Conference Talek: Private Group Messaging with Hidden Access Patterns 2020 • Proceedings - Annual Computer Security Applications Conference, ACSAC • 84-99 Cheng R, Scott W, Masserova E, Zhang I, Goyal V, Anderson T, Krishnamurthy A, Parno B
Chapter The round complexity of secure computation against covert adversaries 2020 • Lecture Notes in Computer Science • 12238 LNCS:600-620 Choudhuri AR, Goyal V, Jain A
Conference Communication-Efficient Unconditional MPC with Guaranteed Output Delivery 2019 • Lecture Notes in Computer Science • 11693:85-114 Goyal V, Liu Y, Song Y
Conference Correlated-Source Extractors and Cryptography with Correlated-Random Tapes 2019 • Lecture Notes in Computer Science • 11476:562-592 Goyal V, Song Y
Conference Founding Secure Computation on Blockchains 2019 • Lecture Notes in Computer Science • 11477:351-380 Choudhuri AR, Goyal V, Jain A
Chapter Interactive Non-malleable Codes 2019 • Lecture Notes in Computer Science • 11892:233-263 Fleischhacker N, Goyal V, Jain A, Paskin-Cherniavsky A, Radune S
Conference Laconic Conditional Disclosure of Secrets and Applications 2019 • Annual Symposium on Foundations of Computer Science • 661-685 Doettling N, Garg S, Goyal V, Malavolta G
Conference Non-Malleable Commitments using Goldreich-Levin List Decoding 2019 • Annual Symposium on Foundations of Computer Science • 686-699 Goyal V, Richelson S
Chapter Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge 2019 • Lecture Notes in Computer Science • 11693:608-637 Goyal V, Jain A, Sahai A
Chapter Non-malleable Secret Sharing for General Access Structures 2018 • Lecture Notes in Computer Science • 10991:501-530 Goyal V, Kumar A
Conference On the Existence of Three Round Zero-Knowledge Proofs 2018 • Lecture Notes in Computer Science • 10822:3-33 Fleischhacker N, Goyal V, Jain A
Chapter Promise Zero Knowledge and Its Applications to Round Optimal MPC 2018 • Lecture Notes in Computer Science • 10992:459-487 Badrinarayanan S, Goyal V, Jain A, Kalai YT, Khurana D, Sahai A
Conference HOP: Hardware makes Obfuscation Practical 2017 Nayak K, Fletcher CW, Ren L, Chandran N, Lokam S, Shi E, Goyal V
Chapter Overcoming Cryptographic Impossibility Results Using Blockchains 2017 • Lecture Notes in Computer Science • 10677:529-561 Goyal R, Goyal V
Chapter Round Optimal Concurrent MPC via Strong Simulation 2017 • Lecture Notes in Computer Science • 10677:743-775 Badrinarayanan S, Goyal V, Jain A, Khurana D, Sahai A
Conference Breaking the Three Round Barrier for Non-Malleable Commitments 2016 21-30 Goyal V, Khurana D, Sahai A
Chapter Multi-input Functional Encryption with Unbounded-Message Security 2016 • Lecture Notes in Computer Science • 10032:531-556 Goyal V, Jain A, O’Neill A
Conference Non-malleable extractors and codes, with their many tampered extensions 2016 285-298 Chattopadhyay E, Goyal V, Li X
Chapter Verifiable Functional Encryption 2016 • Lecture Notes in Computer Science • 10032:557-587 Badrinarayanan S, Goyal V, Jain A, Sahai A
Chapter Concurrent Secure Computation via Non-Black Box Simulation 2015 • Lecture Notes in Computer Science • 9216:23-42 Goyal V, Gupta D, Sahai A
Chapter Concurrent Secure Computation with Optimal Query Complexity 2015 • Lecture Notes in Computer Science • 9216:43-62 Canetti R, Goyal V, Jain A
Conference Fast Non-Malleable Commitments 2015 1048-1057 Brenner H, Goyal V, Richelson S, Rosen A, Vald M
Chapter Functional Encryption for Randomized Functionalities 2015 • Lecture Notes in Computer Science • 9015:325-351 Goyal V, Jain A, Koppula V, Sahai A