Akshay Degwekar
Massachusetts Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Akshay Degwekar.
theory and application of cryptographic techniques | 2018
Itay Berman; Akshay Degwekar; Ron D. Rothblum; Prashant Nalini Vasudevan
Collision resistant hash functions are functions that shrink their input, but for which it is computationally infeasible to find a collision, namely two strings that hash to the same value (although collisions are abundant).
international cryptology conference | 2017
Nir Bitansky; Akshay Degwekar; Vinod Vaikuntanathan
Much of modern cryptography, starting from public-key encryption and going beyond, is based on the hardness of structured (mostly algebraic) problems like factoring, discrete log or finding short lattice vectors. While structure is perhaps what enables advanced applications, it also puts the hardness of these problems in question. In particular, this structure often puts them in low complexity classes such as \({\textsf {NP}} \cap {\textsf {coNP}}\) or statistical zero-knowledge (SZK).
international cryptology conference | 2016
Akshay Degwekar; Vinod Vaikuntanathan; Prashant Nalini Vasudevan
Fine-grained cryptographic primitives are ones that are secure against adversaries with an a-priori bounded polynomial amount of resources time, space or parallel-time, where the honest algorithms use less resources than the adversaries they are designed to fool. Such primitives were previously studied in the context of time-bounded adversaries Merkle, CACM 1978, space-bounded adversaries Cachin and Maurer, CRYPTO 1997 and parallel-time-bounded adversaries Hastad, IPL 1987. Our goal is come up with fine-grained primitives in the setting of parallel-time-bounded adversaries and to show unconditional security of these constructions when possible, or base security on widely believed separation of worst-case complexity classes. We show:1.
international cryptology conference | 2018
Fabrice Benhamouda; Akshay Degwekar; Yuval Ishai; Tal Rabin
international cryptology conference | 2018
Itay Berman; Akshay Degwekar; Ron D. Rothblum; Prashant Nalini Vasudevan
{\textsf {NC}^{1}}
IACR Cryptology ePrint Archive | 2018
Itay Berman; Akshay Degwekar; Ron D. Rothblum; Prashant Nalini Vasudevan
Electronic Colloquium on Computational Complexity | 2017
Itay Berman; Akshay Degwekar; Ron D. Rothblum; Prashant Nalini Vasudevan
-cryptography: Under the assumption that [InlineEquation not available: see fulltext.], we construct one-way functions, pseudo-random generators with sub-linear stretch, collision-resistant hash functions and most importantly, public-key encryption schemes, all computable in
IACR Cryptology ePrint Archive | 2016
Nir Bitansky; Akshay Degwekar; Vinod Vaikuntanathan