default search action
Amit Sahai
Person information
- affiliation: University of California, Los Angeles, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. Commun. ACM 67(3): 97-105 (2024) - [j27]Paul Lou, Amit Sahai, Varun Sivashankar:
Relinearization Attack On LPN Over Large Fields. Comput. J. 67(4): 1438-1442 (2024) - [j26]Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai:
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation. J. Cryptol. 37(1): 1 (2024) - [c197]Paul Lou, Nathan Manohar, Amit Sahai:
Witness Semantic Security. EUROCRYPT (5) 2024: 155-184 - [i178]Fabrice Harel-Canada, Hanyu Zhou, Sreya Mupalla, Zeynep Yildiz, Amit Sahai, Nanyun Peng:
Measuring Psychological Depth in Language Models. CoRR abs/2406.12680 (2024) - [i177]Pratish Datta, Jiaxin Guan, Alexis Korb, Amit Sahai:
Adaptively Secure Streaming Functional Encryption. IACR Cryptol. ePrint Arch. 2024: 355 (2024) - [i176]Kaartik Bhushan, Alexis Korb, Amit Sahai:
Bounded-Collusion Streaming Functional Encryption from Minimal Assumptions. IACR Cryptol. ePrint Arch. 2024: 1213 (2024) - [i175]Paul Lou, Nathan Manohar, Amit Sahai:
Witness Semantic Security. IACR Cryptol. ePrint Arch. 2024: 1518 (2024) - 2023
- [c196]Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, Amit Sahai:
Two-Round Concurrent 2PC from Sub-exponential LWE. ASIACRYPT (1) 2023: 71-105 - [c195]Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry:
Computational Wiretap Coding from Indistinguishability Obfuscation. CRYPTO (4) 2023: 263-293 - [c194]Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Round-Optimal Black-Box MPC in the Plain Model. CRYPTO (1) 2023: 393-426 - [c193]Jiaxin Guan, Alexis Korb, Amit Sahai:
Streaming Functional Encryption. CRYPTO (4) 2023: 433-463 - [c192]Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Black-Box Reusable NISC with Random Oracles. EUROCRYPT (2) 2023: 68-97 - [c191]Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai:
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum i풪. EUROCRYPT (1) 2023: 205-235 - [c190]Riddhi Ghosal, Amit Sahai:
Building Hard Problems by Combining Easy Ones. ISIT 2023: 1770-1775 - [c189]Riddhi Ghosal, Amit Sahai, Brent Waters:
Non-Interactive Publicly-Verifiable Delegation of Committed Programs. Public Key Cryptography (2) 2023: 575-605 - [c188]Riddhi Ghosal, Yuval Ishai, Alexis Korb, Eyal Kushilevitz, Paul Lou, Amit Sahai:
Hard Languages in NP ∩ coNP and NIZK Proofs from Unstructured Hardness. STOC 2023: 1243-1256 - [i174]Riddhi Ghosal, Yuval Ishai, Alexis Korb, Eyal Kushilevitz, Paul Lou, Amit Sahai:
Hard Languages in $\text{NP}\cap\text{coNP}$ and NIZK Proofs from Unstructured Hardness. Electron. Colloquium Comput. Complex. TR23 (2023) - [i173]Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Black-Box Reusable NISC with Random Oracles. IACR Cryptol. ePrint Arch. 2023: 514 (2023) - [i172]Riddhi Ghosal, Amit Sahai:
Building Hard Problems by Combining Easy Ones. IACR Cryptol. ePrint Arch. 2023: 1088 (2023) - [i171]Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Round-Optimal Black-Box MPC in the Plain Model. IACR Cryptol. ePrint Arch. 2023: 1173 (2023) - [i170]Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry:
Computational Wiretap Coding from Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2023: 1270 (2023) - [i169]Riddhi Ghosal, Yuval Ishai, Alexis Korb, Eyal Kushilevitz, Paul Lou, Amit Sahai:
Hard Languages in $\mathsf{NP} \cap \mathsf{coNP}$ and NIZK Proofs from Unstructured Hardness. IACR Cryptol. ePrint Arch. 2023: 1972 (2023) - 2022
- [j25]Andy Drucker, Ravi Kumar, Amit Sahai, Mohit Singh:
Special Section on the Forty-Ninth Annual ACM Symposium on the Theory of Computing (STOC 2017). SIAM J. Comput. 51(2): 17- (2022) - [c187]Riddhi Ghosal, Paul Lou, Amit Sahai:
Efficient NIZKs from LWE via Polynomial Reconstruction and "MPC in the Head". ASIACRYPT (2) 2022: 496-521 - [c186]Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC. ITC 2022: 10:1-10:21 - [c185]Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai:
Beyond the Csiszár-Korner Bound: Best-Possible Wiretap Coding via Obfuscation. CRYPTO (2) 2022: 573-602 - [c184]Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Round-Optimal Black-Box Protocol Compilers. EUROCRYPT (1) 2022: 210-240 - [c183]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from LPN over $\mathbb {F}_p$, DLIN, and PRGs in NC0. EUROCRYPT (1) 2022: 670-699 - [c182]Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT. TCC (2) 2022: 441-469 - [i168]Yuval Ishai, Alexis Korb, Paul Lou, Amit Sahai:
Beyond the Csiszár-Körner Bound: Best-Possible Wiretap Coding via Obfuscation. IACR Cryptol. ePrint Arch. 2022: 343 (2022) - [i167]Riddhi Ghosal, Paul Lou, Amit Sahai:
Efficient NIZKs from LWE via Polynomial Reconstruction and "MPC in the Head". IACR Cryptol. ePrint Arch. 2022: 370 (2022) - [i166]Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC. IACR Cryptol. ePrint Arch. 2022: 681 (2022) - [i165]Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Round-Optimal Black-Box Protocol Compilers. IACR Cryptol. ePrint Arch. 2022: 887 (2022) - [i164]Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT. IACR Cryptol. ePrint Arch. 2022: 1288 (2022) - [i163]Riddhi Ghosal, Amit Sahai, Brent Waters:
Non-Interactive Publicly-Verifiable Delegation of Committed Programs. IACR Cryptol. ePrint Arch. 2022: 1508 (2022) - [i162]Jiaxin Guan, Alexis Korb, Amit Sahai:
Streaming Functional Encryption. IACR Cryptol. ePrint Arch. 2022: 1599 (2022) - [i161]Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai:
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum i풪. IACR Cryptol. ePrint Arch. 2022: 1637 (2022) - [i160]Behzad Abdolmaleki, Saikrishna Badrinarayanan, Rex Fernando, Giulio Malavolta, Ahmadreza Rahimi, Amit Sahai:
Two-Round Concurrent 2PC from Sub-Exponential LWE. IACR Cryptol. ePrint Arch. 2022: 1719 (2022) - 2021
- [j24]Amit Sahai, Brent Waters:
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More. SIAM J. Comput. 50(3): 857-908 (2021) - [c181]Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
On the Round Complexity of Black-Box Secure MPC. CRYPTO (2) 2021: 214-243 - [c180]Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification. EUROCRYPT (3) 2021: 97-126 - [c179]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability obfuscation from well-founded assumptions. STOC 2021: 60-73 - [i159]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0. IACR Cryptol. ePrint Arch. 2021: 1334 (2021) - [i158]Aayush Jain, Alexis Korb, Paul Lou, Amit Sahai:
A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers. IACR Cryptol. ePrint Arch. 2021: 1415 (2021) - [i157]Yuval Ishai, Dakshita Khurana, Amit Sahai, Akshayaram Srinivasan:
On the Round Complexity of Black-box Secure MPC. IACR Cryptol. ePrint Arch. 2021: 1467 (2021) - [i156]Saikrishna Badrinarayanan, Rex Fernando, Amit Sahai:
Concurrent-Secure Two-Party Computation in Two Rounds from Subexponential LWE. IACR Cryptol. ePrint Arch. 2021: 1470 (2021) - 2020
- [j23]Nathan Manohar, Abhishek Jain, Amit Sahai:
Self-Processing Private Sensor Data via Garbled Encryption. Proc. Priv. Enhancing Technol. 2020(4): 434-460 (2020) - [c178]Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
Secure MPC: Laziness Leads to GOD. ASIACRYPT (3) 2020: 120-150 - [c177]Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai:
Amplifying the Security of Functional Encryption, Unconditionally. CRYPTO (1) 2020: 717-746 - [c176]Aayush Jain, Nathan Manohar, Amit Sahai:
Combiners for Functional Encryption, Unconditionally. EUROCRYPT (1) 2020: 141-168 - [c175]Saikrishna Badrinarayanan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai:
Statistical ZAP Arguments. EUROCRYPT (3) 2020: 642-667 - [c174]Peter Michael Reichstein Rasmussen, Amit Sahai:
Expander Graphs Are Non-Malleable Codes. ITC 2020: 6:1-6:10 - [c173]James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry:
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption. ITCS 2020: 82:1-82:39 - [c172]Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai:
On Pseudorandom Encodings. TCC (3) 2020: 639-669 - [i155]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. CoRR abs/2008.09317 (2020) - [i154]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. Electron. Colloquium Comput. Complex. TR20 (2020) - [i153]Aayush Jain, Nathan Manohar, Amit Sahai:
Combiners for Functional Encryption, Unconditionally. IACR Cryptol. ePrint Arch. 2020: 154 (2020) - [i152]Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai:
On Pseudorandom Encodings. IACR Cryptol. ePrint Arch. 2020: 445 (2020) - [i151]Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification. IACR Cryptol. ePrint Arch. 2020: 764 (2020) - [i150]Qipeng Liu, Amit Sahai, Mark Zhandry:
Quantum Immune One-Time Memories. IACR Cryptol. ePrint Arch. 2020: 871 (2020) - [i149]James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry:
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption. IACR Cryptol. ePrint Arch. 2020: 889 (2020) - [i148]Nathan Manohar, Abhishek Jain, Amit Sahai:
Self-Processing Private Sensor Data via Garbled Encryption. IACR Cryptol. ePrint Arch. 2020: 950 (2020) - [i147]Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai:
Amplifying the Security of Functional Encryption, Unconditionally. IACR Cryptol. ePrint Arch. 2020: 951 (2020) - [i146]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. IACR Cryptol. ePrint Arch. 2020: 1003 (2020)
2010 – 2019
- 2019
- [c171]Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters:
Output Compression, MPC, and iO for Turing Machines. ASIACRYPT (1) 2019: 342-370 - [c170]Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. CRYPTO (3) 2019: 284-332 - [c169]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptographic Sensing. CRYPTO (3) 2019: 583-604 - [c168]Vipul Goyal, Aayush Jain, Amit Sahai:
Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge. CRYPTO (2) 2019: 608-637 - [c167]Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai:
Sum-of-Squares Meets Program Obfuscation, Revisited. EUROCRYPT (1) 2019: 226-250 - [c166]Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
How to Leverage Hardness of Constant-Degree Expanding Polynomials over \mathbb R R to build i풪 i O. EUROCRYPT (1) 2019: 251-281 - [c165]Ashutosh Kumar, Raghu Meka, Amit Sahai:
Leakage-Resilient Secret Sharing Against Colluding Parties. FOCS 2019: 636-660 - [c164]Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
From FE Combiners to Secure MPC and Back. TCC (1) 2019: 199-228 - [i145]Vipul Goyal, Aayush Jain, Amit Sahai:
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge. IACR Cryptol. ePrint Arch. 2019: 626 (2019) - [i144]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptographic Sensing. IACR Cryptol. ePrint Arch. 2019: 637 (2019) - [i143]Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. IACR Cryptol. ePrint Arch. 2019: 643 (2019) - [i142]Saikrishna Badrinarayanan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai:
Statistical ZAP Arguments. IACR Cryptol. ePrint Arch. 2019: 780 (2019) - [i141]Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan:
Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch. 2019: 939 (2019) - [i140]Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
How to leverage hardness of constant degree expanding polynomials over R to build iO. IACR Cryptol. ePrint Arch. 2019: 1030 (2019) - [i139]Aayush Jain, Huijia Lin, Amit Sahai:
Simplifying Constructions and Assumptions for i풪. IACR Cryptol. ePrint Arch. 2019: 1252 (2019) - 2018
- [c163]Prabhanjan Ananth, Yuval Ishai, Amit Sahai:
Private Circuits: A Modular Approach. CRYPTO (3) 2018: 427-455 - [c162]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Promise Zero Knowledge and Its Applications to Round Optimal MPC. CRYPTO (2) 2018: 459-487 - [c161]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption. CRYPTO (1) 2018: 565-596 - [c160]Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Statistical Witness Indistinguishability (and more) in Two Messages. EUROCRYPT (3) 2018: 34-65 - [c159]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. EUROCRYPT (3) 2018: 222-255 - [c158]Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Succinct delegation for low-space non-deterministic computation. STOC 2018: 709-721 - [c157]Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters:
Upgrading to Functional Encryption. TCC (1) 2018: 629-658 - [c156]Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:
Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications. TCC (2) 2018: 699-729 - [i138]Peter M. R. Rasmussen, Amit Sahai:
Expander Graphs are Non-Malleable Codes. CoRR abs/1810.00106 (2018) - [i137]Saikrishna Badrinarayanan, Yael Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Non-Interactive Delegation for Low-Space Non-Deterministic Computation. Electron. Colloquium Comput. Complex. TR18 (2018) - [i136]Ashutosh Kumar, Raghu Meka, Amit Sahai:
Leakage-Resilient Secret Sharing. Electron. Colloquium Comput. Complex. TR18 (2018) - [i135]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. IACR Cryptol. ePrint Arch. 2018: 133 (2018) - [i134]Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Statistical Witness Indistinguishability (and more) in Two Messages. IACR Cryptol. ePrint Arch. 2018: 168 (2018) - [i133]Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters:
Upgrading to Functional Encryption. IACR Cryptol. ePrint Arch. 2018: 281 (2018) - [i132]Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
From FE Combiners to Secure MPC and Back. IACR Cryptol. ePrint Arch. 2018: 457 (2018) - [i131]Prabhanjan Ananth, Yuval Ishai, Amit Sahai:
Private Circuits: A Modular Approach. IACR Cryptol. ePrint Arch. 2018: 566 (2018) - [i130]Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
Secure MPC: Laziness Leads to GOD. IACR Cryptol. ePrint Arch. 2018: 580 (2018) - [i129]Prabhanjan Ananth, Aayush Jain, Dakshita Khurana, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness. IACR Cryptol. ePrint Arch. 2018: 615 (2018) - [i128]Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters:
Output Compression, MPC, and iO for Turing Machines. IACR Cryptol. ePrint Arch. 2018: 866 (2018) - [i127]Peter M. R. Rasmussen, Amit Sahai:
Expander Graphs are Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2018: 929 (2018) - [i126]Aayush Jain, Amit Sahai:
How to leverage hardness of constant-degree expanding polynomials over ℝ to build iO. IACR Cryptol. ePrint Arch. 2018: 973 (2018) - [i125]Ashutosh Kumar, Raghu Meka, Amit Sahai:
Leakage-Resilient Secret Sharing. IACR Cryptol. ePrint Arch. 2018: 1138 (2018) - [i124]Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications. IACR Cryptol. ePrint Arch. 2018: 1218 (2018) - [i123]Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai:
Sum-of-Squares Meets Program Obfuscation, Revisited. IACR Cryptol. ePrint Arch. 2018: 1237 (2018) - 2017
- [c155]Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev:
Non-Interactive Multiparty Computation Without Correlated Randomness. ASIACRYPT (3) 2017: 181-211 - [c154]Rex Fernando, Peter M. R. Rasmussen, Amit Sahai:
Preventing CLT Attacks on Obfuscation with Linear Overhead. ASIACRYPT (3) 2017: 242-271 - [c153]Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, Akshay Wadia:
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions. ASIACRYPT (3) 2017: 275-303 - [c152]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization. CRYPTO (2) 2017: 252-279 - [c151]Prabhanjan Ananth, Aayush Jain, Amit Sahai:
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption. EUROCRYPT (1) 2017: 91-121 - [c150]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Patchable Indistinguishability Obfuscation: iO for Evolving Software. EUROCRYPT (3) 2017: 127-155 - [c149]Prabhanjan Ananth, Amit Sahai:
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps. EUROCRYPT (1) 2017: 152-181 - [c148]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation. EUROCRYPT (3) 2017: 247-277 - [c147]Dakshita Khurana, Amit Sahai:
How to Achieve Non-Malleability in One or Two Rounds. FOCS 2017: 564-575 - [c146]Zvika Brakerski, Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai, Gil Segev:
Hierarchical Functional Encryption. ITCS 2017: 8:1-8:27 - [c145]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai:
Round Optimal Concurrent MPC via Strong Simulation. TCC (1) 2017: 743-775 - [i122]Dakshita Khurana, Amit Sahai:
How to Achieve Non-Malleability in One or Two Rounds. Electron. Colloquium Comput. Complex. TR17 (2017) - [i121]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
A note on VRFs from Verifiable Functional Encryption. IACR Cryptol. ePrint Arch. 2017: 51 (2017) - [i120]Prabhanjan Ananth, Aayush Jain, Amit Sahai:
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption. IACR Cryptol. ePrint Arch. 2017: 127 (2017) - [i119]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation. IACR Cryptol. ePrint Arch. 2017: 240 (2017) - [i118]Aayush Jain, Peter M. R. Rasmussen, Amit Sahai:
Threshold Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 257 (2017) - [i117]Dakshita Khurana, Amit Sahai:
Two-Message Non-Malleable Commitments from Standard Sub-exponential Assumptions. IACR Cryptol. ePrint Arch. 2017: 291 (2017) - [i116]Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, Akshay Wadia:
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions. IACR Cryptol. ePrint Arch. 2017: 433 (2017) - [i115]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai:
Round Optimal Concurrent MPC via Strong Simulation. IACR Cryptol. ePrint Arch. 2017: 597 (2017) - [i114]Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev:
Non-Interactive Multiparty Computation without Correlated Randomness. IACR Cryptol. ePrint Arch. 2017: 871 (2017) - [i113]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 956 (2017) - [i112]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Promise Zero Knowledge and its Applications to Round Optimal MPC. IACR Cryptol. ePrint Arch. 2017: 1088 (2017) - [i111]Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Non-Interactive Delegation for Low-Space Non-Deterministic Computation. IACR Cryptol. ePrint Arch. 2017: 1250 (2017) - 2016
- [j22]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Hiding secrets in software: a cryptographic approach to program obfuscation. Commun. ACM 59(5): 113-120 (2016) - [j21]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits. SIAM J. Comput. 45(3): 882-929 (2016) - [c144]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
Verifiable Functional Encryption. ASIACRYPT (2) 2016: 557-587 - [c143]Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry:
How to Generate and Use Universal Samplers. ASIACRYPT (2) 2016: 715-744 - [c142]Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu:
Secure Protocol Transformations. CRYPTO (2) 2016: 430-458 - [c141]Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev:
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption. CRYPTO (2) 2016: 491-520 - [c140]Eric Miles, Amit Sahai, Mark Zhandry:
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13. CRYPTO (2) 2016: 629-658 - [c139]Dakshita Khurana, Hemanta K. Maji, Amit Sahai:
Secure Computation from Elastic Noisy Channels. EUROCRYPT (2) 2016: 184-212 - [c138]Dakshita Khurana, Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:
All Complete Functionalities are Reversible. EUROCRYPT (2) 2016: 213-242 - [c137]Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry:
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits. EUROCRYPT (2) 2016: 764-791 - [c136]Vipul Goyal, Yuval Ishai, Hemanta K. Maji, Amit Sahai, Alexander A. Sherstov:
Bounded-Communication Leakage Resilience via Parity-Resilient Circuits. FOCS 2016: 1-10 - [c135]Vipul Goyal, Dakshita Khurana, Amit Sahai:
Breaking the Three Round Barrier for Non-malleable Commitments. FOCS 2016: 21-30 - [c134]Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai:
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?. ICALP 2016: 29:1-29:15 - [c133]Shweta Agrawal, Ran Gelles, Amit Sahai:
Adaptive protocols for interactive communication. ISIT 2016: 595-599 - [c132]Prabhanjan Vijendra Ananth, Amit Sahai:
Functional Encryption for Turing Machines. TCC (A1) 2016: 125-153 - [c131]Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry:
Secure Obfuscation in a Weak Multilinear Map Model. TCC (B2) 2016: 241-268 - [i110]Eric Miles, Amit Sahai, Mark Zhandry:
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13. IACR Cryptol. ePrint Arch. 2016: 147 (2016) - [i109]Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev:
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security. IACR Cryptol. ePrint Arch. 2016: 281 (2016) - [i108]Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu:
Secure Protocol Transformations. IACR Cryptol. ePrint Arch. 2016: 456 (2016) - [i107]Daniel Kraschewski, Dakshita Khurana, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:
All Complete Functionalities are Reversible. IACR Cryptol. ePrint Arch. 2016: 496 (2016) - [i106]Dakshita Khurana, Hemanta K. Maji, Amit Sahai:
Secure Computation from Elastic Noisy Channels. IACR Cryptol. ePrint Arch. 2016: 497 (2016) - [i105]Eric Miles, Amit Sahai, Mark Zhandry:
Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks. IACR Cryptol. ePrint Arch. 2016: 588 (2016) - [i104]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
Verifiable Functional Encryption. IACR Cryptol. ePrint Arch. 2016: 629 (2016) - [i103]Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry:
Secure Obfuscation in a Weak Multilinear Map Model. IACR Cryptol. ePrint Arch. 2016: 817 (2016) - [i102]Rex Fernando, Peter M. R. Rasmussen, Amit Sahai:
Preventing CLT Zeroizing Attacks on Obfuscation. IACR Cryptol. ePrint Arch. 2016: 1070 (2016) - [i101]Prabhanjan Ananth, Amit Sahai:
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps. IACR Cryptol. ePrint Arch. 2016: 1097 (2016) - 2015
- [j20]Craig Gentry, Jens Groth, Yuval Ishai, Chris Peikert, Amit Sahai, Adam D. Smith:
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs. J. Cryptol. 28(4): 820-843 (2015) - [j19]Ran Gelles, Amit Sahai, Akshay Wadia:
Private Interactive Communication Across an Adversarial Channel. IEEE Trans. Inf. Theory 61(12): 6860-6875 (2015) - [c130]Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai:
Multi-input Functional Encryption for Unbounded Arity Functions. ASIACRYPT (1) 2015: 27-51 - [c129]Dakshita Khurana, Vanishree Rao, Amit Sahai:
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation. ASIACRYPT (1) 2015: 52-75 - [c128]Vipul Goyal, Divya Gupta, Amit Sahai:
Concurrent Secure Computation via Non-Black Box Simulation. CRYPTO (2) 2015: 23-42 - [c127]Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptography with One-Way Communication. CRYPTO (2) 2015: 191-208 - [c126]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. CRYPTO (1) 2015: 247-266 - [c125]Divya Gupta, Yuval Ishai, Hemanta K. Maji, Amit Sahai:
Secure Computation from Leaky Correlated Randomness. CRYPTO (2) 2015: 701-720 - [c124]Dan Boneh, Divya Gupta, Ilya Mironov, Amit Sahai:
Hosting Services on an Untrusted Cloud. EUROCRYPT (2) 2015: 404-436 - [c123]Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman:
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation. EUROCRYPT (2) 2015: 563-594 - [c122]Craig Gentry, Allison Bishop Lewko, Amit Sahai, Brent Waters:
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption. FOCS 2015: 151-170 - [c121]Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai:
On the Practical Security of Inner Product Functional Encryption. Public Key Cryptography 2015: 777-798 - [c120]Vipul Goyal, Huijia Lin, Omkant Pandey, Rafael Pass, Amit Sahai:
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma. TCC (1) 2015: 260-289 - [c119]Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai:
Functional Encryption for Randomized Functionalities. TCC (2) 2015: 325-351 - [c118]Omkant Pandey, Manoj Prabhakaran, Amit Sahai:
Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP. TCC (2) 2015: 638-667 - [c117]Yuval Ishai, Omkant Pandey, Amit Sahai:
Public-Coin Differing-Inputs Obfuscation and Its Applications. TCC (2) 2015: 668-697 - [i100]Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits Resilient to Additive Attacks with Applications to Secure Computation. IACR Cryptol. ePrint Arch. 2015: 154 (2015) - [i99]Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry:
Post-Zeroizing Obfuscation: The case of Evasive Circuits. IACR Cryptol. ePrint Arch. 2015: 167 (2015) - [i98]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. IACR Cryptol. ePrint Arch. 2015: 596 (2015) - [i97]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption. IACR Cryptol. ePrint Arch. 2015: 730 (2015) - [i96]Prabhanjan Ananth, Amit Sahai:
Functional Encryption for Turing Machines. IACR Cryptol. ePrint Arch. 2015: 776 (2015) - [i95]Omer Paneth, Amit Sahai:
On the Equivalence of Obfuscation and Multilinear Maps. IACR Cryptol. ePrint Arch. 2015: 791 (2015) - [i94]Zvika Brakerski, Craig Gentry, Shai Halevi, Tancrède Lepoint, Amit Sahai, Mehdi Tibouchi:
Cryptanalysis of the Quadratic Zero-Testing of GGH. IACR Cryptol. ePrint Arch. 2015: 845 (2015) - [i93]Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai:
Functional Encryption: Decentralised and Delegatable. IACR Cryptol. ePrint Arch. 2015: 1017 (2015) - [i92]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Indistinguishability Obfuscation with Constant Size Overhead. IACR Cryptol. ePrint Arch. 2015: 1023 (2015) - [i91]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Patchable Obfuscation. IACR Cryptol. ePrint Arch. 2015: 1084 (2015) - [i90]Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai:
Do Distributed Differentially-Private Protocols Require Oblivious Transfer? IACR Cryptol. ePrint Arch. 2015: 1090 (2015) - [i89]Vipul Goyal, Divya Gupta, Amit Sahai:
Concurrent Secure Computation via Non-Black Box Simulation. IACR Cryptol. ePrint Arch. 2015: 1107 (2015) - [i88]Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai:
Multi-Input Functional Encryption for Unbounded Arity Functions. IACR Cryptol. ePrint Arch. 2015: 1136 (2015) - 2014
- [j18]Farhad Hormozdiari, Jong Wha J. Joo, Akshay Wadia, Feng Guan, Rafail Ostrovsky, Amit Sahai, Eleazar Eskin:
Privacy preserving protocol for detecting genetic relatives using rare variants. Bioinform. 30(12): 204-211 (2014) - [j17]Ran Gelles, Ankur Moitra, Amit Sahai:
Efficient Coding for Interactive Communication. IEEE Trans. Inf. Theory 60(3): 1899-1913 (2014) - [c116]Dakshita Khurana, Hemanta K. Maji, Amit Sahai:
Black-Box Separations for Differentially Private Protocols. ASIACRYPT (2) 2014: 386-405 - [c115]Prabhanjan Vijendra Ananth, Divya Gupta, Yuval Ishai, Amit Sahai:
Optimizing Obfuscation: Avoiding Barrington's Theorem. CCS 2014: 646-658 - [c114]Susan Hohenberger, Amit Sahai, Brent Waters:
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation. EUROCRYPT 2014: 201-220 - [c113]Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai:
Protecting Obfuscation against Algebraic Attacks. EUROCRYPT 2014: 221-238 - [c112]Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou:
Multi-input Functional Encryption. EUROCRYPT 2014: 578-602 - [c111]Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation. EUROCRYPT 2014: 659-676 - [c110]Manoj Prabhakaran, Amit Sahai, Akshay Wadia:
Secure Computation Using Leaky Tokens. ICALP (1) 2014: 907-918 - [c109]Divya Gupta, Amit Sahai:
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption. INDOCRYPT 2014: 71-88 - [c108]Ran Gelles, Amit Sahai, Akshay Wadia:
Private interactive communication across an adversarial channel. ITCS 2014: 135-144 - [c107]Yuval Ishai, Hemanta K. Maji, Amit Sahai, Jürg Wullschleger:
Single-use ot combiners with near-optimal resilience. ISIT 2014: 1544-1548 - [c106]Amit Sahai, Brent Waters:
How to use indistinguishability obfuscation: deniable encryption, and more. STOC 2014: 475-484 - [c105]Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits resilient to additive attacks with applications to secure computation. STOC 2014: 495-504 - [c104]Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai:
Obfuscation for Evasive Functions. TCC 2014: 26-51 - [c103]Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti:
Statistical Concurrent Non-malleable Zero Knowledge. TCC 2014: 167-191 - [i87]Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:
A Full Characterization of Completeness for Two-party Randomized Function Evaluation. IACR Cryptol. ePrint Arch. 2014: 80 (2014) - [i86]Claudio Orlandi, Rafail Ostrovsky, Vanishree Rao, Amit Sahai, Ivan Visconti:
Statistical Concurrent Non-Malleable Zero Knowledge. IACR Cryptol. ePrint Arch. 2014: 143 (2014) - [i85]Prabhanjan Ananth, Divya Gupta, Yuval Ishai, Amit Sahai:
Optimizing Obfuscation: Avoiding Barrington's Theorem. IACR Cryptol. ePrint Arch. 2014: 222 (2014) - [i84]Craig Gentry, Allison B. Lewko, Amit Sahai, Brent Waters:
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption. IACR Cryptol. ePrint Arch. 2014: 309 (2014) - [i83]Dakshita Khurana, Amit Sahai, Brent Waters:
How to Generate and use Universal Parameters. IACR Cryptol. ePrint Arch. 2014: 507 (2014) - [i82]Amit Sahai, Mark Zhandry:
Obfuscating Low-Rank Matrix Branching Programs. IACR Cryptol. ePrint Arch. 2014: 773 (2014) - [i81]Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman:
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation. IACR Cryptol. ePrint Arch. 2014: 834 (2014) - [i80]Eric Miles, Amit Sahai, Mor Weiss:
Protecting obfuscation against arithmetic attacks. IACR Cryptol. ePrint Arch. 2014: 878 (2014) - [i79]Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptography with One-Way Communication. IACR Cryptol. ePrint Arch. 2014: 914 (2014) - [i78]Craig Gentry, Shai Halevi, Hemanta K. Maji, Amit Sahai:
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero. IACR Cryptol. ePrint Arch. 2014: 929 (2014) - [i77]Yuval Ishai, Omkant Pandey, Amit Sahai:
Public-Coin Differing-Inputs Obfuscation and Its Applications. IACR Cryptol. ePrint Arch. 2014: 942 (2014) - [i76]Dakshita Khurana, Hemanta K. Maji, Amit Sahai:
Black Box Separations for Differentially Private Protocols. IACR Cryptol. ePrint Arch. 2014: 957 (2014) - 2013
- [j16]Jonathan Katz, Amit Sahai, Brent Waters:
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. J. Cryptol. 26(2): 191-224 (2013) - [j15]Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles. J. Cryptol. 26(2): 340-373 (2013) - [c102]Yuval Ishai, Amit Sahai, Michael Viderman, Mor Weiss:
Zero Knowledge LTCs and Their Applications. APPROX-RANDOM 2013: 607-622 - [c101]Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai:
Discrete Gaussian Leftover Hash Lemma over Infinite Domains. ASIACRYPT (1) 2013: 97-116 - [c100]Craig Gentry, Amit Sahai, Brent Waters:
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. CRYPTO (1) 2013: 75-92 - [c99]Vipul Goyal, Ilya Mironov, Omkant Pandey, Amit Sahai:
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols. CRYPTO (1) 2013: 298-315 - [c98]Elette Boyle, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Amit Sahai:
Secure Computation against Adaptive Auxiliary Information. CRYPTO (1) 2013: 316-334 - [c97]Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters:
Attribute-Based Encryption for Circuits from Multilinear Maps. CRYPTO (2) 2013: 479-499 - [c96]Susan Hohenberger, Amit Sahai, Brent Waters:
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures. CRYPTO (1) 2013: 494-512 - [c95]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits. FOCS 2013: 40-49 - [c94]Yuval Ishai, Eyal Kushilevitz, Xin Li, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, David Zuckerman:
Robust Pseudorandom Generators. ICALP (1) 2013: 576-588 - [c93]Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters:
Witness encryption and its applications. STOC 2013: 467-476 - [p2]Abhishek Jain, Amit Sahai:
The IPS Compiler. Secure Multi-Party Computation 2013: 201-221 - [e3]Amit Sahai:
Theory of Cryptography - 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Lecture Notes in Computer Science 7785, Springer 2013, ISBN 978-3-642-36593-5 [contents] - [e2]Manoj Prabhakaran, Amit Sahai:
Secure Multi-Party Computation. Cryptology and Information Security Series 10, IOS Press 2013, ISBN 978-1-61499-168-7 [contents] - [i75]Shweta Agrawal, Ran Gelles, Amit Sahai:
Adaptive Protocols for Interactive Communication. CoRR abs/1312.4182 (2013) - [i74]Yuval Ishai, Eyal Kushilevitz, Xin Li, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, David Zuckerman:
Robust Pseudorandom Generators. Electron. Colloquium Comput. Complex. TR13 (2013) - [i73]Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters:
Attribute-Based Encryption for Circuits from Multilinear Maps. IACR Cryptol. ePrint Arch. 2013: 128 (2013) - [i72]Sanjam Garg, Craig Gentry, Amit Sahai, Brent Waters:
Witness Encryption and its Applications. IACR Cryptol. ePrint Arch. 2013: 258 (2013) - [i71]Ran Gelles, Amit Sahai, Akshay Wadia:
Private Interactive Communication Across an Adversarial Channel. IACR Cryptol. ePrint Arch. 2013: 259 (2013) - [i70]Craig Gentry, Amit Sahai, Brent Waters:
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. IACR Cryptol. ePrint Arch. 2013: 340 (2013) - [i69]Susan Hohenberger, Amit Sahai, Brent Waters:
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures. IACR Cryptol. ePrint Arch. 2013: 434 (2013) - [i68]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits. IACR Cryptol. ePrint Arch. 2013: 451 (2013) - [i67]Amit Sahai, Brent Waters:
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More. IACR Cryptol. ePrint Arch. 2013: 454 (2013) - [i66]Susan Hohenberger, Amit Sahai, Brent Waters:
Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2013: 509 (2013) - [i65]Boaz Barak, Sanjam Garg, Yael Tauman Kalai, Omer Paneth, Amit Sahai:
Protecting Obfuscation Against Algebraic Attacks. IACR Cryptol. ePrint Arch. 2013: 631 (2013) - [i64]Boaz Barak, Nir Bitansky, Ran Canetti, Yael Tauman Kalai, Omer Paneth, Amit Sahai:
Obfuscation for Evasive Functions. IACR Cryptol. ePrint Arch. 2013: 668 (2013) - [i63]Yuval Ishai, Eyal Kushilevitz, Xin Li, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, David Zuckerman:
Robust Pseudorandom Generators. IACR Cryptol. ePrint Arch. 2013: 671 (2013) - [i62]Prabhanjan Ananth, Dan Boneh, Sanjam Garg, Amit Sahai, Mark Zhandry:
Differing-Inputs Obfuscation and Applications. IACR Cryptol. ePrint Arch. 2013: 689 (2013) - [i61]Shafi Goldwasser, Vipul Goyal, Abhishek Jain, Amit Sahai:
Multi-Input Functional Encryption. IACR Cryptol. ePrint Arch. 2013: 727 (2013) - [i60]Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai:
Functional Encryption for Randomized Functionalities. IACR Cryptol. ePrint Arch. 2013: 729 (2013) - [i59]Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai:
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results. IACR Cryptol. ePrint Arch. 2013: 744 (2013) - [i58]Omkant Pandey, Manoj Prabhakaran, Amit Sahai:
Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP. IACR Cryptol. ePrint Arch. 2013: 754 (2013) - 2012
- [j14]Dan Boneh, Amit Sahai, Brent Waters:
Functional encryption: a new vision for public-key cryptography. Commun. ACM 55(11): 56-64 (2012) - [j13]Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, Ke Yang:
On the (im)possibility of obfuscating programs. J. ACM 59(2): 6:1-6:48 (2012) - [j12]Jens Groth, Rafail Ostrovsky, Amit Sahai:
New Techniques for Noninteractive Zero-Knowledge. J. ACM 59(3): 11:1-11:35 (2012) - [j11]Jens Groth, Amit Sahai:
Efficient Noninteractive Proof Systems for Bilinear Groups. SIAM J. Comput. 41(5): 1193-1232 (2012) - [c92]Sanjam Garg, Amit Sahai:
Adaptively Secure Multi-Party Computation with Dishonest Majority. CRYPTO 2012: 105-123 - [c91]Amit Sahai, Hakan Seyalioglu, Brent Waters:
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption. CRYPTO 2012: 199-217 - [c90]Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai:
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation. CRYPTO 2012: 443-460 - [c89]Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai:
Concurrently Secure Computation in Constant Rounds. EUROCRYPT 2012: 99-116 - [c88]Amit Sahai:
An information-theoretic protocol compiler. ITW 2012: 1-4 - [c87]Yuval Ishai, Mohammad Mahmoody, Amit Sahai:
On Efficient Zero-Knowledge PCPs. TCC 2012: 151-168 - [i57]Divya Gupta, Amit Sahai:
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption. CoRR abs/1210.3719 (2012) - [i56]Amit Sahai, Brent Waters:
Attribute-Based Encryption for Circuits from Multilinear Maps. CoRR abs/1210.5287 (2012) - [i55]Amit Sahai, Hakan Seyalioglu, Brent Waters:
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2012: 437 (2012) - [i54]Sanjam Garg, Amit Sahai:
Adaptively Secure Multi-Party Computation with Dishonest Majority. IACR Cryptol. ePrint Arch. 2012: 441 (2012) - [i53]Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai:
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation. IACR Cryptol. ePrint Arch. 2012: 555 (2012) - [i52]Divya Gupta, Amit Sahai:
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption. IACR Cryptol. ePrint Arch. 2012: 572 (2012) - [i51]Amit Sahai, Brent Waters:
Attribute-Based Encryption for Circuits from Multilinear Maps. IACR Cryptol. ePrint Arch. 2012: 592 (2012) - [i50]Vipul Goyal, Omkant Pandey, Amit Sahai:
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma. IACR Cryptol. ePrint Arch. 2012: 652 (2012) - [i49]Shweta Agrawal, Craig Gentry, Shai Halevi, Amit Sahai:
Sampling Discrete Gaussians Efficiently and Obliviously. IACR Cryptol. ePrint Arch. 2012: 714 (2012) - 2011
- [c86]Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung:
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge. ASIACRYPT 2011: 390-406 - [c85]Sanjam Garg, Abhishek Jain, Amit Sahai:
Leakage-Resilient Zero Knowledge. CRYPTO 2011: 297-315 - [c84]Yael Tauman Kalai, Bhavana Kanukurthi, Amit Sahai:
Cryptography with Tamperable and Leaky Memory. CRYPTO 2011: 373-390 - [c83]Sanjam Garg, Vanishree Rao, Amit Sahai, Dominique Schröder, Dominique Unruh:
Round Optimal Blind Signatures. CRYPTO 2011: 630-648 - [c82]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai, Jürg Wullschleger:
Constant-Rate Oblivious Transfer from Noisy Channels. CRYPTO 2011: 667-684 - [c81]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Manoj Prabhakaran, Amit Sahai:
Efficient Non-interactive Secure Computation. EUROCRYPT 2011: 406-425 - [c80]Ran Gelles, Ankur Moitra, Amit Sahai:
Efficient and Explicit Coding for Interactive Communication. FOCS 2011: 768-777 - [c79]Amit Sahai, Hakan Seyalioglu:
Fully Secure Accountable-Authority Identity-Based Encryption. Public Key Cryptography 2011: 296-316 - [c78]Dan Boneh, Amit Sahai, Brent Waters:
Functional Encryption: Definitions and Challenges. TCC 2011: 253-273 - [c77]Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai:
Bringing People of Different Beliefs Together to Do UC. TCC 2011: 311-328 - [i48]Ran Gelles, Amit Sahai:
Potent Tree Codes and their applications: Coding for Interactive Communication, revisited. CoRR abs/1104.0739 (2011) - [i47]Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai:
Concurrently Secure Computation in Constant Rounds. IACR Cryptol. ePrint Arch. 2011: 251 (2011) - [i46]Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung:
Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge. IACR Cryptol. ePrint Arch. 2011: 408 (2011) - 2010
- [c76]Yuval Ishai, Abishek Kumarasubramanian, Claudio Orlandi, Amit Sahai:
On Invertible Sampling and Adaptive Security. ASIACRYPT 2010: 466-482 - [c75]Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai, Brent Waters:
Building efficient fully collusion-resilient traitor tracing and revocation schemes. CCS 2010: 121-130 - [c74]Amit Sahai, Hakan Seyalioglu:
Worry-free encryption: functional encryption with public keys. CCS 2010: 463-472 - [c73]Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai:
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. CRYPTO 2010: 173-190 - [c72]Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters:
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. EUROCRYPT 2010: 62-91 - [c71]Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:
On the Computational Complexity of Coin Flipping. FOCS 2010: 613-622 - [c70]Allison B. Lewko, Amit Sahai, Brent Waters:
Revocation Systems with Very Small Private Keys. IEEE Symposium on Security and Privacy 2010: 273-285 - [c69]S. Dov Gordon, Yuval Ishai, Tal Moran, Rafail Ostrovsky, Amit Sahai:
On Complete Primitives for Fairness. TCC 2010: 91-108 - [c68]Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia:
Founding Cryptography on Tamper-Proof Hardware Tokens. TCC 2010: 308-326 - [i45]Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai:
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. Electron. Colloquium Comput. Complex. TR10 (2010) - [i44]Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai:
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. IACR Cryptol. ePrint Arch. 2010: 89 (2010) - [i43]Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters:
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. IACR Cryptol. ePrint Arch. 2010: 110 (2010) - [i42]Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia:
Founding Cryptography on Tamper-Proof Hardware Tokens. IACR Cryptol. ePrint Arch. 2010: 153 (2010) - [i41]Dan Boneh, Amit Sahai, Brent Waters:
Functional Encryption: Definitions and Challenges. IACR Cryptol. ePrint Arch. 2010: 543 (2010)
2000 – 2009
- 2009
- [j10]Scott Aaronson, Sudipto Guha, Jon M. Kleinberg, Frank McSherry, Dieter van Melkebeek, Amit Sahai:
Special Issue On The Thirty-Eighth Annual ACM Symposium On Theory Of Computing (STOC 2006). SIAM J. Comput. 39(1): vii (2009) - [j9]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Zero-Knowledge Proofs from Secure Multiparty Computation. SIAM J. Comput. 39(3): 1121-1152 (2009) - [c67]Benny Applebaum, David Cash, Chris Peikert, Amit Sahai:
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. CRYPTO 2009: 595-618 - [c66]Vipul Goyal, Amit Sahai:
Resettably Secure Computation. EUROCRYPT 2009: 54-71 - [c65]Yi Deng, Vipul Goyal, Amit Sahai:
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy. FOCS 2009: 251-260 - [c64]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Extracting Correlations. FOCS 2009: 261-270 - [c63]Yuval Ishai, Manoj Prabhakaran, Amit Sahai:
Secure Arithmetic Computation with No Honest Majority. TCC 2009: 294-314 - [p1]Amit Sahai, Brent Waters, Steve Lu:
Attribute-Based Encryption. Identity-Based Cryptography 2009: 156-168 - [i40]Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai, Brent Waters:
Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes. IACR Cryptol. ePrint Arch. 2009: 532 (2009) - 2008
- [j8]Nishanth Chandran, Ryan Moriarty, Rafail Ostrovsky, Omkant Pandey, Mohammad Ali Safari, Amit Sahai:
Improved algorithms for optimal embeddings. ACM Trans. Algorithms 4(4): 45:1-45:14 (2008) - [c62]Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters:
Black-box accountable authority identity-based encryption. CCS 2008: 427-436 - [c61]Yuval Ishai, Manoj Prabhakaran, Amit Sahai:
Founding Cryptography on Oblivious Transfer - Efficiently. CRYPTO 2008: 572-591 - [c60]Jonathan Katz, Amit Sahai, Brent Waters:
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. EUROCRYPT 2008: 146-162 - [c59]Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam:
Precise Concurrent Zero Knowledge. EUROCRYPT 2008: 397-414 - [c58]Jens Groth, Amit Sahai:
Efficient Non-interactive Proof Systems for Bilinear Groups. EUROCRYPT 2008: 415-432 - [c57]Nishanth Chandran, Vipul Goyal, Amit Sahai:
New Constructions for UC Secure Computation Using Tamper-Proof Hardware. EUROCRYPT 2008: 545-562 - [c56]Vipul Goyal, Abhishek Jain, Omkant Pandey, Amit Sahai:
Bounded Ciphertext Policy Attribute Based Encryption. ICALP (2) 2008: 579-591 - [c55]Amit Sahai:
Computing on Encrypted Data. ICISS 2008: 148-153 - [c54]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptography with constant computational overhead. STOC 2008: 433-442 - [i39]Yuval Ishai, Manoj Prabhakaran, Amit Sahai:
Secure Arithmetic Computation with No Honest Majority. CoRR abs/0811.0475 (2008) - [i38]Allison B. Lewko, Amit Sahai, Brent Waters:
Revocation Systems with Very Small Private Keys. IACR Cryptol. ePrint Arch. 2008: 309 (2008) - [i37]Yuval Ishai, Manoj Prabhakaran, Amit Sahai:
Secure Arithmetic Computation with No Honest Majority. IACR Cryptol. ePrint Arch. 2008: 465 (2008) - [i36]Vipul Goyal, Amit Sahai:
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy. IACR Cryptol. ePrint Arch. 2008: 545 (2008) - 2007
- [c53]Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai:
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. ASIACRYPT 2007: 444-459 - [c52]Rafail Ostrovsky, Amit Sahai, Brent Waters:
Attribute-based encryption with non-monotonic access structures. CCS 2007: 195-203 - [c51]Nishanth Chandran, Vipul Goyal, Rafail Ostrovsky, Amit Sahai:
Covert Multi-Party Computation. FOCS 2007: 238-248 - [c50]Rafail Ostrovsky, Omkant Pandey, Amit Sahai:
Private Locally Decodable Codes. ICALP 2007: 387-398 - [c49]Nishanth Chandran, Jens Groth, Amit Sahai:
Ring Signatures of Sub-linear Size Without Random Oracles. ICALP 2007: 423-434 - [c48]John Bethencourt, Amit Sahai, Brent Waters:
Ciphertext-Policy Attribute-Based Encryption. S&P 2007: 321-334 - [c47]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Zero-knowledge from secure multiparty computation. STOC 2007: 21-30 - [i35]Jens Groth, Amit Sahai:
Efficient Non-interactive Proof Systems for Bilinear Groups. Electron. Colloquium Comput. Complex. TR07 (2007) - [i34]Rafail Ostrovsky, Omkant Pandey, Amit Sahai:
Private Locally Decodable Codes. IACR Cryptol. ePrint Arch. 2007: 25 (2007) - [i33]Jens Groth, Amit Sahai:
Efficient Non-interactive Proof Systems for Bilinear Groups. IACR Cryptol. ePrint Arch. 2007: 155 (2007) - [i32]Rafail Ostrovsky, Amit Sahai, Brent Waters:
Attribute-Based Encryption with Non-Monotonic Access Structures. IACR Cryptol. ePrint Arch. 2007: 323 (2007) - [i31]Nishanth Chandran, Vipul Goyal, Amit Sahai:
New Constructions for UC Secure Computation using Tamper-proof Hardware. IACR Cryptol. ePrint Arch. 2007: 334 (2007) - [i30]Jonathan Katz, Amit Sahai, Brent Waters:
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. IACR Cryptol. ePrint Arch. 2007: 404 (2007) - [i29]Omkant Pandey, Rafael Pass, Amit Sahai, Wei-Lung Dustin Tseng, Muthuramakrishnan Venkitasubramaniam:
Precise Concurrent Zero Knowledge. IACR Cryptol. ePrint Arch. 2007: 451 (2007) - 2006
- [c46]Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
Attribute-based encryption for fine-grained access control of encrypted data. CCS 2006: 89-98 - [c45]Jens Groth, Rafail Ostrovsky, Amit Sahai:
Non-interactive Zaps and New Techniques for NIZK. CRYPTO 2006: 97-111 - [c44]Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David A. Wagner:
Private Circuits II: Keeping Secrets in Tamperable Circuits. EUROCRYPT 2006: 308-327 - [c43]Jens Groth, Rafail Ostrovsky, Amit Sahai:
Perfect Non-interactive Zero Knowledge for NP. EUROCRYPT 2006: 339-358 - [c42]Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures and Multisignatures Without Random Oracles. EUROCRYPT 2006: 465-485 - [c41]Dan Boneh, Amit Sahai, Brent Waters:
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. EUROCRYPT 2006: 573-592 - [c40]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptography from Anonymity. FOCS 2006: 239-248 - [c39]Boaz Barak, Manoj Prabhakaran, Amit Sahai:
Concurrent Non-Malleable Zero Knowledge. FOCS 2006: 345-354 - [c38]Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil P. Vadhan:
Concurrent Zero Knowledge Without Complexity Assumptions. TCC 2006: 1-20 - [i28]Nishanth Chandran, Ryan Moriarty, Rafail Ostrovsky, Omkant Pandey, Amit Sahai:
Improved Algorithms for Optimal Embeddings. Electron. Colloquium Comput. Complex. TR06 (2006) - [i27]Dan Boneh, Amit Sahai, Brent Waters:
Fully Collusion Resistant Traitor Tracing. IACR Cryptol. ePrint Arch. 2006: 45 (2006) - [i26]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptography from Anonymity. IACR Cryptol. ePrint Arch. 2006: 84 (2006) - [i25]Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters:
Sequential Aggregate Signatures and Multisignatures without Random Oracles. IACR Cryptol. ePrint Arch. 2006: 96 (2006) - [i24]Mihir Bellare, Amit Sahai:
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization. IACR Cryptol. ePrint Arch. 2006: 228 (2006) - [i23]Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. IACR Cryptol. ePrint Arch. 2006: 309 (2006) - [i22]Boaz Barak, Manoj Prabhakaran, Amit Sahai:
Concurrent Non-Malleable Zero Knowledge. IACR Cryptol. ePrint Arch. 2006: 355 (2006) - [i21]Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai:
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. IACR Cryptol. ePrint Arch. 2006: 400 (2006) - 2005
- [j7]Moses Charikar, Eric Lehman, Ding Liu, Rina Panigrahy, Manoj Prabhakaran, Amit Sahai, Abhi Shelat:
The smallest grammar problem. IEEE Trans. Inf. Theory 51(7): 2554-2576 (2005) - [c37]Amit Sahai, Brent Waters:
Fuzzy Identity-Based Encryption. EUROCRYPT 2005: 457-473 - [c36]Boaz Barak, Amit Sahai:
How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation. FOCS 2005: 543-552 - [c35]Manoj Prabhakaran, Amit Sahai:
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation. TCC 2005: 104-127 - [i20]Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil P. Vadhan:
Concurrent Zero Knowledge without Complexity Assumptions. Electron. Colloquium Comput. Complex. TR05 (2005) - [i19]Boaz Barak, Amit Sahai:
How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation. Electron. Colloquium Comput. Complex. TR05 (2005) - [i18]Jens Groth, Rafail Ostrovsky, Amit Sahai:
Perfect Non-Interactive Zero Knowledge for NP. Electron. Colloquium Comput. Complex. TR05 (2005) - [i17]Boaz Barak, Amit Sahai:
How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation. IACR Cryptol. ePrint Arch. 2005: 106 (2005) - [i16]Daniele Micciancio, Shien Jin Ong, Amit Sahai, Salil P. Vadhan:
Concurrent Zero Knowledge without Complexity Assumptions. IACR Cryptol. ePrint Arch. 2005: 286 (2005) - [i15]Jens Groth, Rafail Ostrovsky, Amit Sahai:
Perfect Non-Interactive Zero Knowledge for NP. IACR Cryptol. ePrint Arch. 2005: 290 (2005) - 2004
- [j6]Cynthia Dwork, Moni Naor, Amit Sahai:
Concurrent zero-knowledge. J. ACM 51(6): 851-898 (2004) - [j5]Moses Charikar, Jon M. Kleinberg, Ravi Kumar, Sridhar Rajagopalan, Amit Sahai, Andrew Tomkins:
Minimizing Wirelength in Zero and Bounded Skew Clock Trees. SIAM J. Discret. Math. 17(4): 582-595 (2004) - [c34]Ben Lynn, Manoj Prabhakaran, Amit Sahai:
Positive Results and Techniques for Obfuscation. EUROCRYPT 2004: 20-39 - [c33]Yevgeniy Dodis, Shien Jin Ong, Manoj Prabhakaran, Amit Sahai:
On the (Im)possibility of Cryptography with Imperfect Randomness. FOCS 2004: 196-205 - [c32]Amit Sahai:
Secure Protocols for Complex Tasks in Complex Environments. INDOCRYPT 2004: 14-16 - [c31]Edith Elkind, Amit Sahai, Kenneth Steiglitz:
Frugality in path auctions. SODA 2004: 701-709 - [c30]Manoj Prabhakaran, Amit Sahai:
New notions of security: achieving universal composability without trusted setup. STOC 2004: 242-251 - [c29]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Batch codes and their applications. STOC 2004: 262-271 - [i14]Ben Lynn, Manoj Prabhakaran, Amit Sahai:
Positive Results and Techniques for Obfuscation. IACR Cryptol. ePrint Arch. 2004: 60 (2004) - [i13]Amit Sahai, Brent Waters:
Fuzzy Identity Based Encryption. IACR Cryptol. ePrint Arch. 2004: 86 (2004) - [i12]Manoj Prabhakaran, Amit Sahai:
New Notions of Security: Achieving Universal Composability without Trusted Setup. IACR Cryptol. ePrint Arch. 2004: 139 (2004) - 2003
- [j4]Amit Sahai, Salil P. Vadhan:
A complete problem for statistical zero knowledge. J. ACM 50(2): 196-249 (2003) - [c28]Brent R. Waters, Edward W. Felten, Amit Sahai:
Receiver anonymity via incomparable public keys. CCS 2003: 112-121 - [c27]Yuval Ishai, Amit Sahai, David A. Wagner:
Private Circuits: Securing Hardware against Probing Attacks. CRYPTO 2003: 463-481 - [e1]Sanjeev Arora, Klaus Jansen, José D. P. Rolim, Amit Sahai:
Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques, 6th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, APPROX 2003 and 7th International Workshop on Randomization and Approximation Techniques in Computer Science, RANDOM 2003, Princeton, NJ, USA, August 24-26, 2003, Proceedings. Lecture Notes in Computer Science 2764, Springer 2003, ISBN 3-540-40770-7 [contents] - 2002
- [j3]Michael A. Bender, Antonio Fernández, Dana Ron, Amit Sahai, Salil P. Vadhan:
The Power of a Pebble: Exploring and Mapping Directed Graphs. Inf. Comput. 176(1): 1-21 (2002) - [j2]Moses Charikar, Ronald Fagin, Venkatesan Guruswami, Jon M. Kleinberg, Prabhakar Raghavan, Amit Sahai:
Query Strategies for Priced Information. J. Comput. Syst. Sci. 64(4): 785-819 (2002) - [c26]Manoj Prabhakaran, Alon Rosen, Amit Sahai:
Concurrent Zero Knowledge with Logarithmic Round-Complexity. FOCS 2002: 366-375 - [c25]Moses Charikar, Amit Sahai:
Dimension Reduction in the \ell _1 Norm. FOCS 2002: 551-560 - [c24]Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai:
Universally composable two-party and multi-party secure computation. STOC 2002: 494-503 - [c23]Moses Charikar, Eric Lehman, Ding Liu, Rina Panigrahy, Manoj Prabhakaran, April Rasala, Amit Sahai, Abhi Shelat:
Approximating the smallest grammar: Kolmogorov complexity in natural models. STOC 2002: 792-801 - [i11]Edith Elkind, Amit Sahai:
A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack. IACR Cryptol. ePrint Arch. 2002: 42 (2002) - [i10]Manoj Prabhakaran, Amit Sahai:
Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity. IACR Cryptol. ePrint Arch. 2002: 55 (2002) - [i9]Ran Canetti, Yehuda Lindell, Rafail Ostrovsky, Amit Sahai:
Universally Composable Two-Party and Multi-Party Secure Computation. IACR Cryptol. ePrint Arch. 2002: 140 (2002) - 2001
- [c22]Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, Ke Yang:
On the (Im)possibility of Obfuscating Programs. CRYPTO 2001: 1-18 - [c21]Alfredo De Santis, Giovanni Di Crescenzo, Rafail Ostrovsky, Giuseppe Persiano, Amit Sahai:
Robust Non-interactive Zero Knowledge. CRYPTO 2001: 566-598 - [c20]Yevgeniy Dodis, Amit Sahai, Adam D. Smith:
On Perfect and Adaptive Security in Exposure-Resilient Cryptography. EUROCRYPT 2001: 301-324 - [i8]Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, Ke Yang:
On the (Im)possibility of Obfuscating Programs. Electron. Colloquium Comput. Complex. TR01 (2001) - [i7]Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil P. Vadhan, Ke Yang:
On the (Im)possibility of Obfuscating Programs. IACR Cryptol. ePrint Arch. 2001: 69 (2001) - 2000
- [b1]Amit Sahai:
Frontiers in zero knowledge. Massachusetts Institute of Technology, Cambridge, MA, USA, 2000 - [c19]Ran Canetti, Yevgeniy Dodis, Shai Halevi, Eyal Kushilevitz, Amit Sahai:
Exposure-Resilient Functions and All-or-Nothing Transforms. EUROCRYPT 2000: 453-469 - [c18]Venkatesan Guruswami, Amit Sahai, Madhu Sudan:
"Soft-decision" Decoding of Chinese Remainder Codes. FOCS 2000: 159-168 - [c17]Moses Charikar, Venkatesan Guruswami, Ravi Kumar, Sridhar Rajagopalan, Amit Sahai:
Combinatorial feature selection problems. FOCS 2000: 631-640 - [c16]Moses Charikar, Ronald Fagin, Venkatesan Guruswami, Jon M. Kleinberg, Prabhakar Raghavan, Amit Sahai:
Query strategies for priced information (extended abstract). STOC 2000: 582-591 - [i6]Amit Sahai, Salil P. Vadhan:
A Complete Problem for Statistical Zero Knowledge. Electron. Colloquium Comput. Complex. TR00 (2000) - [i5]Amit Sahai, Salil P. Vadhan:
A Complete Problem for Statistical Zero Knowledge. IACR Cryptol. ePrint Arch. 2000: 56 (2000)
1990 – 1999
- 1999
- [c15]Venkatesan Guruswami, Amit Sahai:
Multiclass Learning, Boosting, and Error-Correcting Codes. COLT 1999: 145-155 - [c14]Oded Goldreich, Amit Sahai, Salil P. Vadhan:
Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK. CRYPTO 1999: 467-484 - [c13]Mihir Bellare, Amit Sahai:
Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. CRYPTO 1999: 519-536 - [c12]Ravi Kumar, Sridhar Rajagopalan, Amit Sahai:
Coding Constructions for Blacklisting Problems without Computational Assumptions. CRYPTO 1999: 609-623 - [c11]Amit Sahai:
Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security. FOCS 1999: 543-553 - [c10]Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf:
Pseudonym Systems. Selected Areas in Cryptography 1999: 184-199 - [c9]Moses Charikar, Jon M. Kleinberg, Ravi Kumar, Sridhar Rajagopalan, Amit Sahai, Andrew Tomkins:
Minimizing Wirelength in Zero and Bounded Skew Clock Trees. SODA 1999: 177-184 - [i4]Oded Goldreich, Amit Sahai, Salil P. Vadhan:
Can Statistical Zero Knowledge be made Non-Interactive? or On the Relationship of SZK and NISZK. Electron. Colloquium Comput. Complex. TR99 (1999) - [i3]Mihir Bellare, Amit Sahai:
Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization. IACR Cryptol. ePrint Arch. 1999: 18 (1999) - [i2]Cynthia Dwork, Moni Naor, Amit Sahai:
Concurrent Zero-Knowledge. IACR Cryptol. ePrint Arch. 1999: 23 (1999) - 1998
- [j1]Marshall W. Bern, Amit Sahai:
Pushing Disks Together - The Continuous-Motion Case. Discret. Comput. Geom. 20(4): 499-514 (1998) - [c8]Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan:
Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems. CRYPTO 1998: 283-298 - [c7]Cynthia Dwork, Amit Sahai:
Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints. CRYPTO 1998: 442-457 - [c6]Michael A. Bender, Antonio Fernández, Dana Ron, Amit Sahai, Salil P. Vadhan:
The Power of a Pebble: Exploring and Mapping Directed Graphs. STOC 1998: 269-278 - [c5]Oded Goldreich, Amit Sahai, Salil P. Vadhan:
Honest-Verifier Statistical Zero-Knowledge Equals General Statistical Zero-Knowledge. STOC 1998: 399-408 - [c4]Cynthia Dwork, Moni Naor, Amit Sahai:
Concurrent Zero-Knowledge. STOC 1998: 409-418 - [i1]Mihir Bellare, Shai Halevi, Amit Sahai, Salil P. Vadhan:
Many-to-one Trapdoor Functions and their Relation to Public-key Cryptosystems. IACR Cryptol. ePrint Arch. 1998: 19 (1998) - 1997
- [c3]Amit Sahai, Salil P. Vadhan:
Manipulating statistical difference. Randomization Methods in Algorithm Design 1997: 251-270 - [c2]Amit Sahai, Salil P. Vadhan:
A Complete Promise Problem for Statistical Zero-Knowledge. FOCS 1997: 448-457 - 1996
- [c1]Marshall W. Bern, Amit Sahai:
Pushing Disks Together - The Continuous-Motion Case. STOC 1996: 119-125
Coauthor Index
aka: Prabhanjan Ananth
aka: Yael Kalai
aka: Peter Michael Reichstein Rasmussen
aka: Brent R. Waters
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint