Akshayaram Srinivasan
University of California, Berkeley
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Akshayaram Srinivasan.
theory and application of cryptographic techniques | 2017
Sanjam Garg; Omkant Pandey; Akshayaram Srinivasan; Mark Zhandry
Indistinguishability obfuscation (\(i\mathcal {O}\)) has emerged as a surprisingly powerful notion. Almost all known cryptographic primitives can be constructed from general purpose \(i\mathcal {O}\) and other minimalistic assumptions such as one-way functions. A major challenge in this direction of research is to develop novel techniques for using \(i\mathcal {O}\) since \(i\mathcal {O}\) by itself offers virtually no protection for secret information in the underlying programs. When dealing with complex situations, often these techniques have to consider an exponential number of hybrids (usually one per input) in the security proof. This results in a sub-exponential loss in the security reduction. Unfortunately, this scenario is becoming more and more common and appears to be a fundamental barrier to many current techniques.
international cryptology conference | 2016
Sanjam Garg; Omkant Pandey; Akshayaram Srinivasan
The exact hardness of computing a Nash equilibrium is a fundamental open question in algorithmic game theory. This problem is complete for the complexity class PPAD. It is well known that problems in PPAD cannot be
theory of cryptography conference | 2016
Sanjam Garg; Akshayaram Srinivasan
theory and application of cryptographic techniques | 2018
Sanjam Garg; Akshayaram Srinivasan
\mathrm {NP}
foundations of computer science | 2017
Sanjam Garg; Akshayaram Srinivasan
international workshop on security | 2015
Akshayaram Srinivasan; C. Pandu Rangan
-complete unless
theory and application of cryptographic techniques | 2018
Sanjam Garg; Akshayaram Srinivasan
international cryptology conference | 2018
Sanjam Garg; Peihan Miao; Akshayaram Srinivasan
\mathrm {NP}=\mathrm {coNP}
international cryptology conference | 2018
Sanjam Garg; Rafail Ostrovsky; Akshayaram Srinivasan
applied cryptography and network security | 2017
Akshayaram Srinivasan; Chandrasekaran Pandu Rangan
. Therefore, a natural direction is to reduce the hardness of PPAD to the hardness of problems used in cryptography. Bitansky, Paneth, and Rosen [FOCS 2015] prove the hardness of PPAD assuming the existence of quasi-polynomially hard indistinguishability obfuscation and sub-exponentially hard one-way functions. This leaves open the possibility of basing PPAD hardness on simpler, polynomially hard, computational assumptions. We make further progress in this direction and reduce PPAD hardness directly to polynomially hard assumptions. Our first result proves hardness of PPAD assuming the existence of polynomially hard indistinguishability obfuscation