Publications can be found on Google-Scholar or DBLP but the list below is most up-to-date.
2023
- White-box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation [Eprint]
Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven Watson
To appear in Constructive Side-Channel Analysis and Secure Design (COSADE 2023)
2022
- ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model
Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal
In Progress in Cryptology – INDOCRYPT 2022 [Proceedings][Eprint] - Secure Plot Transfer for the Chia Blockchain [Eprint]
Shashank Agrawal - CoRA: Collaborative Risk-Aware Authentication [Eprint]
Mastooreh Salajegheh, Shashank Agrawal, Maliheh Shirvanian, Mihai Christodorescu, Payman Mohassel
2021
- 2D-2FA: A New Dimension in Two-Factor Authentication
Maliheh Shirvanian, Shashank Agrawal
In Annual Computer Security Applications Conference (ACSAC 2021) [Proceedings][arXiv] - BETA: Biometric Enabled Threshold Authentication
Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, and Sikhar Patranabis
In Public Key Cryptography (PKC 2021) [Proceedings][Eprint]
2020
- KVaC: Key-Value Commitments for Blockchains and Beyond
Shashank Agrawal, Srinivasan Raghuraman
In Advances in Cryptology – Asiacrypt 2020 [Proceedings][Eprint] - Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching
Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, and Peter Rindal
In ACM Conference on Computer & Communications Security (CCS 2020) [Proceedings] [Eprint] - Zether: Towards Privacy in a Smart Contract World
Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, and Dan Boneh
In Financial Cryptography and Data Security (FC 2020) [Proceedings] [Eprint]
★ Also presented at Privacy ENhancing Cryptography In Ledgers Workshop (PENCIL) and ZKProof Workshop (ZKP 2019) [Video (Benedikt)]
★ Covered widely: Blockonomi, Newconomy, Cointelegraph, Coindesk
★ Implemented in the Consensys Quorum blockchain
2018
- Impossibility of Simulation Secure Functional Encryption Even with Random Oracles
Shashank Agrawal, Venkata Koppula, and Brent Waters
In Theory of Cryptography (TCC 2018) [Proceedings][Eprint] - PASTA: PASsword-based Threshold Authentication
Shashank Agrawal, Peihan Miao, Payman Mohassel, and Pratyay Mukherjee
In ACM Conference on Computer & Communications Security (CCS 2018) [Proceedings][Video (Peihan)][Eprint] - DiSE: Distributed Symmetric-key Encryption
Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, and Peter Rindal
In ACM Conference on Computer & Communications Security (CCS 2018) [Proceedings][Video (Peter)][Eprint]
★ Selected to NIST Threshold Cryptography Workshop (NTCW 2019) [Video]
★ Selected to Real World Crypto (RWC 2020) [Video (Gaven)]
★ Available as open-source software under Apache 2.0 here - Non-Interactive Zero-Knowledge Proofs for Composite Statements
Shashank Agrawal, Chaya Ganesh, and Payman Mohassel
In Advances in Cryptology – CRYPTO 2018 [Proceedings][Video (Chaya)][Eprint]
2017
- FAME: Fast Attribute-based Message Encryption
Shashank Agrawal and Melissa Chase
In ACM Conference on Computer & Communications Security (CCS 2017) [Proceedings][Presentation][Eprint]
★ FAME’s CP-ABE scheme, along with several others, are available under the MIT license here
★ Recommended by European Telecommunications Standards Institute for secure access control - Simplifying Design and Analysis of Complex Predicate Encryption Schemes
Shashank Agrawal and Melissa Chase
In Advances in Cryptology – EUROCRYPT 2017 [Proceedings][Video][Eprint] - Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
Shashank Agrawal and David J. Wu
In Advances in Cryptology – EUROCRYPT 2017 [Proceedings][Video (David)][Eprint]
2016
- Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
Shashank Agrawal, Manoj Prabhakaran, and Ching-Hua Yu
In Theory of Cryptography (TCC 2016-B) [Proceedings][Eprint] - A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
Shashank Agrawal and Melissa Chase
In Theory of Cryptography (TCC 2016-A) [Proceedings][PPT][Video][Eprint] - Optimal Computational Split-state Non-malleable Codes
Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, and Manoj Prabhakaran
In Theory of Cryptography (TCC 2016-A) [Proceedings][PPT][Video][Eprint]
2015
- Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations
Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, and Manoj Prabhakaran
In Advances in Cryptology – CRYPTO 2015 [Proceedings][Video][Eprint]
Subsumes an earlier version posted on Eprint and ECCC. - Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
Shashank Agrawal, Shweta Agrawal, and Manoj Prabhakaran
In Advances in Cryptology – EUROCRYPT 2015 [Proceedings][Eprint] - On the Practical Security of Inner Product Functional Encryption
Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, and Amit Sahai
In Public Key Cryptography (PKC 2015) [Proceedings][PPT][Eprint]
The eprint version has several results not mentioned in the proceedings version. - A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations
Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, and Manoj Prabhakaran
In Theory of Cryptography (TCC 2015) [Proceedings][PPT][Eprint]
2014
- Controlled Functional Encryption
Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, and Carl A. Gunter
In ACM Conference on Computer & Communications Security (CCS 2014) [Proceedings][Code] - Lower Bounds in the Hardware Token Model
Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, and Alon Rosen
In Theory of Cryptography (TCC 2014) [Proceedings][Video][Eprint]
2013
- On Fair Exchange, Fair Coins and Fair Sampling
Shashank Agrawal and Manoj Prabhakaran
In Advances in Cryptology – CRYPTO 2013 [Proceedings][PPT][Video][Eprint]
2012
- Verifiable secret sharing in a total of three rounds
Shashank Agrawal
In Information Processing Letters 2012 [Proceedings] - Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission
Abhinav Mehta, Shashank Agrawal, and Kannan Srinathan
In Distributed Computing and Networking (ICDCN 2012) [Proceedings][Journal]
★ Invited to a special issue of Theoretical Computer Science journal
2011
- Secure Message Transmission in Asynchronous Directed Graphs
Shashank Agrawal, Abhinav Mehta, and Kannan Srinathan
In Progress in Cryptology – INDOCRYPT 2011 [Proceedings] - Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks
Manan Nayak, Shashank Agrawal, and Kannan Srinathan
In Information Theoretic Security (ICITS 2011) [Proceedings][Eprint]
2010
- Brief Announcement: Synchronous Las Vegas URMT Iff Asynchronous Monte Carlo URMT
Abhinav Mehta, Shashank Agrawal, and Kannan Srinathan
In Distributed Computing (DISC 2010) [Proceedings]
Subsumed by the ICDCN 2012 paper above