Research

Manuscripts    

  1. Non-interactive Blind Signatures with Threshold Issuance
    F. Baldimtsi, L. Hanzlik, A. Yadav

  2. Weighted Batched Threshold Encryption with Applications to Mempool Privacy
    A. Agarwal, K. Babel, S. Das, B.P. Gilkalaye, A. Mondal, B. Pinkas, P. Rindal, A. Yadav
    [eprint]

  3. Atlantis: Lattice-based Anonymous Tokens with a Private Metadata Bit
    F. Baldimtsi, A. Yadav

  4. Batched & Non-interactive Blind Signatures from Lattices
    F. Baldimtsi, R. Goyal, A. Yadav
    [eprint]

  5. Encrypted RAM Delegation and Applications
    A. Afshar, J. Cheng, R. Goyal, A. Yadav, S. Yadugiri
    [eprint]

  6. Non-interactive Anonymous Tokens with Private Metadata bit
    F. Baldimtsi, L. Hanzlik, Q. Nguyen, A. Yadav
    [eprint]  [code]

Publications

  1. Zero-knowledge Authenticator for Blockchain: Policy-private and Obliviously Updateable
    K.K. Chalkias, D. Maram, A. Roy, J. Wang, A. Yadav
    AFT '25    [doi]  [eprint]

  2. Non-interactive Blind Signatures: Post-quantum and Stronger Security
    F. Baldimtsi, J. Cheng, R. Goyal, A. Yadav
    ASIACRYPT '24    [doi]  [eprint]

  3. Universal Vector Commitments
    O. Acharya, F. Baldimtsi, S. Dov Gordon, D. McVicker, A. Yadav
    SCN '24    [doi]  [eprint]



By convention, authorship in cryptography is ordered alphabetically by last name. This is the Hardy-Littlewood rule for academic authorship.