Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Amit Sahai
@article{DBLP:journals/cacm/JainLS24, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from Well-Founded Assumptions}, journal = {Commun. {ACM}}, volume = {67}, number = {3}, pages = {97--105}, year = {2024}, url = {https://doi.org/10.1145/3611095}, doi = {10.1145/3611095}, timestamp = {Sat, 23 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/JainLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/IshaiKLS24, author = {Yuval Ishai and Alexis Korb and Paul Lou and Amit Sahai}, title = {Beyond the Csisz{\'{a}}r-K{\"{o}}rner Bound: Best-Possible Wiretap Coding via Obfuscation}, journal = {J. Cryptol.}, volume = {37}, number = {1}, pages = {1}, year = {2024}, url = {https://doi.org/10.1007/s00145-023-09482-2}, doi = {10.1007/S00145-023-09482-2}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/IshaiKLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaGKS24, author = {Pratish Datta and Jiaxin Guan and Alexis Korb and Amit Sahai}, title = {Adaptively Secure Streaming Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2024}, url = {https://eprint.iacr.org/2024/355}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DattaGKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbdolmalekiBFMRS23, author = {Behzad Abdolmaleki and Saikrishna Badrinarayanan and Rex Fernando and Giulio Malavolta and Ahmadreza Rahimi and Amit Sahai}, editor = {Jian Guo and Ron Steinfeld}, title = {Two-Round Concurrent 2PC from Sub-exponential {LWE}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14438}, pages = {71--105}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8721-4\_3}, doi = {10.1007/978-981-99-8721-4\_3}, timestamp = {Sun, 07 Jan 2024 14:24:23 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbdolmalekiBFMRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiJLSZ23, author = {Yuval Ishai and Aayush Jain and Paul Lou and Amit Sahai and Mark Zhandry}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Computational Wiretap Coding from Indistinguishability Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {263--293}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_9}, doi = {10.1007/978-3-031-38551-3\_9}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiJLSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKSS23, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Round-Optimal Black-Box {MPC} in the Plain Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {393--426}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_13}, doi = {10.1007/978-3-031-38557-5\_13}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GuanKS23, author = {Jiaxin Guan and Alexis Korb and Amit Sahai}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Streaming Functional Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {433--463}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_14}, doi = {10.1007/978-3-031-38551-3\_14}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GuanKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiKSS23, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Carmit Hazay and Martijn Stam}, title = {Black-Box Reusable {NISC} with Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14005}, pages = {68--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30617-4\_3}, doi = {10.1007/978-3-031-30617-4\_3}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainLLS23, author = {Aayush Jain and Huijia Lin and Paul Lou and Amit Sahai}, editor = {Carmit Hazay and Martijn Stam}, title = {Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum i{\unicode{54442}}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {205--235}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_8}, doi = {10.1007/978-3-031-30545-0\_8}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainLLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/GhosalS23, author = {Riddhi Ghosal and Amit Sahai}, title = {Building Hard Problems by Combining Easy Ones}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2023, Taipei, Taiwan, June 25-30, 2023}, pages = {1770--1775}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISIT54713.2023.10206689}, doi = {10.1109/ISIT54713.2023.10206689}, timestamp = {Mon, 28 Aug 2023 17:20:14 +0200}, biburl = {https://dblp.org/rec/conf/isit/GhosalS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GhosalSW23, author = {Riddhi Ghosal and Amit Sahai and Brent Waters}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Non-Interactive Publicly-Verifiable Delegation of Committed Programs}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {575--605}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_20}, doi = {10.1007/978-3-031-31371-4\_20}, timestamp = {Fri, 05 May 2023 22:44:30 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GhosalSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GhosalIKKLS23, author = {Riddhi Ghosal and Yuval Ishai and Alexis Korb and Eyal Kushilevitz and Paul Lou and Amit Sahai}, editor = {Barna Saha and Rocco A. Servedio}, title = {Hard Languages in {NP} {\(\cap\)} coNP and {NIZK} Proofs from Unstructured Hardness}, booktitle = {Proceedings of the 55th Annual {ACM} Symposium on Theory of Computing, {STOC} 2023, Orlando, FL, USA, June 20-23, 2023}, pages = {1243--1256}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3564246.3585119}, doi = {10.1145/3564246.3585119}, timestamp = {Mon, 22 May 2023 13:01:48 +0200}, biburl = {https://dblp.org/rec/conf/stoc/GhosalIKKLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GhosalIKKLS23, author = {Riddhi Ghosal and Yuval Ishai and Alexis Korb and Eyal Kushilevitz and Paul Lou and Amit Sahai}, title = {Hard Languages in {\textdollar}{\textbackslash}text\{NP\}{\textbackslash}cap{\textbackslash}text\{coNP\}{\textdollar} and {NIZK} Proofs from Unstructured Hardness}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR23-213}}, year = {2023}, url = {https://eccc.weizmann.ac.il/report/2023/213}, eprinttype = {ECCC}, eprint = {TR23-213}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/GhosalIKKLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS23, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {Black-Box Reusable {NISC} with Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2023}, url = {https://eprint.iacr.org/2023/514}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhosalS23, author = {Riddhi Ghosal and Amit Sahai}, title = {Building Hard Problems by Combining Easy Ones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1088}, year = {2023}, url = {https://eprint.iacr.org/2023/1088}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhosalS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS23a, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {Round-Optimal Black-Box {MPC} in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1173}, year = {2023}, url = {https://eprint.iacr.org/2023/1173}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiJLSZ23, author = {Yuval Ishai and Aayush Jain and Paul Lou and Amit Sahai and Mark Zhandry}, title = {Computational Wiretap Coding from Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1270}, year = {2023}, url = {https://eprint.iacr.org/2023/1270}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiJLSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhosalIKKLS23, author = {Riddhi Ghosal and Yuval Ishai and Alexis Korb and Eyal Kushilevitz and Paul Lou and Amit Sahai}, title = {Hard Languages in {\textdollar}{\textbackslash}mathsf\{NP\} {\textbackslash}cap {\textbackslash}mathsf\{coNP\}{\textdollar} and {NIZK} Proofs from Unstructured Hardness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1972}, year = {2023}, url = {https://eprint.iacr.org/2023/1972}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GhosalIKKLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/DruckerKSS22, author = {Andy Drucker and Ravi Kumar and Amit Sahai and Mohit Singh}, title = {Special Section on the Forty-Ninth Annual {ACM} Symposium on the Theory of Computing {(STOC} 2017)}, journal = {{SIAM} J. Comput.}, volume = {51}, number = {2}, pages = {17}, year = {2022}, url = {https://doi.org/10.1137/22n975482}, doi = {10.1137/22N975482}, timestamp = {Mon, 27 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/DruckerKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GhosalLS22, author = {Riddhi Ghosal and Paul Lou and Amit Sahai}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Efficient NIZKs from {LWE} via Polynomial Reconstruction and "MPC in the Head"}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, pages = {496--521}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4\_17}, doi = {10.1007/978-3-031-22966-4\_17}, timestamp = {Fri, 03 Feb 2023 17:07:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GhosalLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/BadrinarayananI22, author = {Saikrishna Badrinarayanan and Yuval Ishai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, editor = {Dana Dachman{-}Soled}, title = {Refuting the Dream {XOR} Lemma via Ideal Obfuscation and Resettable {MPC}}, booktitle = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, pages = {10:1--10:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITC.2022.10}, doi = {10.4230/LIPICS.ITC.2022.10}, timestamp = {Thu, 30 Jun 2022 16:13:48 +0200}, biburl = {https://dblp.org/rec/conf/citc/BadrinarayananI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKLS22, author = {Yuval Ishai and Alexis Korb and Paul Lou and Amit Sahai}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Beyond the Csisz{\'{a}}r-Korner Bound: Best-Possible Wiretap Coding via Obfuscation}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {573--602}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_20}, doi = {10.1007/978-3-031-15979-4\_20}, timestamp = {Wed, 19 Oct 2022 17:37:44 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiKSS22, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Round-Optimal Black-Box Protocol Compilers}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {210--240}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_8}, doi = {10.1007/978-3-031-06944-4\_8}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainLS22, author = {Aayush Jain and Huijia Lin and Amit Sahai}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Indistinguishability Obfuscation from {LPN} over {\textdollar}{\textbackslash}mathbb \{F\}{\_}p{\textdollar}, DLIN, and PRGs in NC\({}^{\mbox{0}}\)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {670--699}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_23}, doi = {10.1007/978-3-031-06944-4\_23}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiKSS22, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Round-Optimal Black-Box Secure Computation from Two-Round Malicious {OT}}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {441--469}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_16}, doi = {10.1007/978-3-031-22365-5\_16}, timestamp = {Fri, 23 Dec 2022 17:47:38 +0100}, biburl = {https://dblp.org/rec/conf/tcc/IshaiKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKLS22, author = {Yuval Ishai and Alexis Korb and Paul Lou and Amit Sahai}, title = {Beyond the Csisz{\'{a}}r-K{\"{o}}rner Bound: Best-Possible Wiretap Coding via Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2022}, url = {https://eprint.iacr.org/2022/343}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhosalLS22, author = {Riddhi Ghosal and Paul Lou and Amit Sahai}, title = {Efficient NIZKs from {LWE} via Polynomial Reconstruction and "MPC in the Head"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {370}, year = {2022}, url = {https://eprint.iacr.org/2022/370}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GhosalLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananI22, author = {Saikrishna Badrinarayanan and Yuval Ishai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, title = {Refuting the Dream {XOR} Lemma via Ideal Obfuscation and Resettable {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2022}, url = {https://eprint.iacr.org/2022/681}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS22, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {Round-Optimal Black-Box Protocol Compilers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {887}, year = {2022}, url = {https://eprint.iacr.org/2022/887}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS22a, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {Round-Optimal Black-Box Secure Computation from Two-Round Malicious {OT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1288}, year = {2022}, url = {https://eprint.iacr.org/2022/1288}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhosalSW22, author = {Riddhi Ghosal and Amit Sahai and Brent Waters}, title = {Non-Interactive Publicly-Verifiable Delegation of Committed Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1508}, year = {2022}, url = {https://eprint.iacr.org/2022/1508}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GhosalSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuanKS22, author = {Jiaxin Guan and Alexis Korb and Amit Sahai}, title = {Streaming Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1599}, year = {2022}, url = {https://eprint.iacr.org/2022/1599}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GuanKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainLLS22, author = {Aayush Jain and Huijia Lin and Paul Lou and Amit Sahai}, title = {Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum i{\unicode{54442}}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1637}, year = {2022}, url = {https://eprint.iacr.org/2022/1637}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JainLLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbdolmalekiBFMR22, author = {Behzad Abdolmaleki and Saikrishna Badrinarayanan and Rex Fernando and Giulio Malavolta and Ahmadreza Rahimi and Amit Sahai}, title = {Two-Round Concurrent 2PC from Sub-Exponential {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1719}, year = {2022}, url = {https://eprint.iacr.org/2022/1719}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AbdolmalekiBFMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/SahaiW21, author = {Amit Sahai and Brent Waters}, title = {How to Use Indistinguishability Obfuscation: Deniable Encryption, and More}, journal = {{SIAM} J. Comput.}, volume = {50}, number = {3}, pages = {857--908}, year = {2021}, url = {https://doi.org/10.1137/15M1030108}, doi = {10.1137/15M1030108}, timestamp = {Wed, 14 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/SahaiW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKSS21, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, editor = {Tal Malkin and Chris Peikert}, title = {On the Round Complexity of Black-Box Secure {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {214--243}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_8}, doi = {10.1007/978-3-030-84245-1\_8}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GayJLS21, author = {Romain Gay and Aayush Jain and Huijia Lin and Amit Sahai}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {97--126}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_4}, doi = {10.1007/978-3-030-77883-5\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GayJLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/JainLS21, author = {Aayush Jain and Huijia Lin and Amit Sahai}, editor = {Samir Khuller and Virginia Vassilevska Williams}, title = {Indistinguishability obfuscation from well-founded assumptions}, booktitle = {{STOC} '21: 53rd Annual {ACM} {SIGACT} Symposium on Theory of Computing, Virtual Event, Italy, June 21-25, 2021}, pages = {60--73}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3406325.3451093}, doi = {10.1145/3406325.3451093}, timestamp = {Tue, 22 Jun 2021 19:47:11 +0200}, biburl = {https://dblp.org/rec/conf/stoc/JainLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainLS21, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from {LPN} over F{\_}p, DLIN, and PRGs in NC{\^{}}0}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1334}, year = {2021}, url = {https://eprint.iacr.org/2021/1334}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JainLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainKLS21, author = {Aayush Jain and Alexis Korb and Paul Lou and Amit Sahai}, title = {A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1415}, year = {2021}, url = {https://eprint.iacr.org/2021/1415}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JainKLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKSS21, author = {Yuval Ishai and Dakshita Khurana and Amit Sahai and Akshayaram Srinivasan}, title = {On the Round Complexity of Black-box Secure {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1467}, year = {2021}, url = {https://eprint.iacr.org/2021/1467}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananF21, author = {Saikrishna Badrinarayanan and Rex Fernando and Amit Sahai}, title = {Concurrent-Secure Two-Party Computation in Two Rounds from Subexponential {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1470}, year = {2021}, url = {https://eprint.iacr.org/2021/1470}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/Manohar0S20, author = {Nathan Manohar and Abhishek Jain and Amit Sahai}, title = {Self-Processing Private Sensor Data via Garbled Encryption}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {4}, pages = {434--460}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0081}, doi = {10.2478/POPETS-2020-0081}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/Manohar0S20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BadrinarayananJ20, author = {Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Secure {MPC:} Laziness Leads to {GOD}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {120--150}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_5}, doi = {10.1007/978-3-030-64840-4\_5}, timestamp = {Thu, 10 Dec 2020 10:11:44 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BadrinarayananJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JainKMS20, author = {Aayush Jain and Alexis Korb and Nathan Manohar and Amit Sahai}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Amplifying the Security of Functional Encryption, Unconditionally}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {717--746}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_24}, doi = {10.1007/978-3-030-56784-2\_24}, timestamp = {Wed, 12 Aug 2020 14:16:56 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JainKMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainMS20, author = {Aayush Jain and Nathan Manohar and Amit Sahai}, editor = {Anne Canteaut and Yuval Ishai}, title = {Combiners for Functional Encryption, Unconditionally}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {141--168}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_6}, doi = {10.1007/978-3-030-45721-1\_6}, timestamp = {Mon, 04 May 2020 14:27:11 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadrinarayananF20, author = {Saikrishna Badrinarayanan and Rex Fernando and Aayush Jain and Dakshita Khurana and Amit Sahai}, editor = {Anne Canteaut and Yuval Ishai}, title = {Statistical {ZAP} Arguments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {642--667}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_22}, doi = {10.1007/978-3-030-45727-3\_22}, timestamp = {Tue, 05 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadrinarayananF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/RasmussenS20, author = {Peter Michael Reichstein Rasmussen and Amit Sahai}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {Expander Graphs Are Non-Malleable Codes}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {6:1--6:10}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.6}, doi = {10.4230/LIPICS.ITC.2020.6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/RasmussenS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BartusekIJMSZ20, author = {James Bartusek and Yuval Ishai and Aayush Jain and Fermi Ma and Amit Sahai and Mark Zhandry}, editor = {Thomas Vidick}, title = {Affine Determinant Programs: {A} Framework for Obfuscation and Witness Encryption}, booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS} 2020, January 12-14, 2020, Seattle, Washington, {USA}}, series = {LIPIcs}, volume = {151}, pages = {82:1--82:39}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2020.82}, doi = {10.4230/LIPICS.ITCS.2020.82}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/BartusekIJMSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrikolaCIJS20, author = {Thomas Agrikola and Geoffroy Couteau and Yuval Ishai and Stanislaw Jarecki and Amit Sahai}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {On Pseudorandom Encodings}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12552}, pages = {639--669}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64381-2\_23}, doi = {10.1007/978-3-030-64381-2\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AgrikolaCIJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-09317, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from Well-Founded Assumptions}, journal = {CoRR}, volume = {abs/2008.09317}, year = {2020}, url = {https://arxiv.org/abs/2008.09317}, eprinttype = {arXiv}, eprint = {2008.09317}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-09317.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/JainLS20, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from Well-Founded Assumptions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR20-126}}, year = {2020}, url = {https://eccc.weizmann.ac.il/report/2020/126}, eprinttype = {ECCC}, eprint = {TR20-126}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/JainLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainMS20, author = {Aayush Jain and Nathan Manohar and Amit Sahai}, title = {Combiners for Functional Encryption, Unconditionally}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2020}, url = {https://eprint.iacr.org/2020/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrikolaCIJS20, author = {Thomas Agrikola and Geoffroy Couteau and Yuval Ishai and Stanislaw Jarecki and Amit Sahai}, title = {On Pseudorandom Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {445}, year = {2020}, url = {https://eprint.iacr.org/2020/445}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrikolaCIJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GayJLS20, author = {Romain Gay and Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {764}, year = {2020}, url = {https://eprint.iacr.org/2020/764}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GayJLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuSZ20, author = {Qipeng Liu and Amit Sahai and Mark Zhandry}, title = {Quantum Immune One-Time Memories}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {871}, year = {2020}, url = {https://eprint.iacr.org/2020/871}, timestamp = {Fri, 30 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekIJMSZ20, author = {James Bartusek and Yuval Ishai and Aayush Jain and Fermi Ma and Amit Sahai and Mark Zhandry}, title = {Affine Determinant Programs: {A} Framework for Obfuscation and Witness Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {889}, year = {2020}, url = {https://eprint.iacr.org/2020/889}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BartusekIJMSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ManoharJS20, author = {Nathan Manohar and Abhishek Jain and Amit Sahai}, title = {Self-Processing Private Sensor Data via Garbled Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {950}, year = {2020}, url = {https://eprint.iacr.org/2020/950}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ManoharJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainKMS20, author = {Aayush Jain and Alexis Korb and Nathan Manohar and Amit Sahai}, title = {Amplifying the Security of Functional Encryption, Unconditionally}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {951}, year = {2020}, url = {https://eprint.iacr.org/2020/951}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainKMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainLS20, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from Well-Founded Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1003}, year = {2020}, url = {https://eprint.iacr.org/2020/1003}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BadrinarayananF19, author = {Saikrishna Badrinarayanan and Rex Fernando and Venkata Koppula and Amit Sahai and Brent Waters}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Output Compression, MPC, and iO for Turing Machines}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11921}, pages = {342--370}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34578-5\_13}, doi = {10.1007/978-3-030-34578-5\_13}, timestamp = {Tue, 26 Nov 2019 14:11:51 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BadrinarayananF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthJL0S19, author = {Prabhanjan Ananth and Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {284--332}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_10}, doi = {10.1007/978-3-030-26954-8\_10}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AnanthJL0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKOS19, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Cryptographic Sensing}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {583--604}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_19}, doi = {10.1007/978-3-030-26954-8\_19}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalJS19, author = {Vipul Goyal and Aayush Jain and Amit Sahai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {608--637}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_21}, doi = {10.1007/978-3-030-26951-7\_21}, timestamp = {Fri, 09 Aug 2019 14:22:41 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BarakHJKS19, author = {Boaz Barak and Samuel B. Hopkins and Aayush Jain and Pravesh Kothari and Amit Sahai}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Sum-of-Squares Meets Program Obfuscation, Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {226--250}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_8}, doi = {10.1007/978-3-030-17653-2\_8}, timestamp = {Tue, 14 May 2019 13:47:56 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BarakHJKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JainL0S19, author = {Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai}, editor = {Yuval Ishai and Vincent Rijmen}, title = {How to Leverage Hardness of Constant-Degree Expanding Polynomials over {\textbackslash}mathbb {R} {R} to build i{\unicode{54442}} i {O}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {251--281}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_9}, doi = {10.1007/978-3-030-17653-2\_9}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/JainL0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/0002MS19, author = {Ashutosh Kumar and Raghu Meka and Amit Sahai}, editor = {David Zuckerman}, title = {Leakage-Resilient Secret Sharing Against Colluding Parties}, booktitle = {60th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2019, Baltimore, Maryland, USA, November 9-12, 2019}, pages = {636--660}, publisher = {{IEEE} Computer Society}, year = {2019}, url = {https://doi.org/10.1109/FOCS.2019.00045}, doi = {10.1109/FOCS.2019.00045}, timestamp = {Tue, 07 Jan 2020 13:25:31 +0100}, biburl = {https://dblp.org/rec/conf/focs/0002MS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AnanthBJMS19, author = {Prabhanjan Ananth and Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai}, editor = {Dennis Hofheinz and Alon Rosen}, title = {From {FE} Combiners to Secure {MPC} and Back}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11891}, pages = {199--228}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36030-6\_9}, doi = {10.1007/978-3-030-36030-6\_9}, timestamp = {Mon, 25 Nov 2019 13:58:16 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AnanthBJMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalJS19, author = {Vipul Goyal and Aayush Jain and Amit Sahai}, title = {Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {626}, year = {2019}, url = {https://eprint.iacr.org/2019/626}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKOS19, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Cryptographic Sensing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {637}, year = {2019}, url = {https://eprint.iacr.org/2019/637}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJL0S19, author = {Prabhanjan Ananth and Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai}, title = {Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {643}, year = {2019}, url = {https://eprint.iacr.org/2019/643}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJL0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayanFJK19, author = {Saikrishna Badrinarayanan and Rex Fernando and Aayush Jain and Dakshita Khurana and Amit Sahai}, title = {Statistical {ZAP} Arguments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {780}, year = {2019}, url = {https://eprint.iacr.org/2019/780}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayanFJK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlbrechtCCDGGHH19, author = {Martin R. Albrecht and Melissa Chase and Hao Chen and Jintai Ding and Shafi Goldwasser and Sergey Gorbunov and Shai Halevi and Jeffrey Hoffstein and Kim Laine and Kristin E. Lauter and Satya Lokam and Daniele Micciancio and Dustin Moody and Travis Morrison and Amit Sahai and Vinod Vaikuntanathan}, title = {Homomorphic Encryption Standard}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {939}, year = {2019}, url = {https://eprint.iacr.org/2019/939}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlbrechtCCDGGHH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainLMS19, author = {Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai}, title = {How to leverage hardness of constant degree expanding polynomials over {R} to build iO}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1030}, year = {2019}, url = {https://eprint.iacr.org/2019/1030}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainLMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainLS19, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Simplifying Constructions and Assumptions for i{\unicode{54442}}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1252}, year = {2019}, url = {https://eprint.iacr.org/2019/1252}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthIS18, author = {Prabhanjan Ananth and Yuval Ishai and Amit Sahai}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Private Circuits: {A} Modular Approach}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {427--455}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_15}, doi = {10.1007/978-3-319-96878-0\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BadrinarayananG18, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Promise Zero Knowledge and Its Applications to Round Optimal {MPC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {459--487}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_16}, doi = {10.1007/978-3-319-96881-0\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BadrinarayananG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehGGJKRS18, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Threshold Cryptosystems from Threshold Fully Homomorphic Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {565--596}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_19}, doi = {10.1007/978-3-319-96884-1\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehGGJKRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KalaiKS18, author = {Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Statistical Witness Indistinguishability (and more) in Two Messages}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {34--65}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_2}, doi = {10.1007/978-3-319-78372-7\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KalaiKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehISW18, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {222--255}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_8}, doi = {10.1007/978-3-319-78372-7\_8}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehISW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, editor = {Ilias Diakonikolas and David Kempe and Monika Henzinger}, title = {Succinct delegation for low-space non-deterministic computation}, booktitle = {Proceedings of the 50th Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2018, Los Angeles, CA, USA, June 25-29, 2018}, pages = {709--721}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3188745.3188924}, doi = {10.1145/3188745.3188924}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Upgrading to Functional Encryption}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {629--658}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_23}, doi = {10.1007/978-3-030-03807-6\_23}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BonehIPSW18, author = {Dan Boneh and Yuval Ishai and Alain Passel{\`{e}}gue and Amit Sahai and David J. Wu}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Exploring Crypto Dark Matter: - New Simple {PRF} Candidates and Their Applications}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {699--729}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03810-6\_25}, doi = {10.1007/978-3-030-03810-6\_25}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BonehIPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-00106, author = {Peter M. R. Rasmussen and Amit Sahai}, title = {Expander Graphs are Non-Malleable Codes}, journal = {CoRR}, volume = {abs/1810.00106}, year = {2018}, url = {http://arxiv.org/abs/1810.00106}, eprinttype = {arXiv}, eprint = {1810.00106}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-00106.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Yael Kalai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, title = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR18-009}}, year = {2018}, url = {https://eccc.weizmann.ac.il/report/2018/009}, eprinttype = {ECCC}, eprint = {TR18-009}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/KumarMS18, author = {Ashutosh Kumar and Raghu Meka and Amit Sahai}, title = {Leakage-Resilient Secret Sharing}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR18-200}}, year = {2018}, url = {https://eccc.weizmann.ac.il/report/2018/200}, eprinttype = {ECCC}, eprint = {TR18-200}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/KumarMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehISW18, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, title = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {133}, year = {2018}, url = {http://eprint.iacr.org/2018/133}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehISW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KalaiKS18, author = {Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, title = {Statistical Witness Indistinguishability (and more) in Two Messages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2018}, url = {http://eprint.iacr.org/2018/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KalaiKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters}, title = {Upgrading to Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2018}, url = {https://eprint.iacr.org/2018/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthBJMS18, author = {Prabhanjan Ananth and Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai}, title = {From {FE} Combiners to Secure {MPC} and Back}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {457}, year = {2018}, url = {https://eprint.iacr.org/2018/457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthBJMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthIS18, author = {Prabhanjan Ananth and Yuval Ishai and Amit Sahai}, title = {Private Circuits: {A} Modular Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {566}, year = {2018}, url = {https://eprint.iacr.org/2018/566}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthIS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananJ18, author = {Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai}, title = {Secure {MPC:} Laziness Leads to {GOD}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {580}, year = {2018}, url = {https://eprint.iacr.org/2018/580}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJKS18, author = {Prabhanjan Ananth and Aayush Jain and Dakshita Khurana and Amit Sahai}, title = {Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2018}, url = {https://eprint.iacr.org/2018/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananF18, author = {Saikrishna Badrinarayanan and Rex Fernando and Venkata Koppula and Amit Sahai and Brent Waters}, title = {Output Compression, MPC, and iO for Turing Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {866}, year = {2018}, url = {https://eprint.iacr.org/2018/866}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RasmussenS18, author = {Peter M. R. Rasmussen and Amit Sahai}, title = {Expander Graphs are Non-Malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {929}, year = {2018}, url = {https://eprint.iacr.org/2018/929}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RasmussenS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainS18, author = {Aayush Jain and Amit Sahai}, title = {How to leverage hardness of constant-degree expanding polynomials over {\(\mathbb{R}\)} to build iO}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {973}, year = {2018}, url = {https://eprint.iacr.org/2018/973}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarMS18, author = {Ashutosh Kumar and Raghu Meka and Amit Sahai}, title = {Leakage-Resilient Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1138}, year = {2018}, url = {https://eprint.iacr.org/2018/1138}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KumarMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehIPSW18, author = {Dan Boneh and Yuval Ishai and Alain Passel{\`{e}}gue and Amit Sahai and David J. Wu}, title = {Exploring Crypto Dark Matter: New Simple {PRF} Candidates and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1218}, year = {2018}, url = {https://eprint.iacr.org/2018/1218}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehIPSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakHJKS18, author = {Boaz Barak and Samuel B. Hopkins and Aayush Jain and Pravesh Kothari and Amit Sahai}, title = {Sum-of-Squares Meets Program Obfuscation, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1237}, year = {2018}, url = {https://eprint.iacr.org/2018/1237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakHJKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HaleviI0KSY17, author = {Shai Halevi and Yuval Ishai and Abhishek Jain and Ilan Komargodski and Amit Sahai and Eylon Yogev}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Non-Interactive Multiparty Computation Without Correlated Randomness}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10626}, pages = {181--211}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70700-6\_7}, doi = {10.1007/978-3-319-70700-6\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HaleviI0KSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FernandoRS17, author = {Rex Fernando and Peter M. R. Rasmussen and Amit Sahai}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Preventing {CLT} Attacks on Obfuscation with Linear Overhead}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10626}, pages = {242--271}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70700-6\_9}, doi = {10.1007/978-3-319-70700-6\_9}, timestamp = {Wed, 22 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FernandoRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BadrinarayananG17, author = {Saikrishna Badrinarayanan and Sanjam Garg and Yuval Ishai and Amit Sahai and Akshay Wadia}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10626}, pages = {275--303}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70700-6\_10}, doi = {10.1007/978-3-319-70700-6\_10}, timestamp = {Wed, 22 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BadrinarayananG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ananth0S17, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, editor = {Jonathan Katz and Hovav Shacham}, title = {Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {252--279}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_9}, doi = {10.1007/978-3-319-63715-0\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ananth0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnanthJS17, author = {Prabhanjan Ananth and Aayush Jain and Amit Sahai}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {91--121}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_4}, doi = {10.1007/978-3-319-56620-7\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnanthJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnanthJS17a, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Patchable Indistinguishability Obfuscation: i\emph{O} for Evolving Software}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {127--155}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_5}, doi = {10.1007/978-3-319-56617-7\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnanthJS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AnanthS17, author = {Prabhanjan Ananth and Amit Sahai}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {152--181}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_6}, doi = {10.1007/978-3-319-56620-7\_6}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AnanthS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehISW17, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {247--277}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_9}, doi = {10.1007/978-3-319-56617-7\_9}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehISW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/KhuranaS17, author = {Dakshita Khurana and Amit Sahai}, editor = {Chris Umans}, title = {How to Achieve Non-Malleability in One or Two Rounds}, booktitle = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2017, Berkeley, CA, USA, October 15-17, 2017}, pages = {564--575}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/FOCS.2017.58}, doi = {10.1109/FOCS.2017.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/KhuranaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BrakerskiCGJSS17, author = {Zvika Brakerski and Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai and Gil Segev}, editor = {Christos H. Papadimitriou}, title = {Hierarchical Functional Encryption}, booktitle = {8th Innovations in Theoretical Computer Science Conference, {ITCS} 2017, January 9-11, 2017, Berkeley, CA, {USA}}, series = {LIPIcs}, volume = {67}, pages = {8:1--8:27}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2017.8}, doi = {10.4230/LIPICS.ITCS.2017.8}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/innovations/BrakerskiCGJSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BadrinarayananG17, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Dakshita Khurana and Amit Sahai}, editor = {Yael Kalai and Leonid Reyzin}, title = {Round Optimal Concurrent {MPC} via Strong Simulation}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {743--775}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_25}, doi = {10.1007/978-3-319-70500-2\_25}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BadrinarayananG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/KhuranaS17, author = {Dakshita Khurana and Amit Sahai}, title = {How to Achieve Non-Malleability in One or Two Rounds}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR17-100}}, year = {2017}, url = {https://eccc.weizmann.ac.il/report/2017/100}, eprinttype = {ECCC}, eprint = {TR17-100}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/KhuranaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG17, author = {Saikrishna Badrinarayanan and Vipul Goyal and Aayush Jain and Amit Sahai}, title = {A note on VRFs from Verifiable Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {51}, year = {2017}, url = {http://eprint.iacr.org/2017/051}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJS17, author = {Prabhanjan Ananth and Aayush Jain and Amit Sahai}, title = {Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2017}, url = {http://eprint.iacr.org/2017/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehISW17, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, title = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2017}, url = {http://eprint.iacr.org/2017/240}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehISW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JainRS17, author = {Aayush Jain and Peter M. R. Rasmussen and Amit Sahai}, title = {Threshold Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {257}, year = {2017}, url = {http://eprint.iacr.org/2017/257}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JainRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaS17, author = {Dakshita Khurana and Amit Sahai}, title = {Two-Message Non-Malleable Commitments from Standard Sub-exponential Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2017}, url = {http://eprint.iacr.org/2017/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG17a, author = {Saikrishna Badrinarayanan and Sanjam Garg and Yuval Ishai and Amit Sahai and Akshay Wadia}, title = {Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2017}, url = {http://eprint.iacr.org/2017/433}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG17b, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Dakshita Khurana and Amit Sahai}, title = {Round Optimal Concurrent {MPC} via Strong Simulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {597}, year = {2017}, url = {http://eprint.iacr.org/2017/597}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviI0KSY17, author = {Shai Halevi and Yuval Ishai and Abhishek Jain and Ilan Komargodski and Amit Sahai and Eylon Yogev}, title = {Non-Interactive Multiparty Computation without Correlated Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {871}, year = {2017}, url = {http://eprint.iacr.org/2017/871}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviI0KSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGGJKRS17, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai}, title = {Threshold Cryptosystems From Threshold Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {956}, year = {2017}, url = {http://eprint.iacr.org/2017/956}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGGJKRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG17c, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, title = {Promise Zero Knowledge and its Applications to Round Optimal {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1088}, year = {2017}, url = {http://eprint.iacr.org/2017/1088}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG17c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananK17, author = {Saikrishna Badrinarayanan and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, title = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1250}, year = {2017}, url = {http://eprint.iacr.org/2017/1250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GargGH0SW16, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Hiding secrets in software: a cryptographic approach to program obfuscation}, journal = {Commun. {ACM}}, volume = {59}, number = {5}, pages = {113--120}, year = {2016}, url = {https://doi.org/10.1145/2902313}, doi = {10.1145/2902313}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/GargGH0SW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/GargGH0SW16, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits}, journal = {{SIAM} J. Comput.}, volume = {45}, number = {3}, pages = {882--929}, year = {2016}, url = {https://doi.org/10.1137/14095772X}, doi = {10.1137/14095772X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/GargGH0SW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BadrinarayananG16, author = {Saikrishna Badrinarayanan and Vipul Goyal and Aayush Jain and Amit Sahai}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Verifiable Functional Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {557--587}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_19}, doi = {10.1007/978-3-662-53890-6\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BadrinarayananG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HofheinzJKSWZ16, author = {Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {How to Generate and Use Universal Samplers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {715--744}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_24}, doi = {10.1007/978-3-662-53890-6\_24}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HofheinzJKSWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKPSY16, author = {Yuval Ishai and Eyal Kushilevitz and Manoj Prabhakaran and Amit Sahai and Ching{-}Hua Yu}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Secure Protocol Transformations}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {430--458}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_15}, doi = {10.1007/978-3-662-53008-5\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AnanthJNSY16, author = {Prabhanjan Ananth and Aayush Jain and Moni Naor and Amit Sahai and Eylon Yogev}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {491--520}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_17}, doi = {10.1007/978-3-662-53008-5\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AnanthJNSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MilesSZ16, author = {Eric Miles and Amit Sahai and Mark Zhandry}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over {GGH13}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {629--658}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_22}, doi = {10.1007/978-3-662-53008-5\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MilesSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KhuranaMS16, author = {Dakshita Khurana and Hemanta K. Maji and Amit Sahai}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Secure Computation from Elastic Noisy Channels}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {184--212}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_7}, doi = {10.1007/978-3-662-49896-5\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KhuranaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KhuranaKMPS16, author = {Dakshita Khurana and Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {All Complete Functionalities are Reversible}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {213--242}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_8}, doi = {10.1007/978-3-662-49896-5\_8}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KhuranaKMPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadrinarayananM16, author = {Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {764--791}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_27}, doi = {10.1007/978-3-662-49896-5\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadrinarayananM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoyalIMSS16, author = {Vipul Goyal and Yuval Ishai and Hemanta K. Maji and Amit Sahai and Alexander A. Sherstov}, editor = {Irit Dinur}, title = {Bounded-Communication Leakage Resilience via Parity-Resilient Circuits}, booktitle = {{IEEE} 57th Annual Symposium on Foundations of Computer Science, {FOCS} 2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey, {USA}}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FOCS.2016.10}, doi = {10.1109/FOCS.2016.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoyalIMSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoyalKS16, author = {Vipul Goyal and Dakshita Khurana and Amit Sahai}, editor = {Irit Dinur}, title = {Breaking the Three Round Barrier for Non-malleable Commitments}, booktitle = {{IEEE} 57th Annual Symposium on Foundations of Computer Science, {FOCS} 2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey, {USA}}, pages = {21--30}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FOCS.2016.12}, doi = {10.1109/FOCS.2016.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoyalKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/GoyalKMPS16, author = {Vipul Goyal and Dakshita Khurana and Ilya Mironov and Omkant Pandey and Amit Sahai}, editor = {Ioannis Chatzigiannakis and Michael Mitzenmacher and Yuval Rabani and Davide Sangiorgi}, title = {Do Distributed Differentially-Private Protocols Require Oblivious Transfer?}, booktitle = {43rd International Colloquium on Automata, Languages, and Programming, {ICALP} 2016, July 11-15, 2016, Rome, Italy}, series = {LIPIcs}, volume = {55}, pages = {29:1--29:15}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2016}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2016.29}, doi = {10.4230/LIPICS.ICALP.2016.29}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/icalp/GoyalKMPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/AgrawalGS16, author = {Shweta Agrawal and Ran Gelles and Amit Sahai}, title = {Adaptive protocols for interactive communication}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2016, Barcelona, Spain, July 10-15, 2016}, pages = {595--599}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIT.2016.7541368}, doi = {10.1109/ISIT.2016.7541368}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/AgrawalGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AnanthS16, author = {Prabhanjan Vijendra Ananth and Amit Sahai}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Functional Encryption for Turing Machines}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {125--153}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_6}, doi = {10.1007/978-3-662-49096-9\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AnanthS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargMMSSZ16, author = {Sanjam Garg and Eric Miles and Pratyay Mukherjee and Amit Sahai and Akshayaram Srinivasan and Mark Zhandry}, editor = {Martin Hirt and Adam D. Smith}, title = {Secure Obfuscation in a Weak Multilinear Map Model}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {241--268}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_10}, doi = {10.1007/978-3-662-53644-5\_10}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GargMMSSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesSZ16, author = {Eric Miles and Amit Sahai and Mark Zhandry}, title = {Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over {GGH13}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2016}, url = {http://eprint.iacr.org/2016/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJNSY16, author = {Prabhanjan Ananth and Aayush Jain and Moni Naor and Amit Sahai and Eylon Yogev}, title = {Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2016}, url = {http://eprint.iacr.org/2016/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJNSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKPSY16, author = {Yuval Ishai and Eyal Kushilevitz and Manoj Prabhakaran and Amit Sahai and Ching{-}Hua Yu}, title = {Secure Protocol Transformations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2016}, url = {http://eprint.iacr.org/2016/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KraschewskiKMPS16, author = {Daniel Kraschewski and Dakshita Khurana and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai}, title = {All Complete Functionalities are Reversible}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {496}, year = {2016}, url = {http://eprint.iacr.org/2016/496}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KraschewskiKMPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaMS16, author = {Dakshita Khurana and Hemanta K. Maji and Amit Sahai}, title = {Secure Computation from Elastic Noisy Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2016}, url = {http://eprint.iacr.org/2016/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesSZ16a, author = {Eric Miles and Amit Sahai and Mark Zhandry}, title = {Secure obfuscation in a weak multilinear map model: {A} simple construction secure against all known attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2016}, url = {http://eprint.iacr.org/2016/588}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesSZ16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananG16, author = {Saikrishna Badrinarayanan and Vipul Goyal and Aayush Jain and Amit Sahai}, title = {Verifiable Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2016}, url = {http://eprint.iacr.org/2016/629}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMMSSZ16, author = {Sanjam Garg and Eric Miles and Pratyay Mukherjee and Amit Sahai and Akshayaram Srinivasan and Mark Zhandry}, title = {Secure Obfuscation in a Weak Multilinear Map Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {817}, year = {2016}, url = {http://eprint.iacr.org/2016/817}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMMSSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FernandoRS16, author = {Rex Fernando and Peter M. R. Rasmussen and Amit Sahai}, title = {Preventing {CLT} Zeroizing Attacks on Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1070}, year = {2016}, url = {http://eprint.iacr.org/2016/1070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FernandoRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthS16, author = {Prabhanjan Ananth and Amit Sahai}, title = {Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1097}, year = {2016}, url = {http://eprint.iacr.org/2016/1097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GentryGIPSS15, author = {Craig Gentry and Jens Groth and Yuval Ishai and Chris Peikert and Amit Sahai and Adam D. Smith}, title = {Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs}, journal = {J. Cryptol.}, volume = {28}, number = {4}, pages = {820--843}, year = {2015}, url = {https://doi.org/10.1007/s00145-014-9184-y}, doi = {10.1007/S00145-014-9184-Y}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GentryGIPSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GellesSW15, author = {Ran Gelles and Amit Sahai and Akshay Wadia}, title = {Private Interactive Communication Across an Adversarial Channel}, journal = {{IEEE} Trans. Inf. Theory}, volume = {61}, number = {12}, pages = {6860--6875}, year = {2015}, url = {https://doi.org/10.1109/TIT.2015.2483323}, doi = {10.1109/TIT.2015.2483323}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GellesSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Badrinarayanan015, author = {Saikrishna Badrinarayanan and Divya Gupta and Abhishek Jain and Amit Sahai}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Multi-input Functional Encryption for Unbounded Arity Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {27--51}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_2}, doi = {10.1007/978-3-662-48797-6\_2}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Badrinarayanan015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KhuranaRS15, author = {Dakshita Khurana and Vanishree Rao and Amit Sahai}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {52--75}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_3}, doi = {10.1007/978-3-662-48797-6\_3}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KhuranaRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Goyal0S15, author = {Vipul Goyal and Divya Gupta and Amit Sahai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Concurrent Secure Computation via Non-Black Box Simulation}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {23--42}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_2}, doi = {10.1007/978-3-662-48000-7\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Goyal0S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargIKOS15, author = {Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Cryptography with One-Way Communication}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {191--208}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_10}, doi = {10.1007/978-3-662-48000-7\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargIKOS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronGHLMM0ST15, author = {Jean{-}S{\'{e}}bastien Coron and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and their Limitations}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {247--266}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_12}, doi = {10.1007/978-3-662-47989-6\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronGHLMM0ST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001IMS15, author = {Divya Gupta and Yuval Ishai and Hemanta K. Maji and Amit Sahai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Secure Computation from Leaky Correlated Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {701--720}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_34}, doi = {10.1007/978-3-662-48000-7\_34}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0001IMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Boneh0MS15, author = {Dan Boneh and Divya Gupta and Ilya Mironov and Amit Sahai}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Hosting Services on an Untrusted Cloud}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {404--436}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_14}, doi = {10.1007/978-3-662-46803-6\_14}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Boneh0MS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehL0SZZ15, author = {Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {563--594}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_19}, doi = {10.1007/978-3-662-46803-6\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehL0SZZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GentryLSW15, author = {Craig Gentry and Allison Bishop Lewko and Amit Sahai and Brent Waters}, editor = {Venkatesan Guruswami}, title = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption}, booktitle = {{IEEE} 56th Annual Symposium on Foundations of Computer Science, {FOCS} 2015, Berkeley, CA, USA, 17-20 October, 2015}, pages = {151--170}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FOCS.2015.19}, doi = {10.1109/FOCS.2015.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GentryLSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalABKPS15, author = {Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai}, editor = {Jonathan Katz}, title = {On the Practical Security of Inner Product Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {777--798}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_35}, doi = {10.1007/978-3-662-46447-2\_35}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalABKPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalLPPS15, author = {Vipul Goyal and Huijia Lin and Omkant Pandey and Rafael Pass and Amit Sahai}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {260--289}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_12}, doi = {10.1007/978-3-662-46494-6\_12}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoyalLPPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Goyal0KS15, author = {Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Functional Encryption for Randomized Functionalities}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {325--351}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_13}, doi = {10.1007/978-3-662-46497-7\_13}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Goyal0KS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PandeyPS15, author = {Omkant Pandey and Manoj Prabhakaran and Amit Sahai}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for {NP}}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {638--667}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_25}, doi = {10.1007/978-3-662-46497-7\_25}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PandeyPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiPS15, author = {Yuval Ishai and Omkant Pandey and Amit Sahai}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Public-Coin Differing-Inputs Obfuscation and Its Applications}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {668--697}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_26}, doi = {10.1007/978-3-662-46497-7\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/IshaiPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinIPST15, author = {Daniel Genkin and Yuval Ishai and Manoj Prabhakaran and Amit Sahai and Eran Tromer}, title = {Circuits Resilient to Additive Attacks with Applications to Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2015}, url = {http://eprint.iacr.org/2015/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinIPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananM15, author = {Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry}, title = {Post-Zeroizing Obfuscation: The case of Evasive Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2015}, url = {http://eprint.iacr.org/2015/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronGHLMM0ST15, author = {Jean{-}S{\'{e}}bastien Coron and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi}, title = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and Their Limitations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {596}, year = {2015}, url = {http://eprint.iacr.org/2015/596}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronGHLMM0ST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJS15, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, title = {Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {730}, year = {2015}, url = {http://eprint.iacr.org/2015/730}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthS15, author = {Prabhanjan Ananth and Amit Sahai}, title = {Functional Encryption for Turing Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {776}, year = {2015}, url = {http://eprint.iacr.org/2015/776}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PanethS15, author = {Omer Paneth and Amit Sahai}, title = {On the Equivalence of Obfuscation and Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {791}, year = {2015}, url = {http://eprint.iacr.org/2015/791}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PanethS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrakerskiGHLST15, author = {Zvika Brakerski and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Amit Sahai and Mehdi Tibouchi}, title = {Cryptanalysis of the Quadratic Zero-Testing of {GGH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2015}, url = {http://eprint.iacr.org/2015/845}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrakerskiGHLST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranGJS15, author = {Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai}, title = {Functional Encryption: Decentralised and Delegatable}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1017}, year = {2015}, url = {http://eprint.iacr.org/2015/1017}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranGJS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJS15a, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, title = {Indistinguishability Obfuscation with Constant Size Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1023}, year = {2015}, url = {http://eprint.iacr.org/2015/1023}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthJS15b, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, title = {Patchable Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1084}, year = {2015}, url = {http://eprint.iacr.org/2015/1084}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthJS15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKMPS15, author = {Vipul Goyal and Dakshita Khurana and Ilya Mironov and Omkant Pandey and Amit Sahai}, title = {Do Distributed Differentially-Private Protocols Require Oblivious Transfer?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1090}, year = {2015}, url = {http://eprint.iacr.org/2015/1090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKMPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal0S15, author = {Vipul Goyal and Divya Gupta and Amit Sahai}, title = {Concurrent Secure Computation via Non-Black Box Simulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1107}, year = {2015}, url = {http://eprint.iacr.org/2015/1107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal0S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Badrinarayanan015, author = {Saikrishna Badrinarayanan and Divya Gupta and Abhishek Jain and Amit Sahai}, title = {Multi-Input Functional Encryption for Unbounded Arity Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1136}, year = {2015}, url = {http://eprint.iacr.org/2015/1136}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Badrinarayanan015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/HormozdiariJWGOSE14, author = {Farhad Hormozdiari and Jong Wha J. Joo and Akshay Wadia and Feng Guan and Rafail Ostrovsky and Amit Sahai and Eleazar Eskin}, title = {Privacy preserving protocol for detecting genetic relatives using rare variants}, journal = {Bioinform.}, volume = {30}, number = {12}, pages = {204--211}, year = {2014}, url = {https://doi.org/10.1093/bioinformatics/btu294}, doi = {10.1093/BIOINFORMATICS/BTU294}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/HormozdiariJWGOSE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GellesMS14, author = {Ran Gelles and Ankur Moitra and Amit Sahai}, title = {Efficient Coding for Interactive Communication}, journal = {{IEEE} Trans. Inf. Theory}, volume = {60}, number = {3}, pages = {1899--1913}, year = {2014}, url = {https://doi.org/10.1109/TIT.2013.2294186}, doi = {10.1109/TIT.2013.2294186}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GellesMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KhuranaMS14, author = {Dakshita Khurana and Hemanta K. Maji and Amit Sahai}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Black-Box Separations for Differentially Private Protocols}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {386--405}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_21}, doi = {10.1007/978-3-662-45608-8\_21}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KhuranaMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AnanthGIS14, author = {Prabhanjan Vijendra Ananth and Divya Gupta and Yuval Ishai and Amit Sahai}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Optimizing Obfuscation: Avoiding Barrington's Theorem}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {646--658}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660342}, doi = {10.1145/2660267.2660342}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AnanthGIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerSW14, author = {Susan Hohenberger and Amit Sahai and Brent Waters}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {201--220}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_12}, doi = {10.1007/978-3-642-55220-5\_12}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BarakGKPS14, author = {Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Protecting Obfuscation against Algebraic Attacks}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {221--238}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_13}, doi = {10.1007/978-3-642-55220-5\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BarakGKPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoldwasserGG0KLSSZ14, author = {Shafi Goldwasser and S. Dov Gordon and Vipul Goyal and Abhishek Jain and Jonathan Katz and Feng{-}Hao Liu and Amit Sahai and Elaine Shi and Hong{-}Sheng Zhou}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Multi-input Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {578--602}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_32}, doi = {10.1007/978-3-642-55220-5\_32}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoldwasserGG0KLSSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KraschewskiMPS14, author = {Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {A Full Characterization of Completeness for Two-Party Randomized Function Evaluation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {659--676}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_36}, doi = {10.1007/978-3-642-55220-5\_36}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KraschewskiMPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/PrabhakaranSW14, author = {Manoj Prabhakaran and Amit Sahai and Akshay Wadia}, editor = {Javier Esparza and Pierre Fraigniaud and Thore Husfeldt and Elias Koutsoupias}, title = {Secure Computation Using Leaky Tokens}, booktitle = {Automata, Languages, and Programming - 41st International Colloquium, {ICALP} 2014, Copenhagen, Denmark, July 8-11, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8572}, pages = {907--918}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43948-7\_75}, doi = {10.1007/978-3-662-43948-7\_75}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/PrabhakaranSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GuptaS14, author = {Divya Gupta and Amit Sahai}, editor = {Willi Meier and Debdeep Mukhopadhyay}, title = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8885}, pages = {71--88}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13039-2\_5}, doi = {10.1007/978-3-319-13039-2\_5}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GuptaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/GellesSW14, author = {Ran Gelles and Amit Sahai and Akshay Wadia}, editor = {Moni Naor}, title = {Private interactive communication across an adversarial channel}, booktitle = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ, USA, January 12-14, 2014}, pages = {135--144}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554797.2554812}, doi = {10.1145/2554797.2554812}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/GellesSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/IshaiMSW14, author = {Yuval Ishai and Hemanta K. Maji and Amit Sahai and J{\"{u}}rg Wullschleger}, title = {Single-use ot combiners with near-optimal resilience}, booktitle = {2014 {IEEE} International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014}, pages = {1544--1548}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ISIT.2014.6875092}, doi = {10.1109/ISIT.2014.6875092}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/IshaiMSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/SahaiW14, author = {Amit Sahai and Brent Waters}, editor = {David B. Shmoys}, title = {How to use indistinguishability obfuscation: deniable encryption, and more}, booktitle = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA, May 31 - June 03, 2014}, pages = {475--484}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2591796.2591825}, doi = {10.1145/2591796.2591825}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/SahaiW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GenkinIPST14, author = {Daniel Genkin and Yuval Ishai and Manoj Prabhakaran and Amit Sahai and Eran Tromer}, editor = {David B. Shmoys}, title = {Circuits resilient to additive attacks with applications to secure computation}, booktitle = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA, May 31 - June 03, 2014}, pages = {495--504}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2591796.2591861}, doi = {10.1145/2591796.2591861}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GenkinIPST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BarakBCKPS14, author = {Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai}, editor = {Yehuda Lindell}, title = {Obfuscation for Evasive Functions}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {26--51}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_2}, doi = {10.1007/978-3-642-54242-8\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BarakBCKPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/OrlandiORSV14, author = {Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti}, editor = {Yehuda Lindell}, title = {Statistical Concurrent Non-malleable Zero Knowledge}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {167--191}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_8}, doi = {10.1007/978-3-642-54242-8\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/OrlandiORSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KraschewskiMPS14, author = {Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai}, title = {A Full Characterization of Completeness for Two-party Randomized Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2014}, url = {http://eprint.iacr.org/2014/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KraschewskiMPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrlandiORSV14, author = {Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti}, title = {Statistical Concurrent Non-Malleable Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2014}, url = {http://eprint.iacr.org/2014/143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrlandiORSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthGIS14, author = {Prabhanjan Ananth and Divya Gupta and Yuval Ishai and Amit Sahai}, title = {Optimizing Obfuscation: Avoiding Barrington's Theorem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2014}, url = {http://eprint.iacr.org/2014/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthGIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryLSW14, author = {Craig Gentry and Allison B. Lewko and Amit Sahai and Brent Waters}, title = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2014}, url = {http://eprint.iacr.org/2014/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryLSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaSW14, author = {Dakshita Khurana and Amit Sahai and Brent Waters}, title = {How to Generate and use Universal Parameters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2014}, url = {http://eprint.iacr.org/2014/507}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiZ14, author = {Amit Sahai and Mark Zhandry}, title = {Obfuscating Low-Rank Matrix Branching Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {773}, year = {2014}, url = {http://eprint.iacr.org/2014/773}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehLRSZZ14, author = {Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman}, title = {Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {834}, year = {2014}, url = {http://eprint.iacr.org/2014/834}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehLRSZZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesSW14, author = {Eric Miles and Amit Sahai and Mor Weiss}, title = {Protecting obfuscation against arithmetic attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {878}, year = {2014}, url = {http://eprint.iacr.org/2014/878}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargIKOS14, author = {Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Cryptography with One-Way Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {914}, year = {2014}, url = {http://eprint.iacr.org/2014/914}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargIKOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryHMS14, author = {Craig Gentry and Shai Halevi and Hemanta K. Maji and Amit Sahai}, title = {Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {929}, year = {2014}, url = {http://eprint.iacr.org/2014/929}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryHMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiPS14, author = {Yuval Ishai and Omkant Pandey and Amit Sahai}, title = {Public-Coin Differing-Inputs Obfuscation and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {942}, year = {2014}, url = {http://eprint.iacr.org/2014/942}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaMS14, author = {Dakshita Khurana and Hemanta K. Maji and Amit Sahai}, title = {Black Box Separations for Differentially Private Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {957}, year = {2014}, url = {http://eprint.iacr.org/2014/957}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KatzSW13, author = {Jonathan Katz and Amit Sahai and Brent Waters}, title = {Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products}, journal = {J. Cryptol.}, volume = {26}, number = {2}, pages = {191--224}, year = {2013}, url = {https://doi.org/10.1007/s00145-012-9119-4}, doi = {10.1007/S00145-012-9119-4}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KatzSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LuOSSW13, author = {Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav Shacham and Brent Waters}, title = {Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles}, journal = {J. Cryptol.}, volume = {26}, number = {2}, pages = {340--373}, year = {2013}, url = {https://doi.org/10.1007/s00145-012-9126-5}, doi = {10.1007/S00145-012-9126-5}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LuOSSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/approx/IshaiSVW13, author = {Yuval Ishai and Amit Sahai and Michael Viderman and Mor Weiss}, editor = {Prasad Raghavendra and Sofya Raskhodnikova and Klaus Jansen and Jos{\'{e}} D. P. Rolim}, title = {Zero Knowledge LTCs and Their Applications}, booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 16th International Workshop, {APPROX} 2013, and 17th International Workshop, {RANDOM} 2013, Berkeley, CA, USA, August 21-23, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8096}, pages = {607--622}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40328-6\_42}, doi = {10.1007/978-3-642-40328-6\_42}, timestamp = {Tue, 21 Sep 2021 09:36:24 +0200}, biburl = {https://dblp.org/rec/conf/approx/IshaiSVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AgrawalGHS13, author = {Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai}, editor = {Kazue Sako and Palash Sarkar}, title = {Discrete Gaussian Leftover Hash Lemma over Infinite Domains}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {97--116}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_6}, doi = {10.1007/978-3-642-42033-7\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AgrawalGHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentrySW13, author = {Craig Gentry and Amit Sahai and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {75--92}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_5}, doi = {10.1007/978-3-642-40041-4\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentrySW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalMPS13, author = {Vipul Goyal and Ilya Mironov and Omkant Pandey and Amit Sahai}, editor = {Ran Canetti and Juan A. Garay}, title = {Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {298--315}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_17}, doi = {10.1007/978-3-642-40041-4\_17}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoyalMPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyleG0KS13, author = {Elette Boyle and Sanjam Garg and Abhishek Jain and Yael Tauman Kalai and Amit Sahai}, editor = {Ran Canetti and Juan A. Garay}, title = {Secure Computation against Adaptive Auxiliary Information}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {316--334}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_18}, doi = {10.1007/978-3-642-40041-4\_18}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyleG0KS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargGHSW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {479--499}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_27}, doi = {10.1007/978-3-642-40084-1\_27}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargGHSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HohenbergerSW13, author = {Susan Hohenberger and Amit Sahai and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {494--512}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_27}, doi = {10.1007/978-3-642-40041-4\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HohenbergerSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GargGH0SW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits}, booktitle = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2013, 26-29 October, 2013, Berkeley, CA, {USA}}, pages = {40--49}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FOCS.2013.13}, doi = {10.1109/FOCS.2013.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GargGH0SW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/IshaiKLOPSZ13, author = {Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman}, editor = {Fedor V. Fomin and Rusins Freivalds and Marta Z. Kwiatkowska and David Peleg}, title = {Robust Pseudorandom Generators}, booktitle = {Automata, Languages, and Programming - 40th International Colloquium, {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {7965}, pages = {576--588}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39206-1\_49}, doi = {10.1007/978-3-642-39206-1\_49}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/IshaiKLOPSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GargGSW13, author = {Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters}, editor = {Dan Boneh and Tim Roughgarden and Joan Feigenbaum}, title = {Witness encryption and its applications}, booktitle = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013}, pages = {467--476}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488608.2488667}, doi = {10.1145/2488608.2488667}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/GargGSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ciss/0002S13, author = {Abhishek Jain and Amit Sahai}, editor = {Manoj Prabhakaran and Amit Sahai}, title = {The {IPS} Compiler}, booktitle = {Secure Multi-Party Computation}, series = {Cryptology and Information Security Series}, volume = {10}, pages = {201--221}, publisher = {{IOS} Press}, year = {2013}, url = {https://doi.org/10.3233/978-1-61499-169-4-201}, doi = {10.3233/978-1-61499-169-4-201}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ciss/0002S13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2013, editor = {Amit Sahai}, title = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2}, doi = {10.1007/978-3-642-36594-2}, isbn = {978-3-642-36593-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:series/ciss/2013-10, editor = {Manoj Prabhakaran and Amit Sahai}, title = {Secure Multi-Party Computation}, series = {Cryptology and Information Security Series}, volume = {10}, publisher = {{IOS} Press}, year = {2013}, isbn = {978-1-61499-168-7}, timestamp = {Mon, 16 Mar 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ciss/2013-10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AgrawalGS13, author = {Shweta Agrawal and Ran Gelles and Amit Sahai}, title = {Adaptive Protocols for Interactive Communication}, journal = {CoRR}, volume = {abs/1312.4182}, year = {2013}, url = {http://arxiv.org/abs/1312.4182}, eprinttype = {arXiv}, eprint = {1312.4182}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AgrawalGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/IshaiKLOPSZ13, author = {Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman}, title = {Robust Pseudorandom Generators}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR13-143}}, year = {2013}, url = {https://eccc.weizmann.ac.il/report/2013/143}, eprinttype = {ECCC}, eprint = {TR13-143}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/IshaiKLOPSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGHSW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2013}, url = {http://eprint.iacr.org/2013/128}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGHSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGSW13, author = {Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters}, title = {Witness Encryption and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2013}, url = {http://eprint.iacr.org/2013/258}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GellesSW13, author = {Ran Gelles and Amit Sahai and Akshay Wadia}, title = {Private Interactive Communication Across an Adversarial Channel}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2013}, url = {http://eprint.iacr.org/2013/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GellesSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentrySW13, author = {Craig Gentry and Amit Sahai and Brent Waters}, title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2013}, url = {http://eprint.iacr.org/2013/340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentrySW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerSW13, author = {Susan Hohenberger and Amit Sahai and Brent Waters}, title = {Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2013}, url = {http://eprint.iacr.org/2013/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGH0SW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2013}, url = {http://eprint.iacr.org/2013/451}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGH0SW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiW13, author = {Amit Sahai and Brent Waters}, title = {How to Use Indistinguishability Obfuscation: Deniable Encryption, and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2013}, url = {http://eprint.iacr.org/2013/454}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerSW13a, author = {Susan Hohenberger and Amit Sahai and Brent Waters}, title = {Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2013}, url = {http://eprint.iacr.org/2013/509}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerSW13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakGKPS13, author = {Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai}, title = {Protecting Obfuscation Against Algebraic Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2013}, url = {http://eprint.iacr.org/2013/631}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakGKPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakBCKPS13, author = {Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai}, title = {Obfuscation for Evasive Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2013}, url = {http://eprint.iacr.org/2013/668}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakBCKPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKLOPSZ13, author = {Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman}, title = {Robust Pseudorandom Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {671}, year = {2013}, url = {http://eprint.iacr.org/2013/671}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKLOPSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthBGSZ13, author = {Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry}, title = {Differing-Inputs Obfuscation and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {689}, year = {2013}, url = {http://eprint.iacr.org/2013/689}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthBGSZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldwasserG0S13, author = {Shafi Goldwasser and Vipul Goyal and Abhishek Jain and Amit Sahai}, title = {Multi-Input Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {727}, year = {2013}, url = {http://eprint.iacr.org/2013/727}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldwasserG0S13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal0KS13, author = {Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai}, title = {Functional Encryption for Randomized Functionalities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {729}, year = {2013}, url = {http://eprint.iacr.org/2013/729}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal0KS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalABKPS13, author = {Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai}, title = {Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {744}, year = {2013}, url = {http://eprint.iacr.org/2013/744}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalABKPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PandeyPS13, author = {Omkant Pandey and Manoj Prabhakaran and Amit Sahai}, title = {Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for {NP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2013}, url = {http://eprint.iacr.org/2013/754}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PandeyPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BonehSW12, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Functional encryption: a new vision for public-key cryptography}, journal = {Commun. {ACM}}, volume = {55}, number = {11}, pages = {56--64}, year = {2012}, url = {https://doi.org/10.1145/2366316.2366333}, doi = {10.1145/2366316.2366333}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BonehSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/BarakGIRSVY12, author = {Boaz Barak and Oded Goldreich and Russell Impagliazzo and Steven Rudich and Amit Sahai and Salil P. Vadhan and Ke Yang}, title = {On the (im)possibility of obfuscating programs}, journal = {J. {ACM}}, volume = {59}, number = {2}, pages = {6:1--6:48}, year = {2012}, url = {https://doi.org/10.1145/2160158.2160159}, doi = {10.1145/2160158.2160159}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/BarakGIRSVY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/GrothOS12, author = {Jens Groth and Rafail Ostrovsky and Amit Sahai}, title = {New Techniques for Noninteractive Zero-Knowledge}, journal = {J. {ACM}}, volume = {59}, number = {3}, pages = {11:1--11:35}, year = {2012}, url = {https://doi.org/10.1145/2220357.2220358}, doi = {10.1145/2220357.2220358}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/GrothOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/GrothS12, author = {Jens Groth and Amit Sahai}, title = {Efficient Noninteractive Proof Systems for Bilinear Groups}, journal = {{SIAM} J. Comput.}, volume = {41}, number = {5}, pages = {1193--1232}, year = {2012}, url = {https://doi.org/10.1137/080725386}, doi = {10.1137/080725386}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/GrothS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargS12, author = {Sanjam Garg and Amit Sahai}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Adaptively Secure Multi-Party Computation with Dishonest Majority}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {105--123}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_8}, doi = {10.1007/978-3-642-32009-5\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SahaiSW12, author = {Amit Sahai and Hakan Seyalioglu and Brent Waters}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {199--217}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_13}, doi = {10.1007/978-3-642-32009-5\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SahaiSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalGJPS12, author = {Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {443--460}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_26}, doi = {10.1007/978-3-642-32009-5\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalGJPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargG0S12, author = {Sanjam Garg and Vipul Goyal and Abhishek Jain and Amit Sahai}, editor = {David Pointcheval and Thomas Johansson}, title = {Concurrently Secure Computation in Constant Rounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {99--116}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_8}, doi = {10.1007/978-3-642-29011-4\_8}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargG0S12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/Sahai12, author = {Amit Sahai}, title = {An information-theoretic protocol compiler}, booktitle = {2012 {IEEE} Information Theory Workshop, Lausanne, Switzerland, September 3-7, 2012}, pages = {1--4}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ITW.2012.6404657}, doi = {10.1109/ITW.2012.6404657}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/Sahai12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiMS12, author = {Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, editor = {Ronald Cramer}, title = {On Efficient Zero-Knowledge PCPs}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {151--168}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_9}, doi = {10.1007/978-3-642-28914-9\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/IshaiMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-3719, author = {Divya Gupta and Amit Sahai}, title = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption}, journal = {CoRR}, volume = {abs/1210.3719}, year = {2012}, url = {http://arxiv.org/abs/1210.3719}, eprinttype = {arXiv}, eprint = {1210.3719}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-3719.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-5287, author = {Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, journal = {CoRR}, volume = {abs/1210.5287}, year = {2012}, url = {http://arxiv.org/abs/1210.5287}, eprinttype = {arXiv}, eprint = {1210.5287}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-5287.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiSW12, author = {Amit Sahai and Hakan Seyalioglu and Brent Waters}, title = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2012}, url = {http://eprint.iacr.org/2012/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargS12, author = {Sanjam Garg and Amit Sahai}, title = {Adaptively Secure Multi-Party Computation with Dishonest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2012}, url = {http://eprint.iacr.org/2012/441}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalG0PS12, author = {Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai}, title = {New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2012}, url = {http://eprint.iacr.org/2012/555}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalG0PS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaS12, author = {Divya Gupta and Amit Sahai}, title = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2012}, url = {http://eprint.iacr.org/2012/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuptaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiW12, author = {Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2012}, url = {http://eprint.iacr.org/2012/592}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalPS12, author = {Vipul Goyal and Omkant Pandey and Amit Sahai}, title = {Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {652}, year = {2012}, url = {http://eprint.iacr.org/2012/652}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGHS12, author = {Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai}, title = {Sampling Discrete Gaussians Efficiently and Obliviously}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {714}, year = {2012}, url = {http://eprint.iacr.org/2012/714}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DengFGLSY11, author = {Yi Deng and Dengguo Feng and Vipul Goyal and Dongdai Lin and Amit Sahai and Moti Yung}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {390--406}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_21}, doi = {10.1007/978-3-642-25385-0\_21}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/DengFGLSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargJS11, author = {Sanjam Garg and Abhishek Jain and Amit Sahai}, editor = {Phillip Rogaway}, title = {Leakage-Resilient Zero Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {297--315}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_17}, doi = {10.1007/978-3-642-22792-9\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiKS11, author = {Yael Tauman Kalai and Bhavana Kanukurthi and Amit Sahai}, editor = {Phillip Rogaway}, title = {Cryptography with Tamperable and Leaky Memory}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {373--390}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_21}, doi = {10.1007/978-3-642-22792-9\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargRSSU11, author = {Sanjam Garg and Vanishree Rao and Amit Sahai and Dominique Schr{\"{o}}der and Dominique Unruh}, editor = {Phillip Rogaway}, title = {Round Optimal Blind Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {630--648}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_36}, doi = {10.1007/978-3-642-22792-9\_36}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargRSSU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiKOPSW11, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and J{\"{u}}rg Wullschleger}, editor = {Phillip Rogaway}, title = {Constant-Rate Oblivious Transfer from Noisy Channels}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {667--684}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_38}, doi = {10.1007/978-3-642-22792-9\_38}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiKOPSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiKOPS11, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai}, editor = {Kenneth G. Paterson}, title = {Efficient Non-interactive Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {406--425}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_23}, doi = {10.1007/978-3-642-20465-4\_23}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiKOPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GellesMS11, author = {Ran Gelles and Ankur Moitra and Amit Sahai}, editor = {Rafail Ostrovsky}, title = {Efficient and Explicit Coding for Interactive Communication}, booktitle = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS} 2011, Palm Springs, CA, USA, October 22-25, 2011}, pages = {768--777}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FOCS.2011.51}, doi = {10.1109/FOCS.2011.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GellesMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SahaiS11, author = {Amit Sahai and Hakan Seyalioglu}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Fully Secure Accountable-Authority Identity-Based Encryption}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {296--316}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_19}, doi = {10.1007/978-3-642-19379-8\_19}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SahaiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BonehSW11, author = {Dan Boneh and Amit Sahai and Brent Waters}, editor = {Yuval Ishai}, title = {Functional Encryption: Definitions and Challenges}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {253--273}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_16}, doi = {10.1007/978-3-642-19571-6\_16}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BonehSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargGJS11, author = {Sanjam Garg and Vipul Goyal and Abhishek Jain and Amit Sahai}, editor = {Yuval Ishai}, title = {Bringing People of Different Beliefs Together to Do {UC}}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {311--328}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_19}, doi = {10.1007/978-3-642-19571-6\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GargGJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1104-0739, author = {Ran Gelles and Amit Sahai}, title = {Potent Tree Codes and their applications: Coding for Interactive Communication, revisited}, journal = {CoRR}, volume = {abs/1104.0739}, year = {2011}, url = {http://arxiv.org/abs/1104.0739}, eprinttype = {arXiv}, eprint = {1104.0739}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1104-0739.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGJS11, author = {Sanjam Garg and Vipul Goyal and Abhishek Jain and Amit Sahai}, title = {Concurrently Secure Computation in Constant Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2011}, url = {http://eprint.iacr.org/2011/251}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DengFGLSY11, author = {Yi Deng and Dengguo Feng and Vipul Goyal and Dongdai Lin and Amit Sahai and Moti Yung}, title = {Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {408}, year = {2011}, url = {http://eprint.iacr.org/2011/408}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DengFGLSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/IshaiKOS10, author = {Yuval Ishai and Abishek Kumarasubramanian and Claudio Orlandi and Amit Sahai}, editor = {Masayuki Abe}, title = {On Invertible Sampling and Adaptive Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {466--482}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_27}, doi = {10.1007/978-3-642-17373-8\_27}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/IshaiKOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GargKSW10, author = {Sanjam Garg and Abishek Kumarasubramanian and Amit Sahai and Brent Waters}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Building efficient fully collusion-resilient traitor tracing and revocation schemes}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {121--130}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866322}, doi = {10.1145/1866307.1866322}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GargKSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SahaiS10, author = {Amit Sahai and Hakan Seyalioglu}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Worry-free encryption: functional encryption with public keys}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {463--472}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866359}, doi = {10.1145/1866307.1866359}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SahaiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalIMS10, author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, editor = {Tal Rabin}, title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {173--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_10}, doi = {10.1007/978-3-642-14623-7\_10}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GoyalIMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoOSTW10, author = {Allison B. Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters}, editor = {Henri Gilbert}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {62--91}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_4}, doi = {10.1007/978-3-642-13190-5\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoOSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/MajiPS10, author = {Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai}, title = {On the Computational Complexity of Coin Flipping}, booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2010, October 23-26, 2010, Las Vegas, Nevada, {USA}}, pages = {613--622}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FOCS.2010.64}, doi = {10.1109/FOCS.2010.64}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/MajiPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LewkoSW10, author = {Allison B. Lewko and Amit Sahai and Brent Waters}, title = {Revocation Systems with Very Small Private Keys}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {273--285}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.23}, doi = {10.1109/SP.2010.23}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/LewkoSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GordonIMOS10, author = {S. Dov Gordon and Yuval Ishai and Tal Moran and Rafail Ostrovsky and Amit Sahai}, editor = {Daniele Micciancio}, title = {On Complete Primitives for Fairness}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {91--108}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_7}, doi = {10.1007/978-3-642-11799-2\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GordonIMOS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalISVW10, author = {Vipul Goyal and Yuval Ishai and Amit Sahai and Ramarathnam Venkatesan and Akshay Wadia}, editor = {Daniele Micciancio}, title = {Founding Cryptography on Tamper-Proof Hardware Tokens}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {308--326}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_19}, doi = {10.1007/978-3-642-11799-2\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoyalISVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GoyalIMS10, author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR10-020}}, year = {2010}, url = {https://eccc.weizmann.ac.il/report/2010/020}, eprinttype = {ECCC}, eprint = {TR10-020}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GoyalIMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalIMS10, author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {89}, year = {2010}, url = {http://eprint.iacr.org/2010/089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalIMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoOSTW10, author = {Allison B. Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2010}, url = {http://eprint.iacr.org/2010/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoOSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalISVW10, author = {Vipul Goyal and Yuval Ishai and Amit Sahai and Ramarathnam Venkatesan and Akshay Wadia}, title = {Founding Cryptography on Tamper-Proof Hardware Tokens}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {153}, year = {2010}, url = {http://eprint.iacr.org/2010/153}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalISVW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehSW10, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Functional Encryption: Definitions and Challenges}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2010}, url = {http://eprint.iacr.org/2010/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/AaronsonGKMMS09, author = {Scott Aaronson and Sudipto Guha and Jon M. Kleinberg and Frank McSherry and Dieter van Melkebeek and Amit Sahai}, title = {Special Issue On The Thirty-Eighth Annual {ACM} Symposium On Theory Of Computing {(STOC} 2006)}, journal = {{SIAM} J. Comput.}, volume = {39}, number = {1}, pages = {vii}, year = {2009}, url = {https://doi.org/10.1137/SMJCAT000039000001000vii000001}, doi = {10.1137/SMJCAT000039000001000VII000001}, timestamp = {Mon, 13 Mar 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/AaronsonGKMMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/IshaiKOS09, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Zero-Knowledge Proofs from Secure Multiparty Computation}, journal = {{SIAM} J. Comput.}, volume = {39}, number = {3}, pages = {1121--1152}, year = {2009}, url = {https://doi.org/10.1137/080725398}, doi = {10.1137/080725398}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/IshaiKOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumCPS09, author = {Benny Applebaum and David Cash and Chris Peikert and Amit Sahai}, editor = {Shai Halevi}, title = {Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {595--618}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_35}, doi = {10.1007/978-3-642-03356-8\_35}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumCPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoyalS09, author = {Vipul Goyal and Amit Sahai}, editor = {Antoine Joux}, title = {Resettably Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {54--71}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_3}, doi = {10.1007/978-3-642-01001-9\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoyalS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DengGS09, author = {Yi Deng and Vipul Goyal and Amit Sahai}, title = {Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy}, booktitle = {50th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2009, October 25-27, 2009, Atlanta, Georgia, {USA}}, pages = {251--260}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FOCS.2009.59}, doi = {10.1109/FOCS.2009.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DengGS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/IshaiKOS09, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Extracting Correlations}, booktitle = {50th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2009, October 25-27, 2009, Atlanta, Georgia, {USA}}, pages = {261--270}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FOCS.2009.56}, doi = {10.1109/FOCS.2009.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/IshaiKOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/IshaiPS09, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai}, editor = {Omer Reingold}, title = {Secure Arithmetic Computation with No Honest Majority}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {294--314}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_18}, doi = {10.1007/978-3-642-00457-5\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/IshaiPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ciss/SahaiWL09, author = {Amit Sahai and Brent Waters and Steve Lu}, editor = {Marc Joye and Gregory Neven}, title = {Attribute-Based Encryption}, booktitle = {Identity-Based Cryptography}, series = {Cryptology and Information Security Series}, volume = {2}, pages = {156--168}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-58603-947-9-156}, doi = {10.3233/978-1-58603-947-9-156}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ciss/SahaiWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargKSW09, author = {Sanjam Garg and Abishek Kumarasubramanian and Amit Sahai and Brent Waters}, title = {Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {532}, year = {2009}, url = {http://eprint.iacr.org/2009/532}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargKSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/talg/ChandranMOPSS08, author = {Nishanth Chandran and Ryan Moriarty and Rafail Ostrovsky and Omkant Pandey and Mohammad Ali Safari and Amit Sahai}, title = {Improved algorithms for optimal embeddings}, journal = {{ACM} Trans. Algorithms}, volume = {4}, number = {4}, pages = {45:1--45:14}, year = {2008}, url = {https://doi.org/10.1145/1383369.1383376}, doi = {10.1145/1383369.1383376}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/talg/ChandranMOPSS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoyalLSW08, author = {Vipul Goyal and Steve Lu and Amit Sahai and Brent Waters}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Black-box accountable authority identity-based encryption}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {427--436}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455824}, doi = {10.1145/1455770.1455824}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoyalLSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiPS08, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai}, editor = {David A. Wagner}, title = {Founding Cryptography on Oblivious Transfer - Efficiently}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {572--591}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_32}, doi = {10.1007/978-3-540-85174-5\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KatzSW08, author = {Jonathan Katz and Amit Sahai and Brent Waters}, editor = {Nigel P. Smart}, title = {Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {146--162}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_9}, doi = {10.1007/978-3-540-78967-3\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KatzSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PandeyPSTV08, author = {Omkant Pandey and Rafael Pass and Amit Sahai and Wei{-}Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam}, editor = {Nigel P. Smart}, title = {Precise Concurrent Zero Knowledge}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {397--414}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_23}, doi = {10.1007/978-3-540-78967-3\_23}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PandeyPSTV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrothS08, author = {Jens Groth and Amit Sahai}, editor = {Nigel P. Smart}, title = {Efficient Non-interactive Proof Systems for Bilinear Groups}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {415--432}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_24}, doi = {10.1007/978-3-540-78967-3\_24}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrothS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChandranGS08, author = {Nishanth Chandran and Vipul Goyal and Amit Sahai}, editor = {Nigel P. Smart}, title = {New Constructions for {UC} Secure Computation Using Tamper-Proof Hardware}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {545--562}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_31}, doi = {10.1007/978-3-540-78967-3\_31}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChandranGS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/GoyalJPS08, author = {Vipul Goyal and Abhishek Jain and Omkant Pandey and Amit Sahai}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Bounded Ciphertext Policy Attribute Based Encryption}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {579--591}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_47}, doi = {10.1007/978-3-540-70583-3\_47}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/GoyalJPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/Sahai08, author = {Amit Sahai}, editor = {R. Sekar and Arun K. Pujari}, title = {Computing on Encrypted Data}, booktitle = {Information Systems Security, 4th International Conference, {ICISS} 2008, Hyderabad, India, December 16-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5352}, pages = {148--153}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89862-7\_12}, doi = {10.1007/978-3-540-89862-7\_12}, timestamp = {Thu, 18 Nov 2021 17:21:37 +0100}, biburl = {https://dblp.org/rec/conf/iciss/Sahai08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/IshaiKOS08, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, editor = {Cynthia Dwork}, title = {Cryptography with constant computational overhead}, booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008}, pages = {433--442}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374376.1374438}, doi = {10.1145/1374376.1374438}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/IshaiKOS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0811-0475, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai}, title = {Secure Arithmetic Computation with No Honest Majority}, journal = {CoRR}, volume = {abs/0811.0475}, year = {2008}, url = {http://arxiv.org/abs/0811.0475}, eprinttype = {arXiv}, eprint = {0811.0475}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0811-0475.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoSW08, author = {Allison B. Lewko and Amit Sahai and Brent Waters}, title = {Revocation Systems with Very Small Private Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2008}, url = {http://eprint.iacr.org/2008/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiPS08, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai}, title = {Secure Arithmetic Computation with No Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {465}, year = {2008}, url = {http://eprint.iacr.org/2008/465}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalS08, author = {Vipul Goyal and Amit Sahai}, title = {Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {545}, year = {2008}, url = {http://eprint.iacr.org/2008/545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GoyalMOS07, author = {Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky and Amit Sahai}, editor = {Kaoru Kurosawa}, title = {Concurrent Statistical Zero-Knowledge Arguments for {NP} from One Way Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {444--459}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_27}, doi = {10.1007/978-3-540-76900-2\_27}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GoyalMOS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OstrovskySW07, author = {Rafail Ostrovsky and Amit Sahai and Brent Waters}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Attribute-based encryption with non-monotonic access structures}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {195--203}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315270}, doi = {10.1145/1315245.1315270}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OstrovskySW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/ChandranGOS07, author = {Nishanth Chandran and Vipul Goyal and Rafail Ostrovsky and Amit Sahai}, title = {Covert Multi-Party Computation}, booktitle = {48th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2007), October 20-23, 2007, Providence, RI, USA, Proceedings}, pages = {238--248}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FOCS.2007.21}, doi = {10.1109/FOCS.2007.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/ChandranGOS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/OstrovskyPS07, author = {Rafail Ostrovsky and Omkant Pandey and Amit Sahai}, editor = {Lars Arge and Christian Cachin and Tomasz Jurdzinski and Andrzej Tarlecki}, title = {Private Locally Decodable Codes}, booktitle = {Automata, Languages and Programming, 34th International Colloquium, {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4596}, pages = {387--398}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73420-8\_35}, doi = {10.1007/978-3-540-73420-8\_35}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/OstrovskyPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/ChandranGS07, author = {Nishanth Chandran and Jens Groth and Amit Sahai}, editor = {Lars Arge and Christian Cachin and Tomasz Jurdzinski and Andrzej Tarlecki}, title = {Ring Signatures of Sub-linear Size Without Random Oracles}, booktitle = {Automata, Languages and Programming, 34th International Colloquium, {ICALP} 2007, Wroclaw, Poland, July 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4596}, pages = {423--434}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73420-8\_38}, doi = {10.1007/978-3-540-73420-8\_38}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icalp/ChandranGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BethencourtSW07, author = {John Bethencourt and Amit Sahai and Brent Waters}, title = {Ciphertext-Policy Attribute-Based Encryption}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {321--334}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.11}, doi = {10.1109/SP.2007.11}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/BethencourtSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/IshaiKOS07, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, editor = {David S. Johnson and Uriel Feige}, title = {Zero-knowledge from secure multiparty computation}, booktitle = {Proceedings of the 39th Annual {ACM} Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007}, pages = {21--30}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1250790.1250794}, doi = {10.1145/1250790.1250794}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/IshaiKOS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/GrothS07, author = {Jens Groth and Amit Sahai}, title = {Efficient Non-interactive Proof Systems for Bilinear Groups}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR07-053}}, year = {2007}, url = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-053/index.html}, eprinttype = {ECCC}, eprint = {TR07-053}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/GrothS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskyPS07, author = {Rafail Ostrovsky and Omkant Pandey and Amit Sahai}, title = {Private Locally Decodable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2007}, url = {http://eprint.iacr.org/2007/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskyPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrothS07, author = {Jens Groth and Amit Sahai}, title = {Efficient Non-interactive Proof Systems for Bilinear Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2007}, url = {http://eprint.iacr.org/2007/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrothS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskySW07, author = {Rafail Ostrovsky and Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption with Non-Monotonic Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2007}, url = {http://eprint.iacr.org/2007/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskySW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranGS07, author = {Nishanth Chandran and Vipul Goyal and Amit Sahai}, title = {New Constructions for {UC} Secure Computation using Tamper-proof Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2007}, url = {http://eprint.iacr.org/2007/334}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzSW07, author = {Jonathan Katz and Amit Sahai and Brent Waters}, title = {Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2007}, url = {http://eprint.iacr.org/2007/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PandeyPSTV07, author = {Omkant Pandey and Rafael Pass and Amit Sahai and Wei{-}Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam}, title = {Precise Concurrent Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2007}, url = {http://eprint.iacr.org/2007/451}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PandeyPSTV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoyalPSW06, author = {Vipul Goyal and Omkant Pandey and Amit Sahai and Brent Waters}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Attribute-based encryption for fine-grained access control of encrypted data}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {89--98}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180418}, doi = {10.1145/1180405.1180418}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoyalPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GrothOS06, author = {Jens Groth and Rafail Ostrovsky and Amit Sahai}, editor = {Cynthia Dwork}, title = {Non-interactive Zaps and New Techniques for {NIZK}}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {97--111}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_6}, doi = {10.1007/11818175\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GrothOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/IshaiPSW06, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai and David A. Wagner}, editor = {Serge Vaudenay}, title = {Private Circuits {II:} Keeping Secrets in Tamperable Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {308--327}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_19}, doi = {10.1007/11761679\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/IshaiPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GrothOS06, author = {Jens Groth and Rafail Ostrovsky and Amit Sahai}, editor = {Serge Vaudenay}, title = {Perfect Non-interactive Zero Knowledge for {NP}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {339--358}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_21}, doi = {10.1007/11761679\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GrothOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LuOSSW06, author = {Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav Shacham and Brent Waters}, editor = {Serge Vaudenay}, title = {Sequential Aggregate Signatures and Multisignatures Without Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {465--485}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_28}, doi = {10.1007/11761679\_28}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LuOSSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehSW06, author = {Dan Boneh and Amit Sahai and Brent Waters}, editor = {Serge Vaudenay}, title = {Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {573--592}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_34}, doi = {10.1007/11761679\_34}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/IshaiKOS06, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Cryptography from Anonymity}, booktitle = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings}, pages = {239--248}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/FOCS.2006.25}, doi = {10.1109/FOCS.2006.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/IshaiKOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BarakPS06, author = {Boaz Barak and Manoj Prabhakaran and Amit Sahai}, title = {Concurrent Non-Malleable Zero Knowledge}, booktitle = {47th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2006), 21-24 October 2006, Berkeley, California, USA, Proceedings}, pages = {345--354}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/FOCS.2006.21}, doi = {10.1109/FOCS.2006.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BarakPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MicciancioOSV06, author = {Daniele Micciancio and Shien Jin Ong and Amit Sahai and Salil P. Vadhan}, editor = {Shai Halevi and Tal Rabin}, title = {Concurrent Zero Knowledge Without Complexity Assumptions}, booktitle = {Theory of Cryptography, Third Theory of Cryptography Conference, {TCC} 2006, New York, NY, USA, March 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3876}, pages = {1--20}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11681878\_1}, doi = {10.1007/11681878\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/MicciancioOSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ChandranMOPS06, author = {Nishanth Chandran and Ryan Moriarty and Rafail Ostrovsky and Omkant Pandey and Amit Sahai}, title = {Improved Algorithms for Optimal Embeddings}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR06-110}}, year = {2006}, url = {https://eccc.weizmann.ac.il/eccc-reports/2006/TR06-110/index.html}, eprinttype = {ECCC}, eprint = {TR06-110}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ChandranMOPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehSW06, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Fully Collusion Resistant Traitor Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2006}, url = {http://eprint.iacr.org/2006/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshaiKOS06, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Cryptography from Anonymity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {84}, year = {2006}, url = {http://eprint.iacr.org/2006/084}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshaiKOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuOSSW06, author = {Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav Shacham and Brent Waters}, title = {Sequential Aggregate Signatures and Multisignatures without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2006}, url = {http://eprint.iacr.org/2006/096}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LuOSSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareS06, author = {Mihir Bellare and Amit Sahai}, title = {Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2006}, url = {http://eprint.iacr.org/2006/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalPSW06, author = {Vipul Goyal and Omkant Pandey and Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2006}, url = {http://eprint.iacr.org/2006/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakPS06, author = {Boaz Barak and Manoj Prabhakaran and Amit Sahai}, title = {Concurrent Non-Malleable Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2006}, url = {http://eprint.iacr.org/2006/355}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalMOS06, author = {Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky and Amit Sahai}, title = {Concurrent Statistical Zero-Knowledge Arguments for {NP} from One Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2006}, url = {http://eprint.iacr.org/2006/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalMOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CharikarLLPPSS05, author = {Moses Charikar and Eric Lehman and Ding Liu and Rina Panigrahy and Manoj Prabhakaran and Amit Sahai and Abhi Shelat}, title = {The smallest grammar problem}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {7}, pages = {2554--2576}, year = {2005}, url = {https://doi.org/10.1109/TIT.2005.850116}, doi = {10.1109/TIT.2005.850116}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CharikarLLPPSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SahaiW05, author = {Amit Sahai and Brent Waters}, editor = {Ronald Cramer}, title = {Fuzzy Identity-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {457--473}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_27}, doi = {10.1007/11426639\_27}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SahaiW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/Barak05, author = {Boaz Barak and Amit Sahai}, title = {How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation}, booktitle = {46th Annual {IEEE} Symposium on Foundations of Computer Science {(FOCS} 2005), 23-25 October 2005, Pittsburgh, PA, USA, Proceedings}, pages = {543--552}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/SFCS.2005.43}, doi = {10.1109/SFCS.2005.43}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/Barak05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PrabhakaranS05, author = {Manoj Prabhakaran and Amit Sahai}, editor = {Joe Kilian}, title = {Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation}, booktitle = {Theory of Cryptography, Second Theory of Cryptography Conference, {TCC} 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3378}, pages = {104--127}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30576-7\_7}, doi = {10.1007/978-3-540-30576-7\_7}, timestamp = {Sun, 02 Jun 2019 21:21:22 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PrabhakaranS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR05-093, author = {Daniele Micciancio and Shien Jin Ong and Amit Sahai and Salil P. Vadhan}, title = {Concurrent Zero Knowledge without Complexity Assumptions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR05-093}}, year = {2005}, url = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-093/index.html}, eprinttype = {ECCC}, eprint = {TR05-093}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR05-093.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR05-096, author = {Boaz Barak and Amit Sahai}, title = {How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR05-096}}, year = {2005}, url = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-096/index.html}, eprinttype = {ECCC}, eprint = {TR05-096}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR05-096.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR05-097, author = {Jens Groth and Rafail Ostrovsky and Amit Sahai}, title = {Perfect Non-Interactive Zero Knowledge for {NP}}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR05-097}}, year = {2005}, url = {https://eccc.weizmann.ac.il/eccc-reports/2005/TR05-097/index.html}, eprinttype = {ECCC}, eprint = {TR05-097}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR05-097.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakS05, author = {Boaz Barak and Amit Sahai}, title = {How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {106}, year = {2005}, url = {http://eprint.iacr.org/2005/106}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MicciancioOSV05, author = {Daniele Micciancio and Shien Jin Ong and Amit Sahai and Salil P. Vadhan}, title = {Concurrent Zero Knowledge without Complexity Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {286}, year = {2005}, url = {http://eprint.iacr.org/2005/286}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MicciancioOSV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GrothOS05, author = {Jens Groth and Rafail Ostrovsky and Amit Sahai}, title = {Perfect Non-Interactive Zero Knowledge for {NP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2005}, url = {http://eprint.iacr.org/2005/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GrothOS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/DworkNS04, author = {Cynthia Dwork and Moni Naor and Amit Sahai}, title = {Concurrent zero-knowledge}, journal = {J. {ACM}}, volume = {51}, number = {6}, pages = {851--898}, year = {2004}, url = {https://doi.org/10.1145/1039488.1039489}, doi = {10.1145/1039488.1039489}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/DworkNS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/CharikarKKRST04, author = {Moses Charikar and Jon M. Kleinberg and Ravi Kumar and Sridhar Rajagopalan and Amit Sahai and Andrew Tomkins}, title = {Minimizing Wirelength in Zero and Bounded Skew Clock Trees}, journal = {{SIAM} J. Discret. Math.}, volume = {17}, number = {4}, pages = {582--595}, year = {2004}, url = {https://doi.org/10.1137/S0895480199352622}, doi = {10.1137/S0895480199352622}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamdm/CharikarKKRST04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LynnPS04, author = {Ben Lynn and Manoj Prabhakaran and Amit Sahai}, editor = {Christian Cachin and Jan Camenisch}, title = {Positive Results and Techniques for Obfuscation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {20--39}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_2}, doi = {10.1007/978-3-540-24676-3\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LynnPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DodisOPS04, author = {Yevgeniy Dodis and Shien Jin Ong and Manoj Prabhakaran and Amit Sahai}, title = {On the (Im)possibility of Cryptography with Imperfect Randomness}, booktitle = {45th Symposium on Foundations of Computer Science {(FOCS} 2004), 17-19 October 2004, Rome, Italy, Proceedings}, pages = {196--205}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/FOCS.2004.44}, doi = {10.1109/FOCS.2004.44}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DodisOPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Sahai04, author = {Amit Sahai}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {Secure Protocols for Complex Tasks in Complex Environments}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {14--16}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_2}, doi = {10.1007/978-3-540-30556-9\_2}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Sahai04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/ElkindSS04, author = {Edith Elkind and Amit Sahai and Kenneth Steiglitz}, editor = {J. Ian Munro}, title = {Frugality in path auctions}, booktitle = {Proceedings of the Fifteenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, {SODA} 2004, New Orleans, Louisiana, USA, January 11-14, 2004}, pages = {701--709}, publisher = {{SIAM}}, year = {2004}, url = {http://dl.acm.org/citation.cfm?id=982792.982900}, timestamp = {Fri, 07 Dec 2012 17:02:08 +0100}, biburl = {https://dblp.org/rec/conf/soda/ElkindSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/PrabhakaranS04, author = {Manoj Prabhakaran and Amit Sahai}, editor = {L{\'{a}}szl{\'{o}} Babai}, title = {New notions of security: achieving universal composability without trusted setup}, booktitle = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing, Chicago, IL, USA, June 13-16, 2004}, pages = {242--251}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1007352.1007394}, doi = {10.1145/1007352.1007394}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/PrabhakaranS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/IshaiKOS04, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, editor = {L{\'{a}}szl{\'{o}} Babai}, title = {Batch codes and their applications}, booktitle = {Proceedings of the 36th Annual {ACM} Symposium on Theory of Computing, Chicago, IL, USA, June 13-16, 2004}, pages = {262--271}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1007352.1007396}, doi = {10.1145/1007352.1007396}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/IshaiKOS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LynnPS04, author = {Ben Lynn and Manoj Prabhakaran and Amit Sahai}, title = {Positive Results and Techniques for Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {60}, year = {2004}, url = {http://eprint.iacr.org/2004/060}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LynnPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiW04, author = {Amit Sahai and Brent Waters}, title = {Fuzzy Identity Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2004}, url = {http://eprint.iacr.org/2004/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PrabhakaranS04, author = {Manoj Prabhakaran and Amit Sahai}, title = {New Notions of Security: Achieving Universal Composability without Trusted Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2004}, url = {http://eprint.iacr.org/2004/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PrabhakaranS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/SahaiV03, author = {Amit Sahai and Salil P. Vadhan}, title = {A complete problem for statistical zero knowledge}, journal = {J. {ACM}}, volume = {50}, number = {2}, pages = {196--249}, year = {2003}, url = {https://doi.org/10.1145/636865.636868}, doi = {10.1145/636865.636868}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/SahaiV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WatersFS03, author = {Brent R. Waters and Edward W. Felten and Amit Sahai}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Receiver anonymity via incomparable public keys}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {112--121}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948127}, doi = {10.1145/948109.948127}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WatersFS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IshaiSW03, author = {Yuval Ishai and Amit Sahai and David A. Wagner}, editor = {Dan Boneh}, title = {Private Circuits: Securing Hardware against Probing Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {463--481}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_27}, doi = {10.1007/978-3-540-45146-4\_27}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IshaiSW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/random/2003, editor = {Sanjeev Arora and Klaus Jansen and Jos{\'{e}} D. P. Rolim and Amit Sahai}, title = {Approximation, Randomization, and Combinatorial Optimization: Algorithms and Techniques, 6th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems, {APPROX} 2003 and 7th International Workshop on Randomization and Approximation Techniques in Computer Science, {RANDOM} 2003, Princeton, NJ, USA, August 24-26, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2764}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/b11961}, doi = {10.1007/B11961}, isbn = {3-540-40770-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/random/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BenderFRSV02, author = {Michael A. Bender and Antonio Fern{\'{a}}ndez and Dana Ron and Amit Sahai and Salil P. Vadhan}, title = {The Power of a Pebble: Exploring and Mapping Directed Graphs}, journal = {Inf. Comput.}, volume = {176}, number = {1}, pages = {1--21}, year = {2002}, url = {https://doi.org/10.1006/inco.2001.3081}, doi = {10.1006/INCO.2001.3081}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/BenderFRSV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/CharikarFGKRS02, author = {Moses Charikar and Ronald Fagin and Venkatesan Guruswami and Jon M. Kleinberg and Prabhakar Raghavan and Amit Sahai}, title = {Query Strategies for Priced Information}, journal = {J. Comput. Syst. Sci.}, volume = {64}, number = {4}, pages = {785--819}, year = {2002}, url = {https://doi.org/10.1006/jcss.2002.1828}, doi = {10.1006/JCSS.2002.1828}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/CharikarFGKRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/PrabhakaranRS02, author = {Manoj Prabhakaran and Alon Rosen and Amit Sahai}, title = {Concurrent Zero Knowledge with Logarithmic Round-Complexity}, booktitle = {43rd Symposium on Foundations of Computer Science {(FOCS} 2002), 16-19 November 2002, Vancouver, BC, Canada, Proceedings}, pages = {366--375}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SFCS.2002.1181961}, doi = {10.1109/SFCS.2002.1181961}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/PrabhakaranRS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/CharikarS02, author = {Moses Charikar and Amit Sahai}, title = {Dimension Reduction in the {\textbackslash}ell {\_}1 Norm}, booktitle = {43rd Symposium on Foundations of Computer Science {(FOCS} 2002), 16-19 November 2002, Vancouver, BC, Canada, Proceedings}, pages = {551--560}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/SFCS.2002.1181979}, doi = {10.1109/SFCS.2002.1181979}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/CharikarS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CanettiLOS02, author = {Ran Canetti and Yehuda Lindell and Rafail Ostrovsky and Amit Sahai}, editor = {John H. Reif}, title = {Universally composable two-party and multi-party secure computation}, booktitle = {Proceedings on 34th Annual {ACM} Symposium on Theory of Computing, May 19-21, 2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {494--503}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/509907.509980}, doi = {10.1145/509907.509980}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/CanettiLOS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CharikarLLPPRSS02, author = {Moses Charikar and Eric Lehman and Ding Liu and Rina Panigrahy and Manoj Prabhakaran and April Rasala and Amit Sahai and Abhi Shelat}, editor = {John H. Reif}, title = {Approximating the smallest grammar: Kolmogorov complexity in natural models}, booktitle = {Proceedings on 34th Annual {ACM} Symposium on Theory of Computing, May 19-21, 2002, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {792--801}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/509907.510021}, doi = {10.1145/509907.510021}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/CharikarLLPPRSS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ElkindS02, author = {Edith Elkind and Amit Sahai}, title = {A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2002}, url = {http://eprint.iacr.org/2002/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ElkindS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PrabhakaranS02, author = {Manoj Prabhakaran and Amit Sahai}, title = {Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2002}, url = {http://eprint.iacr.org/2002/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PrabhakaranS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiLOS02, author = {Ran Canetti and Yehuda Lindell and Rafail Ostrovsky and Amit Sahai}, title = {Universally Composable Two-Party and Multi-Party Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {140}, year = {2002}, url = {http://eprint.iacr.org/2002/140}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiLOS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BarakGIRSVY01, author = {Boaz Barak and Oded Goldreich and Russell Impagliazzo and Steven Rudich and Amit Sahai and Salil P. Vadhan and Ke Yang}, editor = {Joe Kilian}, title = {On the (Im)possibility of Obfuscating Programs}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {1--18}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_1}, doi = {10.1007/3-540-44647-8\_1}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/BarakGIRSVY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SantisCOPS01, author = {Alfredo De Santis and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano and Amit Sahai}, editor = {Joe Kilian}, title = {Robust Non-interactive Zero Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {566--598}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_33}, doi = {10.1007/3-540-44647-8\_33}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SantisCOPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisSS01, author = {Yevgeniy Dodis and Amit Sahai and Adam D. Smith}, editor = {Birgit Pfitzmann}, title = {On Perfect and Adaptive Security in Exposure-Resilient Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {301--324}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_19}, doi = {10.1007/3-540-44987-6\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR01-057, author = {Boaz Barak and Oded Goldreich and Russell Impagliazzo and Steven Rudich and Amit Sahai and Salil P. Vadhan and Ke Yang}, title = {On the (Im)possibility of Obfuscating Programs}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR01-057}}, year = {2001}, url = {https://eccc.weizmann.ac.il/eccc-reports/2001/TR01-057/index.html}, eprinttype = {ECCC}, eprint = {TR01-057}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR01-057.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarakGIRSVY01, author = {Boaz Barak and Oded Goldreich and Russell Impagliazzo and Steven Rudich and Amit Sahai and Salil P. Vadhan and Ke Yang}, title = {On the (Im)possibility of Obfuscating Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2001}, url = {http://eprint.iacr.org/2001/069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarakGIRSVY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ndltd/Sahai00, author = {Amit Sahai}, title = {Frontiers in zero knowledge}, school = {Massachusetts Institute of Technology, Cambridge, MA, {USA}}, year = {2000}, url = {https://hdl.handle.net/1721.1/86616}, timestamp = {Wed, 04 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ndltd/Sahai00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiDHKS00, author = {Ran Canetti and Yevgeniy Dodis and Shai Halevi and Eyal Kushilevitz and Amit Sahai}, editor = {Bart Preneel}, title = {Exposure-Resilient Functions and All-or-Nothing Transforms}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {453--469}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_33}, doi = {10.1007/3-540-45539-6\_33}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiDHKS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GuruswamiSS00, author = {Venkatesan Guruswami and Amit Sahai and Madhu Sudan}, title = {"Soft-decision" Decoding of Chinese Remainder Codes}, booktitle = {41st Annual Symposium on Foundations of Computer Science, {FOCS} 2000, 12-14 November 2000, Redondo Beach, California, {USA}}, pages = {159--168}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SFCS.2000.892076}, doi = {10.1109/SFCS.2000.892076}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GuruswamiSS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/CharikarGKRS00, author = {Moses Charikar and Venkatesan Guruswami and Ravi Kumar and Sridhar Rajagopalan and Amit Sahai}, title = {Combinatorial feature selection problems}, booktitle = {41st Annual Symposium on Foundations of Computer Science, {FOCS} 2000, 12-14 November 2000, Redondo Beach, California, {USA}}, pages = {631--640}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SFCS.2000.892331}, doi = {10.1109/SFCS.2000.892331}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/CharikarGKRS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CharikarFGKRS00, author = {Moses Charikar and Ronald Fagin and Venkatesan Guruswami and Jon M. Kleinberg and Prabhakar Raghavan and Amit Sahai}, editor = {F. Frances Yao and Eugene M. Luks}, title = {Query strategies for priced information (extended abstract)}, booktitle = {Proceedings of the Thirty-Second Annual {ACM} Symposium on Theory of Computing, May 21-23, 2000, Portland, OR, {USA}}, pages = {582--591}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/335305.335382}, doi = {10.1145/335305.335382}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/CharikarFGKRS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR00-084, author = {Amit Sahai and Salil P. Vadhan}, title = {A Complete Problem for Statistical Zero Knowledge}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR00-084}}, year = {2000}, url = {https://eccc.weizmann.ac.il/eccc-reports/2000/TR00-084/index.html}, eprinttype = {ECCC}, eprint = {TR00-084}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR00-084.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiV00, author = {Amit Sahai and Salil P. Vadhan}, title = {A Complete Problem for Statistical Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {56}, year = {2000}, url = {http://eprint.iacr.org/2000/056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colt/GuruswamiS99, author = {Venkatesan Guruswami and Amit Sahai}, editor = {Shai Ben{-}David and Philip M. Long}, title = {Multiclass Learning, Boosting, and Error-Correcting Codes}, booktitle = {Proceedings of the Twelfth Annual Conference on Computational Learning Theory, {COLT} 1999, Santa Cruz, CA, USA, July 7-9, 1999}, pages = {145--155}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/307400.307429}, doi = {10.1145/307400.307429}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colt/GuruswamiS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoldreichSV99, author = {Oded Goldreich and Amit Sahai and Salil P. Vadhan}, editor = {Michael J. Wiener}, title = {Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of {SZK} and {NISZK}}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {467--484}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_30}, doi = {10.1007/3-540-48405-1\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoldreichSV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareS99, author = {Mihir Bellare and Amit Sahai}, editor = {Michael J. Wiener}, title = {Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {519--536}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_33}, doi = {10.1007/3-540-48405-1\_33}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KumarRS99, author = {Ravi Kumar and Sridhar Rajagopalan and Amit Sahai}, editor = {Michael J. Wiener}, title = {Coding Constructions for Blacklisting Problems without Computational Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {609--623}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_38}, doi = {10.1007/3-540-48405-1\_38}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KumarRS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/Sahai99, author = {Amit Sahai}, title = {Non-Malleable Non-Interactive Zero Knowledge and Adaptive Chosen-Ciphertext Security}, booktitle = {40th Annual Symposium on Foundations of Computer Science, {FOCS} '99, 17-18 October, 1999, New York, NY, {USA}}, pages = {543--553}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/SFFCS.1999.814628}, doi = {10.1109/SFFCS.1999.814628}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/Sahai99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LysyanskayaRSW99, author = {Anna Lysyanskaya and Ronald L. Rivest and Amit Sahai and Stefan Wolf}, editor = {Howard M. Heys and Carlisle M. Adams}, title = {Pseudonym Systems}, booktitle = {Selected Areas in Cryptography, 6th Annual International Workshop, SAC'99, Kingston, Ontario, Canada, August 9-10, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1758}, pages = {184--199}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46513-8\_14}, doi = {10.1007/3-540-46513-8\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LysyanskayaRSW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/CharikarKKRST99, author = {Moses Charikar and Jon M. Kleinberg and Ravi Kumar and Sridhar Rajagopalan and Amit Sahai and Andrew Tomkins}, editor = {Robert Endre Tarjan and Tandy J. Warnow}, title = {Minimizing Wirelength in Zero and Bounded Skew Clock Trees}, booktitle = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, 17-19 January 1999, Baltimore, Maryland, {USA}}, pages = {177--184}, publisher = {{ACM/SIAM}}, year = {1999}, url = {http://dl.acm.org/citation.cfm?id=314500.314553}, timestamp = {Thu, 05 Jul 2018 07:29:57 +0200}, biburl = {https://dblp.org/rec/conf/soda/CharikarKKRST99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR99-013, author = {Oded Goldreich and Amit Sahai and Salil P. Vadhan}, title = {Can Statistical Zero Knowledge be made Non-Interactive? or On the Relationship of {SZK} and {NISZK}}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR99-013}}, year = {1999}, url = {https://eccc.weizmann.ac.il/eccc-reports/1999/TR99-013/index.html}, eprinttype = {ECCC}, eprint = {TR99-013}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR99-013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareS99, author = {Mihir Bellare and Amit Sahai}, title = {Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {1999}, url = {http://eprint.iacr.org/1999/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DworkNS99, author = {Cynthia Dwork and Moni Naor and Amit Sahai}, title = {Concurrent Zero-Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {23}, year = {1999}, url = {http://eprint.iacr.org/1999/023}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DworkNS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcg/BernS98, author = {Marshall W. Bern and Amit Sahai}, title = {Pushing Disks Together - The Continuous-Motion Case}, journal = {Discret. Comput. Geom.}, volume = {20}, number = {4}, pages = {499--514}, year = {1998}, url = {https://doi.org/10.1007/PL00009398}, doi = {10.1007/PL00009398}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcg/BernS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BellareHSV98, author = {Mihir Bellare and Shai Halevi and Amit Sahai and Salil P. Vadhan}, editor = {Hugo Krawczyk}, title = {Many-to-One Trapdoor Functions and Their Ralation to Public-Key Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {283--298}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055735}, doi = {10.1007/BFB0055735}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BellareHSV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DworkS98, author = {Cynthia Dwork and Amit Sahai}, editor = {Hugo Krawczyk}, title = {Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {442--457}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055746}, doi = {10.1007/BFB0055746}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DworkS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BenderFRSV98, author = {Michael A. Bender and Antonio Fern{\'{a}}ndez and Dana Ron and Amit Sahai and Salil P. Vadhan}, editor = {Jeffrey Scott Vitter}, title = {The Power of a Pebble: Exploring and Mapping Directed Graphs}, booktitle = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory of Computing, Dallas, Texas, USA, May 23-26, 1998}, pages = {269--278}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/276698.276759}, doi = {10.1145/276698.276759}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BenderFRSV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoldreichSV98, author = {Oded Goldreich and Amit Sahai and Salil P. Vadhan}, editor = {Jeffrey Scott Vitter}, title = {Honest-Verifier Statistical Zero-Knowledge Equals General Statistical Zero-Knowledge}, booktitle = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory of Computing, Dallas, Texas, USA, May 23-26, 1998}, pages = {399--408}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/276698.276852}, doi = {10.1145/276698.276852}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoldreichSV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/DworkNS98, author = {Cynthia Dwork and Moni Naor and Amit Sahai}, editor = {Jeffrey Scott Vitter}, title = {Concurrent Zero-Knowledge}, booktitle = {Proceedings of the Thirtieth Annual {ACM} Symposium on the Theory of Computing, Dallas, Texas, USA, May 23-26, 1998}, pages = {409--418}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/276698.276853}, doi = {10.1145/276698.276853}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/DworkNS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareHSV98, author = {Mihir Bellare and Shai Halevi and Amit Sahai and Salil P. Vadhan}, title = {Many-to-one Trapdoor Functions and their Relation to Public-key Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {1998}, url = {http://eprint.iacr.org/1998/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareHSV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/SahaiV97, author = {Amit Sahai and Salil P. Vadhan}, editor = {Panos M. Pardalos and Sanguthevar Rajasekaran and Jos{\'{e}} Rolim}, title = {Manipulating statistical difference}, booktitle = {Randomization Methods in Algorithm Design, Proceedings of a {DIMACS} Workshop, Princeton, New Jersey, USA, December 12-14, 1997}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {43}, pages = {251--270}, publisher = {{DIMACS/AMS}}, year = {1997}, url = {https://doi.org/10.1090/dimacs/043/14}, doi = {10.1090/DIMACS/043/14}, timestamp = {Mon, 22 May 2023 16:07:35 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/SahaiV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/SahaiV97, author = {Amit Sahai and Salil P. Vadhan}, title = {A Complete Promise Problem for Statistical Zero-Knowledge}, booktitle = {38th Annual Symposium on Foundations of Computer Science, {FOCS} '97, Miami Beach, Florida, USA, October 19-22, 1997}, pages = {448--457}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SFCS.1997.646133}, doi = {10.1109/SFCS.1997.646133}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/SahaiV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BernS96, author = {Marshall W. Bern and Amit Sahai}, editor = {Gary L. Miller}, title = {Pushing Disks Together - The Continuous-Motion Case}, booktitle = {Proceedings of the Twenty-Eighth Annual {ACM} Symposium on the Theory of Computing, Philadelphia, Pennsylvania, USA, May 22-24, 1996}, pages = {119--125}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/237814.237843}, doi = {10.1145/237814.237843}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BernS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.