User profiles for Dhinakaran Vinayagamurthy
![]() | Dhinakaran VinayagamurthyResearcher at IBM Research India Verified email at in.ibm.com Cited by 1192 |
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
…, V Vaikuntanathan, D Vinayagamurthy - Advances in Cryptology …, 2014 - Springer
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret
keys: the size of keys in our system depends only on the depth of the policy circuit, not its size…
keys: the size of keys in our system depends only on the depth of the policy circuit, not its size…
Iron: functional encryption using Intel SGX
B Fisch, D Vinayagamurthy, D Boneh… - Proceedings of the 2017 …, 2017 - dl.acm.org
Functional encryption (FE) is an extremely powerful cryptographic mechanism that lets an
authorized entity compute on encrypted data, and learn the results in the clear. However, all …
authorized entity compute on encrypted data, and learn the results in the clear. However, all …
StealthDB: a scalable encrypted database with full SQL query support
D Vinayagamurthy, A Gribov… - Proceedings on Privacy …, 2019 - petsymposium.org
Encrypted database systems provide a great method for protecting sensitive data in
untrusted infrastructures. These systems are built using either specialpurpose cryptographic …
untrusted infrastructures. These systems are built using either specialpurpose cryptographic …
Riding on asymmetry: efficient ABE for branching programs
S Gorbunov, D Vinayagamurthy - … on the Theory and Application of …, 2015 - Springer
In an Attribute-Based Encryption (ABE) scheme the ciphertext encrypting a message $$\mu
$$ , is associated with a public attribute vector $$\mathbf {{x}}$$ and a secret key $$ \mathsf {…
$$ , is associated with a public attribute vector $$\mathbf {{x}}$$ and a secret key $$ \mathsf {…
Optimizing ansatz design in qaoa for max-cut
Quantum Approximate Optimization Algorithm (QAOA) is studied primarily to find approximate
solutions to combinatorial optimization problems. For a graph with $n$ vertices and $m$ …
solutions to combinatorial optimization problems. For a graph with $n$ vertices and $m$ …
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols
Traditional zero-knowledge protocols have been studied and optimized for the setting where
a single prover holds the complete witness and tries to convince a verifier about a predicate …
a single prover holds the complete witness and tries to convince a verifier about a predicate …
Atomic cross-chain exchanges of shared assets
…, V Ramakrishna, D Vinayagamurthy… - Proceedings of the 4th …, 2022 - dl.acm.org
A core enabler for blockchain or DLT interoperability is the ability to atomically exchange
assets held by mutually untrusting owners on different ledgers. This atomic swap problem has …
assets held by mutually untrusting owners on different ledgers. This atomic swap problem has …
ID based signcryption scheme in standard model
Designing an ID based signcryption scheme in the standard model is among the most
interesting and important problems in cryptography. However, all the existing systems in the ID …
interesting and important problems in cryptography. However, all the existing systems in the ID …
Stealthdb: a scalable encrypted database with full sql query support
A Gribov, D Vinayagamurthy, S Gorbunov - arXiv preprint arXiv …, 2017 - arxiv.org
Encrypted database systems provide a great method for protecting sensitive data in
untrusted infrastructures. These systems are built using either special-purpose cryptographic …
untrusted infrastructures. These systems are built using either special-purpose cryptographic …
Privacy-preserving decentralized exchange marketplaces
K Govindarajan, D Vinayagamurthy… - … on Blockchain and …, 2022 - ieeexplore.ieee.org
Decentralized exchange markets leveraging blockchain have been proposed recently to
provide open and equal access to traders, improve transparency and avoid single-point-of-…
provide open and equal access to traders, improve transparency and avoid single-point-of-…