Year |
Citation |
Score |
2016 |
Badrinarayanan S, Miles E, Sahai A, Zhandry M. Post-zeroizing obfuscation: New mathematical tools, and the case of evasive circuits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9666: 764-791. DOI: 10.1007/978-3-662-49896-5_27 |
0.352 |
|
2015 |
Boneh D, Lewi K, Raykova M, Sahai A, Zhandry M, Zimmerman J. Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9057: 563-594. DOI: 10.1007/978-3-662-46803-6_19 |
0.349 |
|
2015 |
Agrawal S, Badrinarayanan S, Kumarasubramanian A, Prabhakaran M, Sahai A. On the practical security of inner product functional encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9020: 777-798. DOI: 10.1007/978-3-662-46447-2_35 |
0.682 |
|
2015 |
Goyal V, Lin H, Pandey O, Pass R, Sahai A. Round-efficient concurrently composable secure computation via a robust extraction lemma Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9014: 260-289. |
0.366 |
|
2014 |
Gelles R, Moitra A, Sahai A. Efficient coding for interactive communicalion Ieee Transactions On Information Theory. 60: 1899-1913. DOI: 10.1109/Tit.2013.2294186 |
0.302 |
|
2014 |
Gentry C, Groth J, Ishai Y, Peikert C, Sahai A, Smith A. Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs Journal of Cryptology. 28: 820-843. DOI: 10.1007/S00145-014-9184-Y |
0.365 |
|
2014 |
Prabhakaran M, Sahai A, Wadia A. Secure computation using leaky tokens Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8572: 907-918. DOI: 10.1007/978-3-662-43948-7_75 |
0.31 |
|
2013 |
Lu S, Ostrovsky R, Sahai A, Shacham H, Waters B. Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles Journal of Cryptology. 26: 340-373. DOI: 10.1007/S00145-012-9126-5 |
0.38 |
|
2013 |
Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products Journal of Cryptology. 26: 191-224. DOI: 10.1007/S00145-012-9119-4 |
0.387 |
|
2012 |
Boneh D, Sahai A, Waters B. Functional encryption: A new vision for public-key cryptography Communications of the Acm. 55: 56-64. DOI: 10.1145/2366316.2366333 |
0.36 |
|
2012 |
Groth J, Ostrovsky R, Sahai A. New techniques for noninteractive zero-knowledge Journal of the Acm. 59. DOI: 10.1145/2220357.2220358 |
0.401 |
|
2012 |
Groth J, Sahai A. Efficient noninteractive proof systems for bilinear groups Siam Journal On Computing. 41: 1193-1232. DOI: 10.1137/080725386 |
0.361 |
|
2012 |
Garg S, Sahai A. Adaptively secure multi-party computation with dishonest majority Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7417: 105-123. DOI: 10.1007/978-3-642-32009-5_8 |
0.325 |
|
2012 |
Agrawal S, Goyal V, Jain A, Prabhakaran M, Sahai A. New impossibility results for concurrent composition and a non-interactive completeness theorem for secure computation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7417: 443-460. DOI: 10.1007/978-3-642-32009-5_26 |
0.31 |
|
2012 |
Garg S, Goyal V, Jain A, Sahai A. Concurrently secure computation in constant rounds Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 99-116. DOI: 10.1007/978-3-642-29011-4_8 |
0.336 |
|
2011 |
Garg S, Rao V, Sahai A, Schröder D, Unruh D. Round optimal blind signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6841: 630-648. DOI: 10.1007/978-3-642-22792-9_36 |
0.325 |
|
2011 |
Sahai A, Seyalioglu H. Fully secure accountable-authority identity-based encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6571: 296-316. DOI: 10.1007/978-3-642-19379-8_19 |
0.347 |
|
2010 |
Sahai A, Seyalioglu HA. Worry-Free Encryption: Functional encryption with public keys Proceedings of the Acm Conference On Computer and Communications Security. 463-472. DOI: 10.1145/1866307.1866359 |
0.334 |
|
2010 |
Garg S, Kumarasubramanian A, Sahai A, Waters B. Building efficient fully collusion-resilient traitor tracing and revocation schemes Proceedings of the Acm Conference On Computer and Communications Security. 121-130. DOI: 10.1145/1866307.1866322 |
0.687 |
|
2010 |
Maji HK, Prabhakaran M, Sahai A. On the computational complexity of coin flipping Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 613-622. DOI: 10.1109/FOCS.2010.64 |
0.317 |
|
2010 |
Ishai Y, Kumarasubramanian A, Orlandi C, Sahai A. On invertible sampling and adaptive security Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6477: 466-482. DOI: 10.1007/978-3-642-17373-8_27 |
0.697 |
|
2010 |
Goyal V, Ishai Y, Mahmoody M, Sahai A. Interactive locking, zero-knowledge PCPs, and unconditional cryptography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6223: 173-190. DOI: 10.1007/978-3-642-14623-7_10 |
0.327 |
|
2010 |
Lewko A, Okamoto T, Sahai A, Takashima K, Waters B. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6110: 62-91. DOI: 10.1007/978-3-642-13190-5_4 |
0.377 |
|
2009 |
Aaronson S, Guha S, Kleinberg J, McSherry F, van Melkebeek D, Sahai A. Special Issue On The Thirty-Eighth Annual ACM Symposium On Theory Of Computing (STOC 2006) Siam Journal On Computing. 39: vii-vii. DOI: 10.1137/Smjcat000039000001000Vii000001 |
0.302 |
|
2009 |
Ishai Y, Kushilevitz E, Ostrovsky R, Sahai A. Zero-Knowledge Proofs from Secure Multiparty Computation Siam Journal On Computing. 39: 1121-1152. DOI: 10.1137/080725398 |
0.44 |
|
2009 |
Goyal V, Sahai A. Resettably secure computation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5479: 54-71. DOI: 10.1007/978-3-642-01001-9_3 |
0.312 |
|
2009 |
Ishai Y, Prabhakaran M, Sahai A. Secure arithmetic computation with no honest majority Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5444: 294-314. DOI: 10.1007/978-3-642-00457-5_18 |
0.318 |
|
2008 |
Ishai Y, Prabhakaran M, Sahai A. Founding cryptography on oblivious transfer - Efficiently Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5157: 572-591. DOI: 10.1007/978-3-540-85174-5_32 |
0.327 |
|
2008 |
Chandran N, Goyal V, Sahai A. New constructions for UC secure computation using tamper-proof hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4965: 545-562. DOI: 10.1007/978-3-540-78967-3_31 |
0.328 |
|
2008 |
Ishai Y, Ostrovsky R, Kushilevitz E, Sahai A. Cryptography with constant computational overhead Proceedings of the Annual Acm Symposium On Theory of Computing. 433-442. |
0.354 |
|
2006 |
Barak B, Prabhakaran M, Sahai A. Concurrent non-malleable zero knowledge Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 345-354. DOI: 10.1109/FOCS.2006.21 |
0.33 |
|
2005 |
Charikar M, Lehman E, Liu D, Panigrahy R, Prabhakaran M, Sahai A, Shelat A. The smallest grammar problem Ieee Transactions On Information Theory. 51: 2554-2576. DOI: 10.1109/Tit.2005.850116 |
0.322 |
|
2004 |
Dwork C, Naor M, Sahai A. Concurrent zero-knowledge Journal of the Acm. 51: 851-898. DOI: 10.1145/1039488.1039489 |
0.318 |
|
2004 |
Charikar M, Kleinberg J, Kumar R, Rajagopalan S, Sahai A, Tomkins A. Minimizing wirelength in zero and bounded skew clock trees Siam Journal On Discrete Mathematics. 17: 582-595. DOI: 10.1137/S0895480199352622 |
0.304 |
|
2003 |
Sahai A, Vadhan S. A complete problem for statistical zero knowledge Journal of the Acm. 50: 196-249. DOI: 10.1145/636865.636868 |
0.643 |
|
2002 |
Bender MA, Fernández A, Ron D, Sahai A, Vadhan S. The Power of a Pebble: Exploring and Mapping Directed Graphs Information and Computation. 176: 1-21. DOI: 10.1006/Inco.2001.3081 |
0.618 |
|
2001 |
Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan S, Yang K. On the (Im)possibility of obfuscating programs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 1-18. DOI: 10.1145/2160158.2160159 |
0.64 |
|
Show low-probability matches. |