with errors. STOC 2018: 660-670 - [i9]Rishab Goyal, Venkata Koppula, Brent Waters:
Collusion Resistant Traitor Tracing from Learning with Errors. IACR Cryptol. ePrint Arch. 2018: 346 (2018) - [i8]Rishab Goyal:
Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits. IACR Cryptol. ePrint Arch. 2018: 443 (2018) - 2017
- [c7]Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran, Brent Waters:
Signature Schemes with Randomized Verification. ACNS 2017: 373-389 - [c6]Rishab Goyal, Venkata Koppula, Brent Waters:
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption. EUROCRYPT (2) 2017: 528-557 - [c5]Rishab Goyal, Venkata Koppula, Brent Waters:
Lockable Obfuscation. FOCS 2017: 612-621 - [c4]Rishab Goyal, Venkata Koppula, Brent Waters:
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. Public Key Cryptography (1) 2017: 232-246 - [c3]Rishab Goyal, Vipul Goyal:
Overcoming Cryptographic Impossibility Results Using Blockchains. TCC (1) 2017: 529-561 - [c2]Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters:
A Generic Approach to Constructing and Proving Verifiable Random Functions. TCC (2) 2017: 537-566 - [i7]Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters:
A Generic Approach to Constructing and Proving Verifiable Random Functions. IACR Cryptol. ePrint Arch. 2017: 21 (2017) - [i6]Rishab Goyal, Venkata Koppula, Brent Waters:
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption. IACR Cryptol. ePrint Arch. 2017: 120 (2017) - [i5]Rishab Goyal, Venkata Koppula, Brent Waters:
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. IACR Cryptol. ePrint Arch. 2017: 123 (2017) - [i4]Rishab Goyal, Venkata Koppula, Brent Waters:
Lockable Obfuscation. IACR Cryptol. ePrint Arch. 2017: 274 (2017) - [i3]Rishab Goyal, Vipul Goyal:
Overcoming Cryptographic Impossibility Results using Blockchains. IACR Cryptol. ePrint Arch. 2017: 935 (2017) - [i2]Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters:
Risky Traitor Tracing and New Differential Privacy Negative Results. IACR Cryptol. ePrint Arch. 2017: 1117 (2017) - 2016
- [c1]Rishab Goyal, Venkata Koppula, Brent Waters:
Semi-adaptive Security and Bundling Functionalities Made Generic and Easy. TCC (B2) 2016: 361-388 - [i1]Rishab Goyal, Venkata Koppula, Brent Waters:
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy. IACR Cryptol. ePrint Arch. 2016: 317 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint