Research

By convention, authorship in cryptography is ordered alphabetically by last name. This is the Hardy-Littlewood rule for academic authorship.

Publications    

  1. Non-interactive Anonymous Tokens with Private Metadata bit
    F. Baldimtsi, L. Hanzlik, Q. Nguyen, A. Yadav
    Manuscript    [doi]  [eprint]

  2. Non-interactive (Strong) Blind Signatures from Lattices
    F. Baldimtsi, R. Goyal, A. Yadav
    Manuscript    [doi]  [eprint]

  3. Zero-knowledge Authenticator: Policy-private and Obliviously Updateable
    K.K. Chalkias, D. Maram, A. Roy, J. Wang, A. Yadav
    Manuscript    [doi]  [eprint]

  4. Encrypted RAM Delegation and Applications
    A. Afshar, J. Cheng, R. Goyal, A. Yadav, S. Yadugiri
    Manuscript    [doi]  [eprint]

  5. Non-interactive Blind Signatures: Post-quantum and Stronger Security
    F. Baldimtsi, J. Cheng, R. Goyal, A. Yadav
    ASIACRYPT '24    [doi]  [eprint]

  6. Universal Vector Commitments
    O. Acharya, F. Baldimtsi, S. Dov Gordon, D. McVicker, A. Yadav
    SCN '24    [doi]  [eprint]