Amit Sahai
Affiliations: | Computer Science | University of California, Los Angeles, Los Angeles, CA |
Area:
theoretical computer science; foundations of cryptography; computer securityGoogle:
"Amit Sahai"
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Badrinarayanan S, Miles E, Sahai A, et al. (2016) Post-zeroizing obfuscation: New mathematical tools, and the case of evasive circuits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9666: 764-791 |
Boneh D, Lewi K, Raykova M, et al. (2015) Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9057: 563-594 |
Agrawal S, Badrinarayanan S, Kumarasubramanian A, et al. (2015) On the practical security of inner product functional encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9020: 777-798 |
Goyal V, Lin H, Pandey O, et al. (2015) Round-efficient concurrently composable secure computation via a robust extraction lemma Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9014: 260-289 |
Gelles R, Moitra A, Sahai A. (2014) Efficient coding for interactive communicalion Ieee Transactions On Information Theory. 60: 1899-1913 |
Gentry C, Groth J, Ishai Y, et al. (2014) Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs Journal of Cryptology. 28: 820-843 |
Prabhakaran M, Sahai A, Wadia A. (2014) Secure computation using leaky tokens Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8572: 907-918 |
Lu S, Ostrovsky R, Sahai A, et al. (2013) Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles Journal of Cryptology. 26: 340-373 |
Katz J, Sahai A, Waters B. (2013) Predicate encryption supporting disjunctions, polynomial equations, and inner products Journal of Cryptology. 26: 191-224 |
Boneh D, Sahai A, Waters B. (2012) Functional encryption: A new vision for public-key cryptography Communications of the Acm. 55: 56-64 |