Gelles, Ran; Sahai, Amit; Wadia, Akshay Private interactive communication across an adversarial channel. (English) Zbl 1359.94595 IEEE Trans. Inf. Theory 61, No. 12, 6860-6875 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Gelles} et al., IEEE Trans. Inf. Theory 61, No. 12, 6860--6875 (2015; Zbl 1359.94595) Full Text: DOI
Khurana, Dakshita; Rao, Vanishree; Sahai, Amit Multi-party key exchange for unbounded parties from indistinguishability obfuscation. (English) Zbl 1337.94044 Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 52-75 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Khurana} et al., Lect. Notes Comput. Sci. 9452, 52--75 (2015; Zbl 1337.94044) Full Text: DOI
Badrinarayanan, Saikrishna; Gupta, Divya; Jain, Abhishek; Sahai, Amit Multi-input functional encryption for unbounded arity functions. (English) Zbl 1337.94019 Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-48796-9/pbk; 978-3-662-48797-6/ebook). Lecture Notes in Computer Science 9452, 27-51 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Badrinarayanan} et al., Lect. Notes Comput. Sci. 9452, 27--51 (2015; Zbl 1337.94019) Full Text: DOI
Gentry, Craig; Groth, Jens; Ishai, Yuval; Peikert, Chris; Sahai, Amit; Smith, Adam Using fully homomorphic hybrid encryption to minimize non-interative zero-knowledge proofs. (English) Zbl 1332.94066 J. Cryptology 28, No. 4, 820-843 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Gentry} et al., J. Cryptology 28, No. 4, 820--843 (2015; Zbl 1332.94066) Full Text: DOI Link
Coron, Jean-Sébastien; Gentry, Craig; Halevi, Shai; Lepoint, Tancrède; Maji, Hemanta K.; Miles, Eric; Raykova, Mariana; Sahai, Amit; Tibouchi, Mehdi Zeroizing without low-level zeroes: new MMAP attacks and their limitations. (English) Zbl 1375.94114 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 247-266 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{J.-S. Coron} et al., Lect. Notes Comput. Sci. 9215, 247--266 (2015; Zbl 1375.94114) Full Text: DOI Link
Gupta, Divya; Ishai, Yuval; Maji, Hemanta K.; Sahai, Amit Secure computation from leaky correlated randomness. (English) Zbl 1352.94038 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 701-720 (2015). MSC: 94A60 68Q87 PDFBibTeX XMLCite \textit{D. Gupta} et al., Lect. Notes Comput. Sci. 9216, 701--720 (2015; Zbl 1352.94038) Full Text: DOI
Garg, Sanjam; Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit Cryptography with one-way communication. (English) Zbl 1351.94046 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 191-208 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 9216, 191--208 (2015; Zbl 1351.94046) Full Text: DOI
Goyal, Vipul; Gupta, Divya; Sahai, Amit Concurrent secure computation via non-black box simulation. (English) Zbl 1351.94048 Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 23-42 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 9216, 23--42 (2015; Zbl 1351.94048) Full Text: DOI
Boneh, Dan; Lewi, Kevin; Raykova, Mariana; Sahai, Amit; Zhandry, Mark; Zimmerman, Joe Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. (English) Zbl 1375.94105 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 563-594 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 9057, 563--594 (2015; Zbl 1375.94105) Full Text: DOI
Boneh, Dan; Gupta, Divya; Mironov, Ilya; Sahai, Amit Hosting services on an untrusted cloud. (English) Zbl 1371.94626 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 404-436 (2015). MSC: 94A60 68P25 68M11 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 9057, 404--436 (2015; Zbl 1371.94626) Full Text: DOI
Agrawal, Shashank; Agrawal, Shweta; Badrinarayanan, Saikrishna; Kumarasubramanian, Abishek; Prabhakaran, Manoj; Sahai, Amit On the practical security of inner product functional encryption. (English) Zbl 1345.94030 Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 777-798 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 9020, 777--798 (2015; Zbl 1345.94030) Full Text: DOI
Ishai, Yuval; Pandey, Omkant; Sahai, Amit Public-coin differing-inputs obfuscation and its applications. (English) Zbl 1336.94054 Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 668-697 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 9015, 668--697 (2015; Zbl 1336.94054) Full Text: DOI
Pandey, Omkant; Prabhakaran, Manoj; Sahai, Amit Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for NP. (English) Zbl 1382.94151 Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 638-667 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{O. Pandey} et al., Lect. Notes Comput. Sci. 9015, 638--667 (2015; Zbl 1382.94151) Full Text: DOI
Goyal, Vipul; Jain, Abhishek; Koppula, Venkata; Sahai, Amit Functional encryption for randomized functionalities. (English) Zbl 1319.94064 Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 325-351 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 9015, 325--351 (2015; Zbl 1319.94064) Full Text: DOI
Goyal, Vipul; Lin, Huijia; Pandey, Omkant; Pass, Rafael; Sahai, Amit Round-efficient concurrently composable secure computation via a robust extraction lemma. (English) Zbl 1354.94030 Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part I. Heidelberg: Springer (ISBN 978-3-662-46493-9/pbk). Lecture Notes in Computer Science 9014, 260-289 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 9014, 260--289 (2015; Zbl 1354.94030) Full Text: DOI
Gelles, Ran; Sahai, Amit; Wadia, Akshay Private interactive communication across an adversarial channel. (English) Zbl 1366.68043 Proceedings of the 5th conference on innovations in theoretical computer science, ITCS’14, Princeton, NJ, USA, January 11–14, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2243-0). 135-144 (2014). MSC: 68P30 68M12 94A62 PDFBibTeX XMLCite \textit{R. Gelles} et al., in: Proceedings of the 5th conference on innovations in theoretical computer science, ITCS'14, Princeton, NJ, USA, January 11--14, 2014. New York, NY: Association for Computing Machinery (ACM). 135--144 (2014; Zbl 1366.68043) Full Text: DOI
Gelles, Ran; Moitra, Ankur; Sahai, Amit Efficient coding for interactive communication. (English) Zbl 1360.94197 IEEE Trans. Inf. Theory 60, No. 3, 1899-1913 (2014). MSC: 94A29 94A05 PDFBibTeX XMLCite \textit{R. Gelles} et al., IEEE Trans. Inf. Theory 60, No. 3, 1899--1913 (2014; Zbl 1360.94197) Full Text: DOI
Gupta, Divya; Sahai, Amit On constant-round concurrent zero-knowledge from a knowledge assumption. (English) Zbl 1344.94050 Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 71-88 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{D. Gupta} and \textit{A. Sahai}, Lect. Notes Comput. Sci. 8885, 71--88 (2014; Zbl 1344.94050) Full Text: DOI arXiv
Genkin, Daniel; Ishai, Yuval; Prabhakaran, Manoj M.; Sahai, Amit; Tromer, Eran Circuits resilient to additive attacks with applications to secure computation. (English) Zbl 1315.94073 Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 495-504 (2014). MSC: 94A60 94C12 PDFBibTeX XMLCite \textit{D. Genkin} et al., in: Proceedings of the 46th annual ACM symposium on theory of computing, STOC '14, New York, NY, USA, May 31 -- June 3, 2014. New York, NY: Association for Computing Machinery (ACM). 495--504 (2014; Zbl 1315.94073) Full Text: DOI
Sahai, Amit; Waters, Brent How to use indistinguishability obfuscation: deniable encryption, and more. (English) Zbl 1315.94102 Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 475-484 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Sahai} and \textit{B. Waters}, in: Proceedings of the 46th annual ACM symposium on theory of computing, STOC '14, New York, NY, USA, May 31 -- June 3, 2014. New York, NY: Association for Computing Machinery (ACM). 475--484 (2014; Zbl 1315.94102) Full Text: DOI
Khurana, Dakshita; Maji, Hemanta K.; Sahai, Amit Black-box separations for differentially private protocols. (English) Zbl 1315.94083 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 386-405 (2014). MSC: 94A60 68P15 68M12 68M14 PDFBibTeX XMLCite \textit{D. Khurana} et al., Lect. Notes Comput. Sci. 8874, 386--405 (2014; Zbl 1315.94083) Full Text: DOI
Prabhakaran, Manoj; Sahai, Amit; Wadia, Akshay Secure computation using leaky tokens. (English) Zbl 1410.68131 Esparza, Javier (ed.) et al., Automata, languages, and programming. 41st international colloquium, ICALP 2014, Copenhagen, Denmark, July 8–11, 2014. Proceedings, Part I. Berlin: Springer. Lect. Notes Comput. Sci. 8572, 907-918 (2014). MSC: 68Q10 94A60 PDFBibTeX XMLCite \textit{M. Prabhakaran} et al., Lect. Notes Comput. Sci. 8572, 907--918 (2014; Zbl 1410.68131) Full Text: DOI
Goldwasser, Shafi; Gordon, S. Dov; Goyal, Vipul; Jain, Abhishek; Katz, Jonathan; Liu, Feng-Hao; Sahai, Amit; Shi, Elaine; Zhou, Hong-Sheng Multi-input functional encryption. (English) Zbl 1327.94048 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 578-602 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Goldwasser} et al., Lect. Notes Comput. Sci. 8441, 578--602 (2014; Zbl 1327.94048) Full Text: DOI
Barak, Boaz; Garg, Sanjam; Kalai, Yael Tauman; Paneth, Omer; Sahai, Amit Protecting obfuscation against algebraic attacks. (English) Zbl 1332.94055 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 221-238 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Barak} et al., Lect. Notes Comput. Sci. 8441, 221--238 (2014; Zbl 1332.94055) Full Text: DOI
Hohenberger, Susan; Sahai, Amit; Waters, Brent Replacing a random oracle: full domain hash from indistinguishability obfuscation. (English) Zbl 1332.94068 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 201-220 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Hohenberger} et al., Lect. Notes Comput. Sci. 8441, 201--220 (2014; Zbl 1332.94068) Full Text: DOI
Orlandi, Claudio; Ostrovsky, Rafail; Rao, Vanishree; Sahai, Amit; Visconti, Ivan Statistical concurrent non-malleable zero knowledge. (English) Zbl 1323.94132 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 167-191 (2014). MSC: 94A60 68P25 68Q15 PDFBibTeX XMLCite \textit{C. Orlandi} et al., Lect. Notes Comput. Sci. 8349, 167--191 (2014; Zbl 1323.94132) Full Text: DOI
Barak, Boaz; Bitansky, Nir; Canetti, Ran; Kalai, Yael Tauman; Paneth, Omer; Sahai, Amit Obfuscation for evasive functions. (English) Zbl 1296.94077 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 26-51 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Barak} et al., Lect. Notes Comput. Sci. 8349, 26--51 (2014; Zbl 1296.94077) Full Text: DOI
Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent Witness encryption and its applications. (English) Zbl 1293.94066 Proceedings of the 45th annual ACM symposium on theory of computing, STOC ’13. Palo Alto, CA, USA, June 1–4, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2029-0). 467-476 (2013). MSC: 94A60 68Q17 94A62 PDFBibTeX XMLCite \textit{S. Garg} et al., in: Proceedings of the 45th annual ACM symposium on theory of computing, STOC '13. Palo Alto, CA, USA, June 1--4, 2013. New York, NY: Association for Computing Machinery (ACM). 467--476 (2013; Zbl 1293.94066) Full Text: DOI
Agrawal, Shweta; Gentry, Craig; Halevi, Shai; Sahai, Amit Discrete Gaussian leftover hash lemma over infinite domains. (English) Zbl 1320.94059 Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 97-116 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 8269, 97--116 (2013; Zbl 1320.94059) Full Text: DOI
Ishai, Yuval; Sahai, Amit; Viderman, Michael; Weiss, Mor Zero knowledge LTCs and their applications. (English) Zbl 1405.68114 Raghavendra, Prasad (ed.) et al., Approximation, randomization, and combinatorial optimization. Algorithms and techniques. 16th international workshop, APPROX 2013, and 17th international workshop, RANDOM 2013, Berkeley, CA, USA, August 21–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40327-9/pbk). Lecture Notes in Computer Science 8096, 607-622 (2013). MSC: 68P30 68W20 94A60 94A62 94B60 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 8096, 607--622 (2013; Zbl 1405.68114) Full Text: DOI
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent Attribute-based encryption for circuits from multilinear maps. (English) Zbl 1311.94080 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 479-499 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 8043, 479--499 (2013; Zbl 1311.94080) Full Text: DOI
Hohenberger, Susan; Sahai, Amit; Waters, Brent Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. (English) Zbl 1310.94151 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 494-512 (2013). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Hohenberger} et al., Lect. Notes Comput. Sci. 8042, 494--512 (2013; Zbl 1310.94151) Full Text: DOI
Boyle, Elette; Garg, Sanjam; Jain, Abhishek; Kalai, Yael Tauman; Sahai, Amit Secure computation against adaptive auxiliary information. (English) Zbl 1310.94132 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 316-334 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{E. Boyle} et al., Lect. Notes Comput. Sci. 8042, 316--334 (2013; Zbl 1310.94132) Full Text: DOI
Goyal, Vipul; Mironov, Ilya; Pandey, Omkant; Sahai, Amit Accuracy-privacy tradeoffs for two-party differentially private protocols. (English) Zbl 1310.94149 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 298-315 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 8042, 298--315 (2013; Zbl 1310.94149) Full Text: DOI
Gentry, Craig; Sahai, Amit; Waters, Brent Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. (English) Zbl 1310.94148 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 75-92 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Gentry} et al., Lect. Notes Comput. Sci. 8042, 75--92 (2013; Zbl 1310.94148) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Li, Xin; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit; Zuckerman, David Robust pseudorandom generators. (English) Zbl 1336.94053 Fomin, Fedor V. (ed.) et al., Automata, languages, and programming. 40th international colloquium, ICALP 2013, Riga, Latvia, July 8–12, 2013, Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-39205-4/pbk). Lecture Notes in Computer Science 7965, 576-588 (2013). MSC: 94A60 68Q25 94A55 94C10 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 7965, 576--588 (2013; Zbl 1336.94053) Full Text: DOI
Prabhakaran, Manoj M. (ed.); Sahai, Amit (ed.) Secure multi-party computation. (English) Zbl 1270.94003 Cryptology and Information Security Series 10. Amsterdam: IOS Press (ISBN 978-1-61499-168-7/hbk; 978-1-61499-169-4/ebook). ix, 285 p. (2013). MSC: 94-01 94-02 94-06 94A60 68P25 00B15 PDFBibTeX XMLCite \textit{M. M. Prabhakaran} (ed.) and \textit{A. Sahai} (ed.), Secure multi-party computation. Amsterdam: IOS Press (2013; Zbl 1270.94003) Full Text: Link
Katz, Jonathan; Sahai, Amit; Waters, Brent Predicate encryption supporting disjunctions, polynomial equations, and inner products. (English) Zbl 1279.94091 J. Cryptology 26, No. 2, 191-224 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Katz} et al., J. Cryptology 26, No. 2, 191--224 (2013; Zbl 1279.94091) Full Text: DOI
Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles. (English) Zbl 1279.94098 J. Cryptology 26, No. 2, 340-373 (2013). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Lu} et al., J. Cryptology 26, No. 2, 340--373 (2013; Zbl 1279.94098) Full Text: DOI
Sahai, Amit (ed.) Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. (English) Zbl 1258.94005 Lecture Notes in Computer Science 7785. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). xi, 724 p. (2013). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{A. Sahai} (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3--6, 2013. Proceedings. Berlin: Springer (2013; Zbl 1258.94005) Full Text: DOI
Groth, Jens; Ostrovsky, Rafail; Sahai, Amit New techniques for noninteractive zero-knowledge. (English) Zbl 1281.68102 J. ACM 59, No. 3, Article No. 11, 35 p. (2012). MSC: 68P25 94A60 68Q15 PDFBibTeX XMLCite \textit{J. Groth} et al., J. ACM 59, No. 3, Article No. 11, 35 p. (2012; Zbl 1281.68102) Full Text: DOI
Barak, Boaz; Goldreich, Oded; Impagliazzo, Russell; Rudich, Steven; Sahai, Amit; Vadhan, Salil; Yang, Ke On the (im)possibility of obfuscating programs. (English) Zbl 1281.68118 J. ACM 59, No. 2, Article No. 6, 48 p. (2012). MSC: 68Q17 94A60 PDFBibTeX XMLCite \textit{B. Barak} et al., J. ACM 59, No. 2, Article No. 6, 48 p. (2012; Zbl 1281.68118) Full Text: DOI Link
Groth, Jens; Sahai, Amit Efficient noninteractive proof systems for bilinear groups. (English) Zbl 1259.94048 SIAM J. Comput. 41, No. 5, 1193-1232 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Groth} and \textit{A. Sahai}, SIAM J. Comput. 41, No. 5, 1193--1232 (2012; Zbl 1259.94048) Full Text: DOI Link
Agrawal, Shweta; Goyal, Vipul; Jain, Abhishek; Prabhakaran, Manoj; Sahai, Amit New impossibility results for concurrent composition and a non-interactive completeness theorem for secure computation. (English) Zbl 1297.94041 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 443-460 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 7417, 443--460 (2012; Zbl 1297.94041) Full Text: DOI
Sahai, Amit; Seyalioglu, Hakan; Waters, Brent Dynamic credentials and ciphertext delegation for attribute-based encryption. (English) Zbl 1296.94139 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 199-217 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Sahai} et al., Lect. Notes Comput. Sci. 7417, 199--217 (2012; Zbl 1296.94139) Full Text: DOI
Garg, Sanjam; Sahai, Amit Adaptively secure multi-party computation with dishonest majority. (English) Zbl 1294.94047 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 105-123 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} and \textit{A. Sahai}, Lect. Notes Comput. Sci. 7417, 105--123 (2012; Zbl 1294.94047) Full Text: DOI
Garg, Sanjam; Goyal, Vipul; Jain, Abhishek; Sahai, Amit Concurrently secure computation in constant rounds. (English) Zbl 1297.94069 Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 99-116 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 7237, 99--116 (2012; Zbl 1297.94069) Full Text: DOI
Ishai, Yuval; Mahmoody, Mohammad; Sahai, Amit On efficient zero-knowledge PCPs. (English) Zbl 1304.68056 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 151-168 (2012). MSC: 68Q15 94A60 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 7194, 151--168 (2012; Zbl 1304.68056) Full Text: DOI
Gelles, Ran; Moitra, Ankur; Sahai, Amit Efficient and explicit coding for interactive communication. (English) Zbl 1292.94014 Ostrovsky, Rafail (ed.), Proceedings of the 2011 IEEE 52nd annual symposium on foundations of computer science – FOCS 2011, Palm Springs, CA, USA, October 22–25. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-4571-4; 978-1-4577-1843-4/ebook). 768-777 (2011). MSC: 94A24 68M12 PDFBibTeX XMLCite \textit{R. Gelles} et al., in: Proceedings of the 2011 IEEE 52nd annual symposium on foundations of computer science -- FOCS 2011, Palm Springs, CA, USA, October 22--25. Los Alamitos, CA: IEEE Computer Society. 768--777 (2011; Zbl 1292.94014) Full Text: DOI
Deng, Yi; Feng, Dengguo; Goyal, Vipul; Lin, Dongdai; Sahai, Amit; Yung, Moti Resettable cryptography in constant rounds – the case of zero knowledge. (English) Zbl 1227.94041 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 390-406 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Deng} et al., Lect. Notes Comput. Sci. 7073, 390--406 (2011; Zbl 1227.94041) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit; Wullschleger, Jürg Constant-rate oblivious transfer from noisy channels. (English) Zbl 1290.94092 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 667-684 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 6841, 667--684 (2011; Zbl 1290.94092) Full Text: DOI
Garg, Sanjam; Rao, Vanishree; Sahai, Amit; Schröder, Dominique; Unruh, Dominique Round optimal blind signatures. (English) Zbl 1290.94075 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 630-648 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 6841, 630--648 (2011; Zbl 1290.94075) Full Text: DOI
Kalai, Yael Tauman; Kanukurthi, Bhavana; Sahai, Amit Cryptography with tamperable and leaky memory. (English) Zbl 1287.94077 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 373-390 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. T. Kalai} et al., Lect. Notes Comput. Sci. 6841, 373--390 (2011; Zbl 1287.94077) Full Text: DOI
Garg, Sanjam; Jain, Abhishek; Sahai, Amit Leakage-resilient zero knowledge. (English) Zbl 1288.68081 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 297-315 (2011). MSC: 68Q15 94A62 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 6841, 297--315 (2011; Zbl 1288.68081) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Prabhakaran, Manoj; Sahai, Amit Efficient non-interactive secure computation. (English) Zbl 1290.94151 Paterson, Kenneth G. (ed.), Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). Lecture Notes in Computer Science 6632, 406-425 (2011). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 6632, 406--425 (2011; Zbl 1290.94151) Full Text: DOI
Garg, Sanjam; Goyal, Vipul; Jain, Abhishek; Sahai, Amit Bringing people of different beliefs together to do UC. (English) Zbl 1295.94069 Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 311-328 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., Lect. Notes Comput. Sci. 6597, 311--328 (2011; Zbl 1295.94069) Full Text: DOI
Boneh, Dan; Sahai, Amit; Waters, Brent Functional encryption: definitions and challenges. (English) Zbl 1295.94027 Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 253-273 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 6597, 253--273 (2011; Zbl 1295.94027) Full Text: DOI
Sahai, Amit; Seyalioglu, Hakan Fully secure accountable-authority identity-based encryption. (English) Zbl 1291.94147 Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 296-316 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Sahai} and \textit{H. Seyalioglu}, Lect. Notes Comput. Sci. 6571, 296--316 (2011; Zbl 1291.94147) Full Text: DOI
Ishai, Yuval; Kumarasubramanian, Abishek; Orlandi, Claudio; Sahai, Amit On invertible sampling and adaptive security. (English) Zbl 1253.94052 Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 466-482 (2010). MSC: 94A60 94A20 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 6477, 466--482 (2010; Zbl 1253.94052) Full Text: DOI
Goyal, Vipul; Ishai, Yuval; Mahmoody, Mohammad; Sahai, Amit Interactive locking, zero-knowledge PCPs, and unconditional cryptography. (English) Zbl 1280.94063 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 173-190 (2010). MSC: 94A60 68T15 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 6223, 173--190 (2010; Zbl 1280.94063) Full Text: DOI
Lewko, Allison; Okamoto, Tatsuaki; Sahai, Amit; Takashima, Katsuyuki; Waters, Brent Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. (English) Zbl 1279.94095 Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 62-91 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Lewko} et al., Lect. Notes Comput. Sci. 6110, 62--91 (2010; Zbl 1279.94095) Full Text: DOI
Goyal, Vipul; Ishai, Yuval; Sahai, Amit; Venkatesan, Ramarathnam; Wadia, Akshay Founding cryptography on tamper-proof hardware tokens. (English) Zbl 1274.94072 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 308-326 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 5978, 308--326 (2010; Zbl 1274.94072) Full Text: DOI
Gordon, Dov; Ishai, Yuval; Moran, Tal; Ostrovsky, Rafail; Sahai, Amit On complete primitives for fairness. (English) Zbl 1274.94071 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 91-108 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Gordon} et al., Lect. Notes Comput. Sci. 5978, 91--108 (2010; Zbl 1274.94071) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit Extracting correlations. (English) Zbl 1292.94080 2009 IEEE 50th annual symposium on foundations of computer science – FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24–27, 2009. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-3850-1; 978-1-4244-5116-6/ebook). 261-270 (2009). MSC: 94A60 68Q87 68M12 PDFBibTeX XMLCite \textit{Y. Ishai} et al., in: 2009 IEEE 50th annual symposium on foundations of computer science -- FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24--27, 2009. Los Alamitos, CA: IEEE Computer Society. 261--270 (2009; Zbl 1292.94080) Full Text: DOI
Deng, Yi; Goyal, Vipul; Sahai, Amit Resolving the simultaneous resettability conjecture and a new non-black-box simulation strategy. (English) Zbl 1292.94054 2009 IEEE 50th annual symposium on foundations of computer science – FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24–27, 2009. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-3850-1; 978-1-4244-5116-6/ebook). 251-260 (2009). MSC: 94A60 68M12 68P25 PDFBibTeX XMLCite \textit{Y. Deng} et al., in: 2009 IEEE 50th annual symposium on foundations of computer science -- FOCS 2009. Proceedings of the symposium, Atlanta, GA, USA, October 24--27, 2009. Los Alamitos, CA: IEEE Computer Society. 251--260 (2009; Zbl 1292.94054) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit Zero-knowledge proofs from secure multiparty computation. (English) Zbl 1192.68239 SIAM J. Comput. 39, No. 3, 1121-1152 (2009). MSC: 68P25 94A60 68M12 68Q17 PDFBibTeX XMLCite \textit{Y. Ishai} et al., SIAM J. Comput. 39, No. 3, 1121--1152 (2009; Zbl 1192.68239) Full Text: DOI Link
Applebaum, Benny; Cash, David; Peikert, Chris; Sahai, Amit Fast cryptographic primitives and circular-secure encryption based on hard learning problems. (English) Zbl 1252.94044 Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 595-618 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Applebaum} et al., Lect. Notes Comput. Sci. 5677, 595--618 (2009; Zbl 1252.94044) Full Text: DOI
Goyal, Vipul; Sahai, Amit Resettably secure computation. (English) Zbl 1239.94050 Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 54-71 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Goyal} and \textit{A. Sahai}, Lect. Notes Comput. Sci. 5479, 54--71 (2009; Zbl 1239.94050) Full Text: DOI
Sahai, Amit; Waters, Brent; Lu, Steve Attribute-based encryption. (English) Zbl 1159.68448 Joye, Marc (ed.) et al., Identity-based cryptography. Amsterdam: IOP Press (ISBN 978-1-58603-947-9/hbk). Cryptology and Information Security Series 2, 156-168 (2009). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{A. Sahai} et al., in: Identity-based cryptography. Amsterdam: IOP Press. 156--168 (2009; Zbl 1159.68448)
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit Secure arithmetic computation with no honest majority. (English) Zbl 1213.94111 Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 294-314 (2009). MSC: 94A60 68Q25 94A62 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 5444, 294--314 (2009; Zbl 1213.94111) Full Text: DOI
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit Founding cryptography on oblivious transfer – efficiently. (English) Zbl 1183.94037 Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 572-591 (2008). MSC: 94A60 68M12 68M14 94A62 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 5157, 572--591 (2008; Zbl 1183.94037) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Ratall; Sahai, Amit Cryptography with constant computational overhead. (English) Zbl 1231.94050 STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 433-442 (2008). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Ishai} et al., in: Proceedings of the 40th annual ACM symposium on theory of computing, STOC 2008. Victoria, Canada, May 17--20, 2008. New York, NY: Association for Computing Machinery (ACM). 433--442 (2008; Zbl 1231.94050)
Goyal, Vipul; Jain, Abhishek; Pandey, Omkant; Sahai, Amit Bounded ciphertext policy attribute based encryption. (English) Zbl 1155.94369 Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 579-591 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 5126, 579--591 (2008; Zbl 1155.94369) Full Text: DOI
Chandran, Nishanth; Goyal, Vipul; Sahai, Amit New constructions for UC secure computation using tamper-proof hardware. (English) Zbl 1149.68376 Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 545-562 (2008). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{N. Chandran} et al., Lect. Notes Comput. Sci. 4965, 545--562 (2008; Zbl 1149.68376) Full Text: DOI
Groth, Jens; Sahai, Amit Efficient non-interactive proof systems for bilinear groups. (English) Zbl 1149.94320 Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 415-432 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Groth} and \textit{A. Sahai}, Lect. Notes Comput. Sci. 4965, 415--432 (2008; Zbl 1149.94320) Full Text: DOI
Pandey, Omkant; Pass, Rafael; Sahai, Amit; Tseng, Wei-Lung Dustin; Venkitasubramaniam, Muthuramakrishnan Precise concurrent zero knowledge. (English) Zbl 1149.94327 Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 397-414 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{O. Pandey} et al., Lect. Notes Comput. Sci. 4965, 397--414 (2008; Zbl 1149.94327) Full Text: DOI
Katz, Jonathan; Sahai, Amit; Waters, Brent Predicate encryption supporting disjunctions, polynomial equations, and inner products. (English) Zbl 1149.94323 Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 146-162 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Katz} et al., Lect. Notes Comput. Sci. 4965, 146--162 (2008; Zbl 1149.94323) Full Text: DOI
Ishai, Yuval; Kushilevitz, Eyal; Ostrovsky, Rafail; Sahai, Amit Zero-knowledge from secure multiparty computation. (English) Zbl 1232.68044 STOC’07. Proceedings of the 39th annual ACM symposium on theory of computing, San Diego, CA, USA, June 11–13, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-631-8). 21-30 (2007). MSC: 68P25 94A60 68M12 68Q17 PDFBibTeX XMLCite \textit{Y. Ishai} et al., in: Proceedings of the 39th annual ACM symposium on theory of computing, STOC 2007. San Diego, CA, USA, June 11--13, 2007. New York, NY: Association for Computing Machinery (ACM). 21--30 (2007; Zbl 1232.68044)
Goyal, Vipul; Moriarty, Ryan; Ostrovsky, Rafail; Sahai, Amit Concurrent statistical zero-knowledge arguments for NP from one way functions. (English) Zbl 1153.94384 Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 444-459 (2007). MSC: 94A60 68Q15 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 4833, 444--459 (2007; Zbl 1153.94384) Full Text: DOI
Chandran, Nishanth; Groth, Jens; Sahai, Amit Ring signatures of sub-linear size without random oracles. (English) Zbl 1171.94364 Arge, Lars (ed.) et al., Automata, languages and programming. 34th international colloquium, ICALP 2007, Wrocław, Poland, July 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73419-2/pbk). Lecture Notes in Computer Science 4596, 423-434 (2007). MSC: 94A62 PDFBibTeX XMLCite \textit{N. Chandran} et al., Lect. Notes Comput. Sci. 4596, 423--434 (2007; Zbl 1171.94364) Full Text: DOI
Ostrovsky, Rafail; Pandey, Omkant; Sahai, Amit Private locally decodable codes. (English) Zbl 1171.94375 Arge, Lars (ed.) et al., Automata, languages and programming. 34th international colloquium, ICALP 2007, Wrocław, Poland, July 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73419-2/pbk). Lecture Notes in Computer Science 4596, 387-398 (2007). MSC: 94B35 94A62 PDFBibTeX XMLCite \textit{R. Ostrovsky} et al., Lect. Notes Comput. Sci. 4596, 387--398 (2007; Zbl 1171.94375) Full Text: DOI
Boneh, Dan; Sahai, Amit; Waters, Brent Fully collusion resistant traitor tracing with short ciphertexts and private keys. (English) Zbl 1140.94326 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 573-592 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 4004, 573--592 (2006; Zbl 1140.94326) Full Text: DOI
Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent Sequential aggregate signatures and multisignatures without random oracles. (English) Zbl 1140.94358 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 465-485 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Lu} et al., Lect. Notes Comput. Sci. 4004, 465--485 (2006; Zbl 1140.94358) Full Text: DOI
Groth, Jens; Ostrovsky, Rafail; Sahai, Amit Perfect non-interactive zero knowledge for NP. (English) Zbl 1129.94025 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 339-358 (2006). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Groth} et al., Lect. Notes Comput. Sci. 4004, 339--358 (2006; Zbl 1129.94025) Full Text: DOI
Ishai, Yuval; Prabhakaran, Manoj; Sahai, Amit; Wagner, David Private circuits. II: Keeping secrets in tamperable circuits. (English) Zbl 1140.94347 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 308-327 (2006). MSC: 94A60 94C10 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 4004, 308--327 (2006; Zbl 1140.94347) Full Text: DOI
Groth, Jens; Ostrovsky, Rafail; Sahai, Amit Non-interactive ZAPs and new techniques for NIZK. (English) Zbl 1129.94024 Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 97-111 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Groth} et al., Lect. Notes Comput. Sci. 4117, 97--111 (2006; Zbl 1129.94024) Full Text: DOI
Micciancio, Daniele; Ong, Shien Jin; Sahai, Amit; Vadhan, Salil Concurrent zero knowledge without complexity assumptions. (English) Zbl 1112.94017 Halevi, Shai (ed.) et al., Theory of cryptography. Third theory of cryptography conference, TCC 2006, New York, NY, USA, March 4–7, 2006. Proceedings. Berlin: Springer (ISBN 3-540-32731-2/pbk). Lecture Notes in Computer Science 3876, 1-20 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Micciancio} et al., Lect. Notes Comput. Sci. 3876, 1--20 (2006; Zbl 1112.94017) Full Text: DOI
Sahai, Amit; Waters, Brent Fuzzy identity-based encryption. (English) Zbl 1137.94355 Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 457-473 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Sahai} and \textit{B. Waters}, Lect. Notes Comput. Sci. 3494, 457--473 (2005; Zbl 1137.94355) Full Text: DOI
Prabhakaran, Manoj; Sahai, Amit Relaxing environmental security: Monitored functionalities and client-server computation. (English) Zbl 1079.94569 Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 104-127 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Prabhakaran} and \textit{A. Sahai}, Lect. Notes Comput. Sci. 3378, 104--127 (2005; Zbl 1079.94569) Full Text: DOI
Prabhakaran, Manoj; Sahai, Amit New notions of security: achieving universal composability without trusted setup. (English) Zbl 1192.94124 Proceedings of the 36th annual ACM symposium on theory of computing (STOC 2004), Chicago, IL, USA, June 13 - 15, 2004. New York, NY: ACM Press (ISBN 1-58113-852-0). 242-251, electronic only (2004). MSC: 94A62 68M12 68P25 PDFBibTeX XMLCite \textit{M. Prabhakaran} and \textit{A. Sahai}, in: Proceedings of the 36th annual ACM symposium on theory of computing, STOC 2004. Chicago, IL, USA, June 13--15, 2004. New York, NY: ACM Press. 242--251 (2004; Zbl 1192.94124) Full Text: DOI
Dwork, Cynthia; Naor, Moni; Sahai, Amit Concurrent zero-knowledge. (English) Zbl 1125.94031 J. ACM 51, No. 6, 851-898 (2004). MSC: 94A62 94A60 68M12 68Q15 68Q85 PDFBibTeX XMLCite \textit{C. Dwork} et al., J. ACM 51, No. 6, 851--898 (2004; Zbl 1125.94031) Full Text: DOI
Lynn, Benjamin; Prabhakaran, Manoj; Sahai, Amit Positive results and techniques for obfuscation. (English) Zbl 1122.94434 Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 20-39 (2004). MSC: 94A62 68P25 68Q05 68Q15 PDFBibTeX XMLCite \textit{B. Lynn} et al., Lect. Notes Comput. Sci. 3027, 20--39 (2004; Zbl 1122.94434) Full Text: DOI
Sahai, Amit Secure protocols for complex tasks in complex environments. (English) Zbl 1113.94319 Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 14-16 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Sahai}, Lect. Notes Comput. Sci. 3348, 14--16 (2004; Zbl 1113.94319) Full Text: DOI
Sahai, Amit; Vadhan, Salil A complete problem for statistical zero knowledge. (English) Zbl 1326.68165 J. ACM 50, No. 2, 196-249 (2003). MSC: 68Q25 68Q15 68Q17 94A60 PDFBibTeX XMLCite \textit{A. Sahai} and \textit{S. Vadhan}, J. ACM 50, No. 2, 196--249 (2003; Zbl 1326.68165) Full Text: DOI Link
Ishai, Yuval; Sahai, Amit; Wagner, David Private circuits: securing hardware against probing attacks. (English) Zbl 1122.94378 Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 463-481 (2003). MSC: 94A60 94C10 PDFBibTeX XMLCite \textit{Y. Ishai} et al., Lect. Notes Comput. Sci. 2729, 463--481 (2003; Zbl 1122.94378) Full Text: DOI
Canetti, Ran; Lindell, Yehuda; Ostrovsky, Rafail; Sahai, Amit Universally composable two-party and multi-party secure computation. (English) Zbl 1192.94112 Proceedings of the thirty-fourth annual ACM symposium on theory of computing (STOC 2002), Montreal, Quebec, Canada, May 19–21, 2002. New York, NY: ACM Press (ISBN 1-581-13495-9). 494-503, electronic only (2002). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{R. Canetti} et al., in: Proceedings of the thirty-fourth annual ACM symposium on theory of computing, STOC 2002. Montreal, Quebec, Canada, May 19--21, 2002. New York, NY: ACM Press. 494--503 (2002; Zbl 1192.94112) Full Text: DOI
De Santis, Alfredo; Di Crescenzo, Giovanni; Ostrovsky, Rafail; Persiano, Giuseppe; Sahai, Amit Robust non-interactive zero knowledge. (English) Zbl 1003.94526 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 566-598 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{A. De Santis} et al., Lect. Notes Comput. Sci. 2139, 566--598 (2001; Zbl 1003.94526) Full Text: Link
Barak, Boaz; Goldreich, Oded; Impagliazzo, Rusell; Rudich, Steven; Sahai, Amit; Vadhan, Salil; Yang, Ke On the (im)possibility of obfuscating programs (extended abstract). (English) Zbl 1001.68511 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 1-18 (2001). MSC: 68Q05 94A60 68P25 PDFBibTeX XMLCite \textit{B. Barak} et al., Lect. Notes Comput. Sci. 2139, 1--18 (2001; Zbl 1001.68511) Full Text: Link
Dodis, Yevgeniy; Sahai, Amit; Smith, Adam On perfect and adaptive security in exposure-resilient cryptography. (English) Zbl 0981.94014 Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 301-324 (2001). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Dodis} et al., Lect. Notes Comput. Sci. 2045, 301--324 (2001; Zbl 0981.94014) Full Text: Link
Lysyanskaya, Anna; Rivest, Ronald L.; Sahai, Amit; Wolf, Stefan Pseudonym systems. (Extended abstract). (English) Zbl 0999.68561 Heys, Howard (ed.) et al., Selected areas in cryptography. 6th annual international workshop, SAC ’99. Kingston, Ontario, Canada, August 9-10, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1758, 184-199 (2000). MSC: 68U99 94A60 68P25 PDFBibTeX XMLCite \textit{A. Lysyanskaya} et al., Lect. Notes Comput. Sci. 1758, 184--199 (2000; Zbl 0999.68561)