Contact Information

32 Vassar Street, G-696
Cambridge MA 02139.
Phone: 617 324 8444

vinodv at csail dot mit dot edu

Projects

Fully Homomorphic Encryption
Leakage-resilient Cryptography
Lattice-based Cryptography
Distributed Algorithms























































































































































































































































































































Vinod Vaikuntanathan
Cryptographer
Steven and Renée Finn Career Development Assistant Professor at EECS, MIT
Sloan Faculty Fellow
Microsoft Research Faculty Fellow

Previous positions:
Curriculum Vitae [pdf]

Big Thank You's: Sloan Foundation, Connaught Foundation, NSERC, DARPA, NSF (CAREER), Microsoft, and Northrop Grumman for their generous support.


News and Links |  Courses |  Program Committees |  Publications  

Courses

Students

Cheng Chen (S.M. ongoing, co-supervised with Shafi Goldwasser)
Sergey Gorbunov (M.Sc. 2012, Ph.D. ongoing)
Prashant Vasudevan (S.M. ongoing)
Dhinakaran Vinayagamurthy (M.Sc. 2013, University of Toronto)

Program Committees

ACM STOC 2014,
CRYPTO 2014,
Innovations in Theoretical Computer Science (ITCS) 2014,
Theory of Cryptography Conference (TCC) 2014,
Asiacrypt 2013,
Public Key Cryptography (PKC) 2013,
CRYPTO 2012,
Eurocrypt 2012,
Theory of Cryptography Conference (TCC) 2012,
CRYPTO 2010,
Theory of Cryptography Conference (TCC) 2010,
Asiacrypt 2010,
Security and Cryptography in Networks (SCN) 2010

Conference and Journal Publications

    Manuscripts

  1. The Trojan Method in Functional Encryption: From Selective to Adaptive Security, Generically
    Prabhanjan Ananth, Zvika Brakerski, Gil Segev and Vinod Vaikuntanathan
    [Cryptology Eprint Archive 2014/917]

  2. Leveled Fully Homomorphic Signatures from Standard Lattices
    Sergey Gorbunov, Vinod Vaikuntanathan and Daniel Wichs
    [Cryptology Eprint Archive 2014/897]

  3. Predicate Encryption for Circuits from Standard Lattices
    Sergey Gorbunov, Vinod Vaikuntanathan and Hoeteck Wee
    Manuscript.

  4. Indistinguishability Obfuscation of Iterated Circuits and RAM Programs
    Ran Canetti, Justin Holmgren, Abhishek Jain and Vinod Vaikuntanathan
    [Cryptology Eprint Archive 2014/769]

  5. Obfuscation of Probabilistic Circuits and Applications
    Ran Canetti, Huijia Lin, Stefano Tessaro and Vinod Vaikuntanathan
    TCC 2015. [Crypto Eprint]

  6. Constrained Key-Homomorphic PRFs from LWE (or) How to Secretly Embed a Circuit in Your PRF
    Zvika Brakerski and Vinod Vaikuntanathan
    TCC 2015.

  7. Aggregate Pseudorandom Functions with Connections to Learning
    Aloni Cohen, Shafi Goldwasser and Vinod Vaikuntanathan
    TCC 2015.

    2014

  8. Fully Key-Homomorphic Encryption, Arithmetic ABE and Compact Garbled Circuits
    D. Boneh, C. Gentry, S. Gorbunov, S. Halevi, V. Nikolaenko, G. Segev, V. Vaikuntanathan and D. Vinayagamurthy
    EUROCRYPT 2014. [pdf]
    A Merge of this and this.

  9. Lattice-based FHE as Secure as PKE
    Z. Brakerski and V. Vaikuntanathan
    ITCS 2014. [Crypto eprint]

    2013

  10. Tight Bounds for Set Disjointness in the Message-Passing Model
    M. Braverman, F. Ellen, T. Pitassi, R. Oshman and V. Vaikuntanathan
    FOCS 2013. [ArXiv]

  11. Functional Encryption: New Perspectives and Lower Bounds
    S. Agrawal, S. Gorbunov, V. Vaikuntanathan and H. Wee
    CRYPTO 2013. [ IACR Eprint Archive]

  12. Overcoming the Worst-case Curse for Cryptographic Constructions
    S. Goldwasser, Y. Kalai, R. Popa, V. Vaikuntanathan and N. Zeldovich
    CRYPTO 2013. [ IACR Eprint Archive]

  13. Attribute-based Encryption for Circuits
    S. Gorbunov, V. Vaikuntanathan and H. Wee
    STOC 2013.
    Invited to the SIAM Journal of Computing Special Issue

  14. Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond
    S. Goldwasser, Y. Kalai, R. Popa, V. Vaikuntanathan and N. Zeldovich
    STOC 2013.
    IACR Eprint Archive
    Invited to the SIAM Journal of Computing Special Issue

  15. On Continual Leakage of Discrete Log Representations
    S. Agrawal, Y. Dodis, V. Vaikuntanathan and D. Wichs
    Asiacrypt 2013.
    IACR Eprint Archive

  16. Private Channel Models in Multiparty Communication Complexity
    F. Ellen, T. Pitassi, R. Oshman and V. Vaikuntanathan
    Brief Announcement: DISC 2013.

    2012

  17. Functional Encryption with Bounded Collusions via Multi-Party Computation
    S. Gorbunov, V. Vaikuntanathan and H. Wee
    CRYPTO 2012.

  18. On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption
    A. Lopez-Alt, E. Tromer and V. Vaikuntanathan
    To appear in STOC 2012

  19. An Inspection-Resistant On-chip Memory Architecture
    Jonathan Valamehr, Melissa Chase, Seny Kamara, Andrew Putnam, Tim Sherwood, Dan Shumow and V. Vaikuntanathan
    To appear in the International Symposium on Computer Architecture ISCA 2012.
    IEEE Micro Top Picks in Computer Architecture 2013.

  20. Efficient Password Authenticated Key Exchange via Oblivious Transfer
    R. Canetti, D. Dachman-Soled, V. Vaikuntanathan and H. Wee
    To appear in Public Key Cryptography (PKC) 2012

  21. Fuzzy Identity-based Encryption from Lattices
    S. Agrawal, X. Boyen, P. Voulgaris, V. Vaikuntanathan and H. Wee
    To appear in Public Key Cryptography (PKC) 2012

  22. Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
    G. Asharov, A. Jain, A. Lopez-Alt, E. Tromer, V. Vaikuntanathan and D. Wichs
    To appear in Eurocrypt 2012
    [ a merge of this and this ]

  23. Collusion-resistant Obfuscation and Functional Re-encryption
    N. Chandran, M. Chase and V. Vaikuntanathan
    To appear in TCC 2012 [ pdf]

  24. How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption
    B. Parno, M. Raykova and V. Vaikuntanathan
    To appear in TCC 2012 [ pdf]

  25. Fully Homomorphic Encryption without Bootstrapping
    Z. Brakerski, C. Gentry and V. Vaikuntanathan
    Innovations in Theoretical Computer Science (ITCS) 2012 [pdf]
    Invited to the Special Issue of the ACM Transactions on Computation Theory.

    2011

  26. Functional Encryption for Inner Product Predicates from Learning with Errors
    S. Agrawal, D. Freeman and V. Vaikuntanathan
    Asiacrypt 2011 [pdf]

  27. Efficient Fully Homomorphic Encryption from (Standard) LWE
    Z. Brakerski and V. Vaikuntanathan
    FOCS 2011 [pdf]
    Invited to the Special Issue of the SIAM Journal of Computing. [ SICOMP Submission ]

  28. Can Homomorphic Encryption be Practical?
    K. Lauter, M. Naehrig and V. Vaikuntanathan [working draft]
    ACM Cloud Computing Security Workshop (CCSW) 2011.

  29. Fully Homomorphic Encryption from Ring LWE and Security for Key Dependent Messages
    Z. Brakerski and V. Vaikuntanathan
    CRYPTO 2011

  30. Round-optimal Password-based Key-exchange
    J. Katz and V. Vaikuntanathan
    TCC 2011
    Invited to the Special Issue of the Journal of Cryptology.

    2010

  31. A Group Signature Scheme from Lattice Assumptions
    S. Dov Gordon and J. Katz and V. Vaikuntanathan
    Asiacrypt 2010.

  32. Cryptography against continual Memory Leakage
    Z. Brakerski, Y. Kalai, J. Katz and V. Vaikuntanathan
    FOCS 2010.
    Cryptology Eprint Archive.

  33. i-hop Homomorphic Encryption Schemes
    C. Gentry, S. Halevi and V. Vaikuntanathan
    Cryptology Eprint Archive.
    CRYPTO 2010.

  34. Fully Homomorphic Encryption from Integers
    M. van Dijk, C. Gentry, S. Halevi and V. Vaikuntanathan
    Cryptology Eprint Archive.
    Eurocrypt 2010.
    Invited to the Special Issue of the Journal of Cryptology.

  35. A Simple BGN-Style Encryption Scheme from LWE
    C. Gentry, S. Halevi and V. Vaikuntanathan
    Eurocrypt 2010.

  36. Protecting against Computationally Bounded and Noisy Leakage
    S. Faust, T. Rabin, L. Reyzin, E. Tromer and V. Vaikuntanathan
    Eurocrypt 2010.

  37. Robustness of the Learning with Errors Assumption
    S. Goldwasser, Y. Kalai, C. Peikert and V. Vaikuntanathan
    Innovations in Computer Science (ICS) 2010. [pdf]

  38. Public-key Encryption Schemes with Auxiliary Inputs
    Y. Dodis, S. Goldwasser, Y. Kalai, C. Peikert and V. Vaikuntanathan
    Theory of Cryptography Conference (TCC) 2010. [pdf]

    2009

  39. Signature Schemes with Bounded Leakage Resilience
    J. Katz and V. Vaikuntanathan
    Asiacrypt 2009. [pdf]

  40. Smooth Projective Hashing and Password-based Authenticated Key-exchange from Lattices
    J. Katz and V. Vaikuntanathan
    Asiacrypt 2009. [pdf]

  41. Cryptography against Memory Attacks
    A. Akavia, S. Goldwasser and V. Vaikuntanathan
    TCC 2009. [pdf]

  42. Weak Verifiable Random Functions
    Z. Brakerski, S. Goldwasser, G. Rothblum and V. Vaikuntanathan
    TCC 2009. [pdf]

  43. How Efficient Can Memory-Checking Be?
    C. Dwork, M. Naor, G. Rothblum and V. Vaikuntanathan
    TCC 2009. [pdf]

    2008

  44. Trapdoors for Hard Lattices, and New Cryptographic Constructions
    C. Gentry, C. Peikert and V. Vaikuntanathan
    STOC 2008 [pdf]

  45. A Framework for Efficient and Composable Oblivious Transfer
    C. Peikert, V. Vaikuntanathan and B. Waters
    CRYPTO 2008 [pdf]

  46. Non-Interactive Statistical Zero-knowledge for Lattice Problems
    C. Peikert and V. Vaikuntanathan
    CRYPTO 2008 [pdf]

  47. Adaptive One-way Functions and Applications
    O. Pandey, R. Pass and V. Vaikuntanathan
    CRYPTO 2008 [pdf]

    2007

  48. Securely Obfuscating Re-encryption
    Susan Hohenberger, Guy Rothblum, abhi shelat, and Vinod Vaikuntanathan
    Theory of Cryptography Conference TCC 2007
    Journal of Cryptology (by Invitation)
    [Full Version ps, pdf]

  49. Secure Computation from Random Error-Correcting Codes
    R. Cramer, H. Chen, S. Goldwasser, R. de Haan and V. Vaikuntanathan
    Eurocrypt 2007 [ps, pdf]

  50. Bounded CCA2-Secure Encryption
    R. Cramer, G. Hanaoka, D. Hofheinz, H. Imai, E. Kiltz, R. Pass, A. Shelat and V. Vaikuntanathan
    Asiacrypt 2007 [ps, pdf]

  51. Relations Among Notions of Non-Malleability for Encryption
    R. Pass, A. Shelat and V. Vaikuntanathan
    Asiacrypt 2007 [ps, pdf]

  52. 2006

  53. Construction of a Non-Malleable Encryption Scheme From Any Semantically Secure One
    R. Pass, A. Shelat and V. Vaikuntanathan
    Crypto 2006 [ps, pdf]

  54. Fault-tolerant Distributed Computing in Full-Information Networks
    S. Goldwasser, E. Pavlov and V. Vaikuntanathan
    FOCS 2006 [ps, pdf]

  55. Byzantine Agreement in the Full-Information Model in O(log n) Rounds
    M. Ben-Or, E. Pavlov and V. Vaikuntanathan
    STOC 2006 [ps, pdf]

    2005

  56. Distributed Computing With Imperfect Randomness
    S. Goldwasser, M. Sudan and V. Vaikuntanathan
    DISC 2005 [ps, pdf]

  57. Broadcast in Radio Networks in the Presence of Byzantine Faults
    V. Vaikuntanathan
    Brief Announcement : PODC 2005 [Full Version ps, pdf]

    2004

  58. Information Leak in the Chord Lookup Protocol
    C.W. O'Donnell and V. Vaikuntanathan
    P2P 2004 [ps, pdf]

    2003

  59. Distributed Consensus in the Presence of Sectional Faults
    A. Aiyer, I. Sanketh, K. Srinathan, V. Vaikuntanathan and C. Pandu Rangan
    PODC 2003 [ps, pdf]

  60. Efficient Perfectly Secure Communication over Synchronous Networks
    K. Srinathan, V. Vaikuntanathan and C. Pandu Rangan
    PODC 2003 [ps, pdf]

  61. On the Power of Computational Secret Sharing
    A. Narayanan, K. Srinathan, V. Vaikuntanathan and C. Pandu Rangan
    Indocrypt 2003 [ps, pdf]

Position Papers

  1. Trustworthy from Silicon Up
    Melissa Chase, Seny Kamara, Andrew Putnam, Tim Sherwood, Dan Shumow and Vinod Vaikuntanathan
    To appear in New Directions in Computer Architecture 2011.

  2. Policy Hiding for Private Handling of Sensitive Encrypted Data
    Nishanth Chandran, Melissa Chase, Kristin Lauter and Vinod Vaikuntanathan