Amit Sahai - Publications

Affiliations: 
Computer Science University of California, Los Angeles, Los Angeles, CA 
Area:
theoretical computer science; foundations of cryptography; computer security

37 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Badrinarayanan S, Miles E, Sahai A, Zhandry M. Post-zeroizing obfuscation: New mathematical tools, and the case of evasive circuits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9666: 764-791. DOI: 10.1007/978-3-662-49896-5_27  0.352
2015 Boneh D, Lewi K, Raykova M, Sahai A, Zhandry M, Zimmerman J. Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9057: 563-594. DOI: 10.1007/978-3-662-46803-6_19  0.349
2015 Agrawal S, Badrinarayanan S, Kumarasubramanian A, Prabhakaran M, Sahai A. On the practical security of inner product functional encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9020: 777-798. DOI: 10.1007/978-3-662-46447-2_35  0.682
2015 Goyal V, Lin H, Pandey O, Pass R, Sahai A. Round-efficient concurrently composable secure computation via a robust extraction lemma Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9014: 260-289.  0.366
2014 Gelles R, Moitra A, Sahai A. Efficient coding for interactive communicalion Ieee Transactions On Information Theory. 60: 1899-1913. DOI: 10.1109/Tit.2013.2294186  0.302
2014 Gentry C, Groth J, Ishai Y, Peikert C, Sahai A, Smith A. Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs Journal of Cryptology. 28: 820-843. DOI: 10.1007/S00145-014-9184-Y  0.365
2014 Prabhakaran M, Sahai A, Wadia A. Secure computation using leaky tokens Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8572: 907-918. DOI: 10.1007/978-3-662-43948-7_75  0.31
2013 Lu S, Ostrovsky R, Sahai A, Shacham H, Waters B. Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles Journal of Cryptology. 26: 340-373. DOI: 10.1007/S00145-012-9126-5  0.38
2013 Katz J, Sahai A, Waters B. Predicate encryption supporting disjunctions, polynomial equations, and inner products Journal of Cryptology. 26: 191-224. DOI: 10.1007/S00145-012-9119-4  0.387
2012 Boneh D, Sahai A, Waters B. Functional encryption: A new vision for public-key cryptography Communications of the Acm. 55: 56-64. DOI: 10.1145/2366316.2366333  0.36
2012 Groth J, Ostrovsky R, Sahai A. New techniques for noninteractive zero-knowledge Journal of the Acm. 59. DOI: 10.1145/2220357.2220358  0.401
2012 Groth J, Sahai A. Efficient noninteractive proof systems for bilinear groups Siam Journal On Computing. 41: 1193-1232. DOI: 10.1137/080725386  0.361
2012 Garg S, Sahai A. Adaptively secure multi-party computation with dishonest majority Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7417: 105-123. DOI: 10.1007/978-3-642-32009-5_8  0.325
2012 Agrawal S, Goyal V, Jain A, Prabhakaran M, Sahai A. New impossibility results for concurrent composition and a non-interactive completeness theorem for secure computation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7417: 443-460. DOI: 10.1007/978-3-642-32009-5_26  0.31
2012 Garg S, Goyal V, Jain A, Sahai A. Concurrently secure computation in constant rounds Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 99-116. DOI: 10.1007/978-3-642-29011-4_8  0.336
2011 Garg S, Rao V, Sahai A, Schröder D, Unruh D. Round optimal blind signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6841: 630-648. DOI: 10.1007/978-3-642-22792-9_36  0.325
2011 Sahai A, Seyalioglu H. Fully secure accountable-authority identity-based encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6571: 296-316. DOI: 10.1007/978-3-642-19379-8_19  0.347
2010 Sahai A, Seyalioglu HA. Worry-Free Encryption: Functional encryption with public keys Proceedings of the Acm Conference On Computer and Communications Security. 463-472. DOI: 10.1145/1866307.1866359  0.334
2010 Garg S, Kumarasubramanian A, Sahai A, Waters B. Building efficient fully collusion-resilient traitor tracing and revocation schemes Proceedings of the Acm Conference On Computer and Communications Security. 121-130. DOI: 10.1145/1866307.1866322  0.687
2010 Maji HK, Prabhakaran M, Sahai A. On the computational complexity of coin flipping Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 613-622. DOI: 10.1109/FOCS.2010.64  0.317
2010 Ishai Y, Kumarasubramanian A, Orlandi C, Sahai A. On invertible sampling and adaptive security Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6477: 466-482. DOI: 10.1007/978-3-642-17373-8_27  0.697
2010 Goyal V, Ishai Y, Mahmoody M, Sahai A. Interactive locking, zero-knowledge PCPs, and unconditional cryptography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6223: 173-190. DOI: 10.1007/978-3-642-14623-7_10  0.327
2010 Lewko A, Okamoto T, Sahai A, Takashima K, Waters B. Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6110: 62-91. DOI: 10.1007/978-3-642-13190-5_4  0.377
2009 Aaronson S, Guha S, Kleinberg J, McSherry F, van Melkebeek D, Sahai A. Special Issue On The Thirty-Eighth Annual ACM Symposium On Theory Of Computing (STOC 2006) Siam Journal On Computing. 39: vii-vii. DOI: 10.1137/Smjcat000039000001000Vii000001  0.302
2009 Ishai Y, Kushilevitz E, Ostrovsky R, Sahai A. Zero-Knowledge Proofs from Secure Multiparty Computation Siam Journal On Computing. 39: 1121-1152. DOI: 10.1137/080725398  0.44
2009 Goyal V, Sahai A. Resettably secure computation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5479: 54-71. DOI: 10.1007/978-3-642-01001-9_3  0.312
2009 Ishai Y, Prabhakaran M, Sahai A. Secure arithmetic computation with no honest majority Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5444: 294-314. DOI: 10.1007/978-3-642-00457-5_18  0.318
2008 Ishai Y, Prabhakaran M, Sahai A. Founding cryptography on oblivious transfer - Efficiently Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5157: 572-591. DOI: 10.1007/978-3-540-85174-5_32  0.327
2008 Chandran N, Goyal V, Sahai A. New constructions for UC secure computation using tamper-proof hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4965: 545-562. DOI: 10.1007/978-3-540-78967-3_31  0.328
2008 Ishai Y, Ostrovsky R, Kushilevitz E, Sahai A. Cryptography with constant computational overhead Proceedings of the Annual Acm Symposium On Theory of Computing. 433-442.  0.354
2006 Barak B, Prabhakaran M, Sahai A. Concurrent non-malleable zero knowledge Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 345-354. DOI: 10.1109/FOCS.2006.21  0.33
2005 Charikar M, Lehman E, Liu D, Panigrahy R, Prabhakaran M, Sahai A, Shelat A. The smallest grammar problem Ieee Transactions On Information Theory. 51: 2554-2576. DOI: 10.1109/Tit.2005.850116  0.322
2004 Dwork C, Naor M, Sahai A. Concurrent zero-knowledge Journal of the Acm. 51: 851-898. DOI: 10.1145/1039488.1039489  0.318
2004 Charikar M, Kleinberg J, Kumar R, Rajagopalan S, Sahai A, Tomkins A. Minimizing wirelength in zero and bounded skew clock trees Siam Journal On Discrete Mathematics. 17: 582-595. DOI: 10.1137/S0895480199352622  0.304
2003 Sahai A, Vadhan S. A complete problem for statistical zero knowledge Journal of the Acm. 50: 196-249. DOI: 10.1145/636865.636868  0.643
2002 Bender MA, Fernández A, Ron D, Sahai A, Vadhan S. The Power of a Pebble: Exploring and Mapping Directed Graphs Information and Computation. 176: 1-21. DOI: 10.1006/Inco.2001.3081  0.618
2001 Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan S, Yang K. On the (Im)possibility of obfuscating programs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 1-18. DOI: 10.1145/2160158.2160159  0.64
Show low-probability matches.