I am a PhD student in the Department of Computer Science at University of California, Los Angeles. I work in Cryptography and related topics in Privacy, Security and Theoretical Computer Science. I am fortunate to be advised by Prof. Amit Sahai and Prof. Rafail Ostrovsky.

I am supported by the 2017-18 Dissertation Year Fellowship. I also received the 2016-17 CISCO Outstanding Graduate Student Research Award. I spent the the summers of 2016 and 2017 as a research intern with Yael Tauman Kalai at Microsoft Research New England, and the summer of 2014 as a research intern with Vipul Goyal at Microsoft Research India.

Prior to this, I obtained a Bachelor's in Technology from the Indian Institute of Technology, Delhi in 2012. I received a Master's Degree in Computer Science from UCLA in 2014.

Here, you can find my CV, and a brief overview of my research. My email id is dakshita@cs.ucla.edu.

My picture

Publications:

- Non-interactive Delegation for Low Space Non-Deterministic Computation
  NEW! In Symposium on the Theory of Computing, STOC 2018
  Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai and Daniel Wichs
- Statistical WI (and More) in Two Messages
  NEW! In Advances in Cryptology, EUROCRYPT 2018
  Yael Tauman Kalai, Dakshita Khurana and Amit Sahai
- How to Achieve Non-Malleability in One or Two Rounds
  In Foundations of Computer Science, FOCS 2017,
  Invited to SIAM Journal of Computing (SICOMP) Special Issue for selected papers from FOCS
  Dakshita Khurana and Amit Sahai
- Promise Zero Knowledge and its Applications to Round Optimal MPC
  Cryptology ePrint Archive, November 2017,
  Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana and Amit Sahai
- Distinguisher-Dependent Simulation in Two Rounds and its Applications
  In Advances in Cryptology, CRYPTO 2017
  Abhishek Jain, Yael Kalai, Dakshita Khurana and Ron Rothblum
- New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs
  In Advances in Cryptology, EUROCRYPT 2017
  Saikrishna Badrinarayanan, Dakshita Khurana and Rafail Ostrovsky and Ivan Visconti
- Round Optimal Concurrent Non-Malleability from Polynomial Hardness
  In Theory of Cryptography Conference, TCC 2017
  Dakshita Khurana
- Round Optimal Concurrent MPC via Strong Simulation
  In Theory of Cryptography Conference, TCC 2017
  Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana and Amit Sahai
  2016
- Breaking the Three Round Barrier for Non-Malleable Commitments
  In Foundations of Computer Science, FOCS 2016
  Vipul Goyal, Dakshita Khurana and Amit Sahai
- All Complete Functionalities are Reversible
  In Advances in Cryptology, EUROCRYPT 2016
  Dakshita Khurana, Daniel Kraschewski, Hemanta K Maji, Manoj Prabhakaran and Amit Sahai
- Secure Computation from Elastic Noisy Channels
  In Advances in Cryptology, EUROCRYPT 2016
  Dakshita Khurana, Hemanta K Maji and Amit Sahai
- How to Generate and Use Universal Samplers
  In Advances in Cryptology, ASIACRYPT 2016
  Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters and Mark Zhandry
- Do Distributed Differentially-Private Protocols Require Oblivious Transfer?
  In International Colloquium on Automata, Languages and Programming, ICALP 2016 (Track A)
  Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey and Amit Sahai
  2015
- Multi-Party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
  In Advances in Cryptology, ASIACRYPT 2015
  Dakshita Khurana, Vanishree Rao and Amit Sahai
- Statistical Randomized Encodings: A Complexity Theoretic View
  In International Colloquium on Automata, Languages and Programming, ICALP 2015 (Track A)
  Shweta Agrawal, Yuval Ishai, Dakshita Khurana and Anat Paskin-Cherniavsky
- Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures
  Cryptology ePrint Archive 2015
  Vipul Goyal, Aayush Jain and Dakshita Khurana
  2014
- Black-Box Separations for Differentially Private Protocols
  In Advances in Cryptology, ASIACRYPT 2014
  Dakshita Khurana, Hemanta K Maji and Amit Sahai
  Undergraduate Research
- A Grammar-Based GUI for Single View Reconstruction
  ICVGIP 2012
  Dakshita Khurana, Surabhi Sankhla, Abhinav Shukla, Richa Varshney, Prem Kalra, Subhashis Banerjee
- Ensuring Tight Computational Security Against Higher-Order DPA Attacks
  PST 2011
  Dakshita Khurana and Aditya Gaurav

Research Overview:

Within cryptography, I have worked primarily on secure protocol design. Some of my work [KS17, GKS16] has constructed protocols achieving security against man-in-the-middle attacks with minimal back-and-forth interaction, disproving and overcoming perceived impossibilities in the area.
My work has also constructed non-interactive proof systems for NP achieving some desirable properties. Specifically, in [JKKR17], we rely on well-studied assumptions to construct such proof systems achieving variants of zero-knowledge. These recently helped build other secure protocols with optimal interaction [K17, BGJKKS17]. In very recent work [BKKSW17], we build succinct non-interactive proof systems for verifiably outsourcing non-deterministic computation with verification time growing only with the non-deterministic space complexity of computation, based for the first time on standard cryptographic assumptions.
I have also worked on unconditionally secure computation using untrusted or leaky hardware, on differential privacy, and on program obfuscation.