Amit Sahai

Affiliations: 
Computer Science University of California, Los Angeles, Los Angeles, CA 
Area:
theoretical computer science; foundations of cryptography; computer security
Google:
"Amit Sahai"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Badrinarayanan S, Miles E, Sahai A, et al. (2016) Post-zeroizing obfuscation: New mathematical tools, and the case of evasive circuits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9666: 764-791
Boneh D, Lewi K, Raykova M, et al. (2015) Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9057: 563-594
Agrawal S, Badrinarayanan S, Kumarasubramanian A, et al. (2015) On the practical security of inner product functional encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9020: 777-798
Goyal V, Lin H, Pandey O, et al. (2015) Round-efficient concurrently composable secure computation via a robust extraction lemma Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9014: 260-289
Gelles R, Moitra A, Sahai A. (2014) Efficient coding for interactive communicalion Ieee Transactions On Information Theory. 60: 1899-1913
Gentry C, Groth J, Ishai Y, et al. (2014) Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs Journal of Cryptology. 28: 820-843
Prabhakaran M, Sahai A, Wadia A. (2014) Secure computation using leaky tokens Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8572: 907-918
Lu S, Ostrovsky R, Sahai A, et al. (2013) Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles Journal of Cryptology. 26: 340-373
Katz J, Sahai A, Waters B. (2013) Predicate encryption supporting disjunctions, polynomial equations, and inner products Journal of Cryptology. 26: 191-224
Boneh D, Sahai A, Waters B. (2012) Functional encryption: A new vision for public-key cryptography Communications of the Acm. 55: 56-64
See more...