Follow
Riddhi Ghosal
Riddhi Ghosal
Verified email at cs.ucla.edu - Homepage
Title
Cited by
Cited by
Year
Hiding in plain sight: memory-tight proofs via randomness programming
A Ghoshal, R Ghosal, J Jaeger, S Tessaro
Annual International Conference on the Theory and Applications of …, 2022
52022
Approximate distance-comparison-preserving symmetric encryption
G Fuchsbauer, R Ghosal, N Hauke, A O’Neill
International Conference on Security and Cryptography for Networks, 117-144, 2022
22022
Hard Languages in NP∩ coNP and NIZK Proofs from Unstructured Hardness
R Ghosal, Y Ishai, A Korb, E Kushilevitz, P Lou, A Sahai
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 1243-1256, 2023
12023
Non-interactive publicly-verifiable delegation of committed programs
R Ghosal, A Sahai, B Waters
IACR International Conference on Public-Key Cryptography, 575-605, 2023
12023
Privacy Preserving Multi-server k-means Computation over Horizontally Partitioned Data
R Ghosal, S Chatterjee
Information Systems Security: 14th International Conference, ICISS 2018 …, 2018
12018
Efficient Methods for Trusted Remote Program Execution
R Ghosal, A Sahai, B Waters
US Patent App. 18/484,436, 2024
2024
Building Hard Problems by Combining Easy Ones
R Ghosal, A Sahai
2023 IEEE International Symposium on Information Theory (ISIT), 1770-1775, 2023
2023
Hard Languages in and NIZK Proofs from Unstructured Hardness
R Ghosal, Y Ishai, A Korb, E Kushilevitz, P Lou, A Sahai
Cryptology ePrint Archive, 2023
2023
Efficient NIZKs from LWE via Polynomial Reconstruction and “MPC in the Head”
R Ghosal, P Lou, A Sahai
International Conference on the Theory and Application of Cryptology and …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–9