Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Akshay Degwekar is active.

Publication


Featured researches published by Akshay Degwekar.


theory and application of cryptographic techniques | 2018

Multi-Collision Resistant Hash Functions and Their Applications

Itay Berman; Akshay Degwekar; Ron D. Rothblum; Prashant Nalini Vasudevan

Collision resistant hash functions are functions that shrink their input, but for which it is computationally infeasible to find a collision, namely two strings that hash to the same value (although collisions are abundant).


international cryptology conference | 2017

Structure vs. Hardness Through the Obfuscation Lens

Nir Bitansky; Akshay Degwekar; Vinod Vaikuntanathan

Much of modern cryptography, starting from public-key encryption and going beyond, is based on the hardness of structured (mostly algebraic) problems like factoring, discrete log or finding short lattice vectors. While structure is perhaps what enables advanced applications, it also puts the hardness of these problems in question. In particular, this structure often puts them in low complexity classes such as \({\textsf {NP}} \cap {\textsf {coNP}}\) or statistical zero-knowledge (SZK).


international cryptology conference | 2016

Fine-Grained Cryptography

Akshay Degwekar; Vinod Vaikuntanathan; Prashant Nalini Vasudevan

Fine-grained cryptographic primitives are ones that are secure against adversaries with an a-priori bounded polynomial amount of resources time, space or parallel-time, where the honest algorithms use less resources than the adversaries they are designed to fool. Such primitives were previously studied in the context of time-bounded adversaries Merkle, CACM 1978, space-bounded adversaries Cachin and Maurer, CRYPTO 1997 and parallel-time-bounded adversaries Hastad, IPL 1987. Our goal is come up with fine-grained primitives in the setting of parallel-time-bounded adversaries and to show unconditional security of these constructions when possible, or base security on widely believed separation of worst-case complexity classes. We show:1.


international cryptology conference | 2018

On the Local Leakage Resilience of Linear Secret Sharing Schemes

Fabrice Benhamouda; Akshay Degwekar; Yuval Ishai; Tal Rabin


international cryptology conference | 2018

From Laconic Zero-Knowledge to Public-Key Cryptography

Itay Berman; Akshay Degwekar; Ron D. Rothblum; Prashant Nalini Vasudevan

{\textsf {NC}^{1}}


IACR Cryptology ePrint Archive | 2018

From Laconic Zero-Knowledge to Public-Key Cryptography.

Itay Berman; Akshay Degwekar; Ron D. Rothblum; Prashant Nalini Vasudevan


Electronic Colloquium on Computational Complexity | 2017

Multi Collision Resistant Hash Functions and their Applications.

Itay Berman; Akshay Degwekar; Ron D. Rothblum; Prashant Nalini Vasudevan

-cryptography: Under the assumption that [InlineEquation not available: see fulltext.], we construct one-way functions, pseudo-random generators with sub-linear stretch, collision-resistant hash functions and most importantly, public-key encryption schemes, all computable in


IACR Cryptology ePrint Archive | 2016

Structure vs Hardness through the Obfuscation Lens.

Nir Bitansky; Akshay Degwekar; Vinod Vaikuntanathan

Collaboration


Dive into the Akshay Degwekar's collaboration.

Top Co-Authors

Avatar

Prashant Nalini Vasudevan

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Itay Berman

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Ron D. Rothblum

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Vinod Vaikuntanathan

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Nir Bitansky

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Yuval Ishai

Technion – Israel Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge