Folgen
Amit Sahai
Amit Sahai
Symantec Chair Professor of Computer Science; Professor of Mathematics (by courtesy), UCLA
Bestätigte E-Mail-Adresse bei cs.ucla.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Attribute-based encryption for fine-grained access control of encrypted data
V Goyal, O Pandey, A Sahai, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
63912006
Ciphertext-policy attribute-based encryption
J Bethencourt, A Sahai, B Waters
2007 IEEE symposium on security and privacy (SP'07), 321-334, 2007
61252007
Fuzzy identity-based encryption
A Sahai, B Waters
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
55572005
On the (im) possibility of obfuscating programs
B Barak, O Goldreich, R Impagliazzo, S Rudich, A Sahai, S Vadhan, ...
Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001
17762001
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
A Lewko, T Okamoto, A Sahai, K Takashima, B Waters
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
15362010
Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
C Gentry, A Sahai, B Waters
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
15332013
Attribute-based encryption with non-monotonic access structures
R Ostrovsky, A Sahai, B Waters
Proceedings of the 14th ACM conference on Computer and communications …, 2007
14772007
Candidate indistinguishability obfuscation and functional encryption for all circuits
S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters
SIAM Journal on Computing 45 (3), 882-929, 2016
14292016
Predicate encryption supporting disjunctions, polynomial equations, and inner products
J Katz, A Sahai, B Waters
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
13202008
Functional encryption: Definitions and challenges
D Boneh, A Sahai, B Waters
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
10782011
Efficient non-interactive proof systems for bilinear groups
J Groth, A Sahai
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
10322008
Private Circuits: Securing Hardware against Probing Attacks.
Y Ishai, A Sahai, DA Wagner
CRYPTO 2729, 463-481, 2003
9962003
Universally composable two-party and multi-party secure computation
R Canetti, Y Lindell, R Ostrovsky, A Sahai
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002
8792002
Bounded ciphertext policy attribute based encryption
V Goyal, A Jain, O Pandey, A Sahai
Lecture Notes in Computer Science 5126, 579-591, 2008
7472008
Concurrent zero-knowledge
C Dwork, M Naor, A Sahai
Journal of the ACM (JACM) 51 (6), 851-898, 2004
7182004
Pseudonym systems
A Lysyanskaya, RL Rivest, A Sahai, S Wolf
Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 …, 2000
6912000
How to use indistinguishability obfuscation: deniable encryption, and more
A Sahai, B Waters
Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014
6872014
Fast cryptographic primitives and circular-secure encryption based on hard learning problems
B Applebaum, D Cash, C Peikert, A Sahai
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
6752009
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security
A Sahai
40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039 …, 1999
6501999
Founding cryptography on oblivious transfer–efficiently
Y Ishai, M Prabhakaran, A Sahai
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
5222008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20