User profiles for Dhinakaran Vinayagamurthy

Dhinakaran Vinayagamurthy

Researcher at IBM Research India
Verified email at in.ibm.com
Cited by 1192

Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits

…, V Vaikuntanathan, D Vinayagamurthy - Advances in Cryptology …, 2014 - Springer
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret
keys: the size of keys in our system depends only on the depth of the policy circuit, not its size…

Iron: functional encryption using Intel SGX

B Fisch, D Vinayagamurthy, D Boneh… - Proceedings of the 2017 …, 2017 - dl.acm.org
Functional encryption (FE) is an extremely powerful cryptographic mechanism that lets an
authorized entity compute on encrypted data, and learn the results in the clear. However, all …

StealthDB: a scalable encrypted database with full SQL query support

D Vinayagamurthy, A Gribov… - Proceedings on Privacy …, 2019 - petsymposium.org
Encrypted database systems provide a great method for protecting sensitive data in
untrusted infrastructures. These systems are built using either specialpurpose cryptographic …

Riding on asymmetry: efficient ABE for branching programs

S Gorbunov, D Vinayagamurthy - … on the Theory and Application of …, 2015 - Springer
In an Attribute-Based Encryption (ABE) scheme the ciphertext encrypting a message $$\mu
$$ , is associated with a public attribute vector $$\mathbf {{x}}$$ and a secret key $$ \mathsf {…

Optimizing ansatz design in qaoa for max-cut

…, D Madan, D Bhoumik, D Vinayagamurthy… - arXiv preprint arXiv …, 2021 - arxiv.org
Quantum Approximate Optimization Algorithm (QAOA) is studied primarily to find approximate
solutions to combinatorial optimization problems. For a graph with $n$ vertices and $m$ …

How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols

…, P Paul, N Singh, D Vinayagamurthy - Proceedings on …, 2022 - petsymposium.org
Traditional zero-knowledge protocols have been studied and optimized for the setting where
a single prover holds the complete witness and tries to convince a verifier about a predicate …

Atomic cross-chain exchanges of shared assets

…, V Ramakrishna, D Vinayagamurthy… - Proceedings of the 4th …, 2022 - dl.acm.org
A core enabler for blockchain or DLT interoperability is the ability to atomically exchange
assets held by mutually untrusting owners on different ledgers. This atomic swap problem has …

ID based signcryption scheme in standard model

SSD Selvi, SS Vivek, D Vinayagamurthy… - Provable Security: 6th …, 2012 - Springer
Designing an ID based signcryption scheme in the standard model is among the most
interesting and important problems in cryptography. However, all the existing systems in the ID …

Stealthdb: a scalable encrypted database with full sql query support

A Gribov, D Vinayagamurthy, S Gorbunov - arXiv preprint arXiv …, 2017 - arxiv.org
Encrypted database systems provide a great method for protecting sensitive data in
untrusted infrastructures. These systems are built using either special-purpose cryptographic …

Privacy-preserving decentralized exchange marketplaces

K Govindarajan, D Vinayagamurthy… - … on Blockchain and …, 2022 - ieeexplore.ieee.org
Decentralized exchange markets leveraging blockchain have been proposed recently to
provide open and equal access to traders, improve transparency and avoid single-point-of-…