• Home
  • Group
  • Research Overview
  • Midwest Crypto Day
  • Publications
   

Overview of research

Quantum Cryptography | Cryptographic Proofs | Non-Malleable Cryptography | Round-Efficient MPC | Information-Theoretic Cryptography | Obfuscation
Picture
Assumptions in Quantum Cryptography.
       My research studies the foundations of cryptography in the presence of quantum information. Classical cryptography relies on computational hardness assumptions—most notably the existence of one-way functions, which underpin primitives such as digital signatures, commitments, symmetric encryption, and pseudorandom generators. These primitives form the core of minicrypt, while more advanced tasks like key exchange and secure multi-party computation require stronger and more structured assumptions.
      My work shows how this landscape changes fundamentally when cryptographic participants can prepare and transmit quantum states. Quantum information exhibits properties with no classical analogue—most notably, that measurement irreversibly destroys information. These properties allow cryptographic protocols to rely on weaker or qualitatively different assumptions than are possible classically. I aim to develop a theory of  cryptographic complexity in the quantum world. In  particular, so far we know that:
  • cryptographic commitments can be based on quantum relaxations of one-way functions (Commitments from Quantum One-wayness, STOC & QIP 2024),
  • such relaxations can arise from problems related to #P-hardness (Founding Quantum Cryptography on Quantum Advantage or, Towards Cryptography from #P-Hardness, STOC & QIP 2025), and
  • ​commitments imply the feasibility of general secure computation (One-way Functions imply Secure Computation in a Quantum World, CRYPTO & QIP 2021 Long Plenary Talk) in quantum settings.
      Together, these results suggest new ways to build cryptography leveraging quantum advantage as a resource, rather than treating quantum attacks solely as a threat. For an accessible overview, see this related Quanta magazine article. 

More recently, we also
  • Obtain a quantum black-box separation between one-way functions (+ indistinguishability obfuscation) and collision-resistance (On the Cryptographic Futility of Non-Collapsing Measurements, EUROCRYPT 2026)
  • Study the role of assumptions in settings where a classical "verifier" interacts with a quantum "prover" (On the Power of Oblivious State Preparation, CRYPTO 2025)
  • Enable classical verification of quantum witness states while keeping them intact. (How to Classically Verify a Quantum Cat without Killing It)

Understanding Secure Computation.
      
Secure computation allows mutually distrustful parties to jointly compute a function while revealing nothing beyond the output. We study quantum secure computation, focusing on tradeoffs between interaction, round complexity, and computational assumptions, including novel tasks such as zero-knowledge teleportation and quantum oblivious transfer.
  1. ​Secure Computation with Shared EPR Pairs (Or: How to Teleport in Zero-Knowledge)
    with James Bartusek and Akshayaram Srinivasan. (CRYPTO 2023, QCRYPT 2023)​
  2. A New Framework for Quantum Oblivious Transfer
    with Amit Agarwal, James Bartusek and Nishant Kumar. (EUROCRYPT 2023)
  3. On the Round Complexity of Secure Quantum Computation
    with James Bartusek, Andrea Coladangelo and Fermi Ma. (CRYPTO 2021, QIP 2021, QCRYPT 2021)
  4. Post-Quantum Multi-Party Computation
    with Amit Agarwal, James Bartusek, Vipul Goyal and Giulio Malavolta. (EUROCRYPT 2021)

Uniquely Quantum Capabilities.
       Can a server that obtains a computational encoding of a secret later prove that they deleted the underlying secret, and will not be able to recover it even given unbounded resources or leaked keys? This is classically impossible, but we show how the inherently ``destructive'' nature of quantum information can enable such deletion. While prior work studied deletion in settings where encodings themselves would information-theoretically hide underlying secrets, the following sequence of works enable computationally inaccessible but statistically accessible information to be provably, statistically removed. 
  1. Cryptography with Certified Deletion
    with James Bartusek. (CRYPTO 2023, QIP 2023)
  2. Publicly-Verifiable Deletion via Target-Collapsing Functions
    with James Bartusek and Alexander Poremba. (CRYPTO 2023, QCRYPT 2023)
  3. Obfuscation and Outsourced Computation with Certified Deletion
    with James Bartusek, Sanjam Garg, Vipul Goyal, Giulio Malavolta, Justin Raizes and Bhaskar Roberts (Preprint, Preliminary version at QIP 2023)
  4. Weakening Assumptions for Publicly-Verifiable Deletion
    with James Bartusek, Giulio Malavolta, Alexander Poremba and Michael Walter. (TCC 2023)​
  5. Unclonable Non-interactive Zero-Knowledge
    with Ruta Jawale (ASIACRYPT 2024)

 
Picture
Zero-Knowledge and Succinct Proof Systems
       Many cryptographic settings demand security against malicious attacks, where an adversary may deviate from protocol and behave in arbitrary ways. Cryptographic proofs form the bedrock of security against such attacks, and have facilitated a multitude of powerful capabilities. The following works aim to push the limits of what is achievable in this area: Can we hide secrets in non-interactive proofs, without relying on external sources of trust? Can we efficiently verify the results of inefficient computation? 
       Despite being startlingly simple to state and tremendously useful, these problems continue to be poorly understood. This is in large part due to limitations in current methods to reason about security, which have been formalized into ``black-box'' barriers. These barriers rule out proof techniques that only access an adversary as a black-box, remaining oblivious to its code. But an adversary's code could be arbitrarily obfuscated or scrambled, and in these settings, it is completely unclear how to use this code in a meaningful way. I like to explore new proof techniques that overcome some of these barriers.​
  1. On Weak NIZKs, One-way functions and Amplification
    with Suvradip Chakraborty and James Hulett (CRYPTO 2025) 
  2. On Black-Box Verifiable Outsourcing
    with Amit Agarwal, Navid Alamati, Srinivasan Raghuraman and Peter Rindal. (TCC 2023)
  3. Weak Zero-Knowledge via the Goldreich-Levin Theorem
    with Giulio Malavolta and Kabir Tomer. (ASIACRYPT 2023)​
  4. SNARGs for P from Sub-exponential DDH and QR
    with James Hulett, Ruta Jawale and Akshayaram Srinivasan. (EUROCRYPT 2022)
  5. SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE
    with Ruta Jawale, Yael Kalai and Rachel Zhang. (STOC 2021)
    Merge of [JK20] and [KZ20].
  6. Non-Interactive Distributional Indistinguishability and Non-Malleable Commitments
    Dakshita Khurana. (EUROCRYPT 2021)
  7. Compact Ring Signatures from Learning with Errors
    with Rohit Chatterjee, Sanjam Garg, Mohammad Hajiabadi, Xiao Liang, Giulio Malavolta, Omkant Pandey and Sina Shiehian. (CRYPTO 2021) 
  8. Statistical ZAP Arguments
    with Saikrishna Badrinarayanan, Rex Fernando, Aayush Jain and Amit Sahai. (EUROCRYPT 2020)
  9. Weak Zero-Knowledge Beyond the Black-Box Barrier
    with Nir Bitansky and Omer Paneth. (STOC 2019, 
    Invited to the SICOMP Special Issue for STOC 2019)
  10. Non-interactive Delegation for Low Space Non-Deterministic Computation
    with Saikrishna Badrinarayanan, Yael Kalai, Amit Sahai and Daniel Wichs. (STOC 2018)
  11. Statistical WI (and More) in Two Messages
    with Yael Kalai and Amit Sahai. (EUROCRYPT 2018)
  12. Promise Zero Knowledge and Applications to Round Optimal MPC
    with Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Kalai and Amit Sahai. (CRYPTO 2018)
  13. Round Optimal Black-Box ``Commit-and-Prove''
    with Rafail Ostrovsky and Akshayaram Srinivasan. (TCC 2018)
  14. Distinguisher-Dependent Simulation in 2 Rounds and Applications
    with Abhishek Jain, Yael Kalai and Ron Rothblum. (CRYPTO 2017)

 
Non-Malleable Cryptography
 
  ​  Non-malleable cryptography prevents an adversary from correlating its inputs with those of other honest participants. These have applications to secure auctions, distributed computation, and to systems that remain secure when many sessions are executed concurrently on the internet. My works have demonstrated the possibility of non-malleability without back-and-forth interaction by overcoming strong impossibility results, resolving one of the principal open problems in the area. Some of my followup works have continued to obtain simpler protocols that require no interaction and rely on well-studied assumptions.​
  1. On Non-Uniform Security for Black-Box Non-interactive CCA Commitments
    with Rachit Garg, George Lu and Brent Waters (EUROCRYPT 2023)
  2. COA-Secure Obfuscation and Applications
    with Ran Canetti, Suvradip Chakraborty, Nishant Kumar, Oxana Poburinnaya and Manoj Prabhakaran. (EUROCRYPT 2022)
  3. Black-box Non-Interactive Non-Malleable Commitments
    with Rachit Garg, George Lu and Brent Waters. (EUROCRYPT 2021)​
  4. Non-Interactive Distributional Indistinguishability and Non-Malleable Commitments
    Dakshita Khurana. (EUROCRYPT 2021)
  5. Improved Computational Extractors and their Applications
    with Akshayaram Srinivasan. (CRYPTO 2021)
  6. On the CCA Compatibility of Public-Key Infrastructure
    with Brent Waters. (PKC 2021)
  7. Computational Extractors with Negligible Error in the CRS Model
    with Ankit Garg and Yael Kalai. (EUROCRYPT 2020)
  8. Non-interactive non-malleability from Quantum Supremacy
    with Yael Kalai. (CRYPTO 2019)
  9. How to Achieve Non-Malleability in One or Two Rounds
    with Amit Sahai. (FOCS 2017, Invited to the SICOMP Special Issue for FOCS 2017)
  10. Round Optimal Concurrent Non-Malleability from Polynomial Hardness
    Dakshita Khurana. (TCC 2017)
  11. Breaking the 3 Round Barrier for Non-Malleable Commitments
    with Vipul Goyal and Amit Sahai. (FOCS 2016)
    ​
Round Efficient (Classical) Multi-party Computation
  1. Round Optimal Black-Box MPC in the Plain Model 
    with Yuval Ishai, Amit Sahai and Akshayaram Srinivasan. (CRYPTO 2023)
  2. Round Optimal Black-Box Protocol Compilers
    with Yuval Ishai, Amit Sahai and Akshayaram Srinivasan. (EUROCRYPT 2022)​
  3. Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT
    with Yuval Ishai, Amit Sahai and Akshayaram Srinivasan. (TCC 2022)
  4. Two-Round Maliciously Secure Computation with Super-Polynomial Simulation
    with Amit Agarwal, James Bartusek, Vipul Goyal and Giulio Malavolta. (TCC 2021)
  5. On the Round Complexity of Black-Box Secure MPC
    with Yuval Ishai, Akshayaram Srinivasan and Amit Sahai. (CRYPTO 2021)
  6. Post-Quantum Multi-Party Computation
    with Amit Agarwal, James Bartusek, Vipul Goyal and Giulio Malavolta. (EUROCRYPT 2021) 
  7. On Statistical Security in Two Party Computation
    with Muhammad Haris Mughees. (TCC 2020)
  8. Promise Zero Knowledge and Applications to Round Optimal MPC
    with Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Kalai and Amit Sahai. (CRYPTO 2018)
  9. Round Optimal Concurrent MPC via Strong Simulation
    with Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain and Amit Sahai.  (TCC 2017)
    merged version of [BKS17] and [GJ17]​
Questions in Information-Theoretic Cryptography.​
  1. Revisiting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC
    ​with Saikrishna Badrinarayanan, Yuval Ishai, Amit Sahai and Daniel Wichs. (ITC 2022)
  2. New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs
    with Saikrishna Badrinarayanan, Rafail Ostrovsky and Ivan Visconti. (EUROCRYPT 2017)
  3. All Complete Functionalities are Reversible
    with Daniel Kraschewski, Hemanta Maji, Manoj Prabhakaran and Amit Sahai. (EUROCRYPT 2016)
  4. Secure Computation from Elastic Noisy Channels
    with Hemanta Maji and Amit Sahai. (EUROCRYPT 2016)
  5. Do Distributed Differentially-Private Protocols Require Oblivious Transfer?
    with Vipul Goyal, Ilya Mironov, Omkant Pandey and Amit Sahai. (ICALP 2016 - Track A)
  6. Statistical Randomized Encodings: A Complexity Theoretic View
    with Shweta Agarwal, Yuval Ishai and Anat Paskin-Cherniavsky. (ICALP 2015 - Track A) 
  7. Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures
    with Aayush Jain and Vipul Goyal. (Cryptology ePrint Archive 2015)
  8. Black-Box Separations for Differentially Private Protocols
    with Hemanta Maji and Amit Sahai. (ASIACRYPT 2014)​
Applications of Program Obfuscation.
  1. Non-Interactive Distributional Indistinguishability and Non-Malleable Commitments
    Dakshita Khurana. (EUROCRYPT 2021)
  2. Upgrading to Functional Encryption
    with Saikrishna Badrinarayanan, Amit Sahai and Brent Waters. (TCC 2018) 
  3. How to Generate and Use Universal Samplers
    with Dennis Hofheinz, Tibor Jager, Amit Sahai, Brent Waters and Mark Zhandry. (ASIACRYPT 2016)
    merged version of [HJZ14] and [KSW14]
  4. Multi-Party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
    with Vanishree Rao and Amit Sahai. (ASIACRYPT 2015)
  • Home
  • Group
  • Research Overview
  • Midwest Crypto Day
  • Publications