
Amit Sahai
Person information
- affiliation: University of California, Los Angeles, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j23]Nathan Manohar, Abhishek Jain, Amit Sahai:
Self-Processing Private Sensor Data via Garbled Encryption. Proc. Priv. Enhancing Technol. 2020(4): 434-460 (2020) - [c178]Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
Secure MPC: Laziness Leads to GOD. ASIACRYPT (3) 2020: 120-150 - [c177]Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai:
Amplifying the Security of Functional Encryption, Unconditionally. CRYPTO (1) 2020: 717-746 - [c176]Aayush Jain, Nathan Manohar, Amit Sahai:
Combiners for Functional Encryption, Unconditionally. EUROCRYPT (1) 2020: 141-168 - [c175]Saikrishna Badrinarayanan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai:
Statistical ZAP Arguments. EUROCRYPT (3) 2020: 642-667 - [c174]Peter Michael Reichstein Rasmussen, Amit Sahai:
Expander Graphs Are Non-Malleable Codes. ITC 2020: 6:1-6:10 - [c173]James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry:
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption. ITCS 2020: 82:1-82:39 - [c172]Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai:
On Pseudorandom Encodings. TCC (3) 2020: 639-669 - [i155]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. CoRR abs/2008.09317 (2020) - [i154]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. Electron. Colloquium Comput. Complex. 27: 126 (2020) - [i153]Aayush Jain, Nathan Manohar, Amit Sahai:
Combiners for Functional Encryption, Unconditionally. IACR Cryptol. ePrint Arch. 2020: 154 (2020) - [i152]Thomas Agrikola, Geoffroy Couteau, Yuval Ishai, Stanislaw Jarecki, Amit Sahai:
On Pseudorandom Encodings. IACR Cryptol. ePrint Arch. 2020: 445 (2020) - [i151]Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification. IACR Cryptol. ePrint Arch. 2020: 764 (2020) - [i150]Qipeng Liu, Amit Sahai, Mark Zhandry:
Quantum Immune One-Time Memories. IACR Cryptol. ePrint Arch. 2020: 871 (2020) - [i149]James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry:
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption. IACR Cryptol. ePrint Arch. 2020: 889 (2020) - [i148]Nathan Manohar, Abhishek Jain, Amit Sahai:
Self-Processing Private Sensor Data via Garbled Encryption. IACR Cryptol. ePrint Arch. 2020: 950 (2020) - [i147]Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai:
Amplifying the Security of Functional Encryption, Unconditionally. IACR Cryptol. ePrint Arch. 2020: 951 (2020) - [i146]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. IACR Cryptol. ePrint Arch. 2020: 1003 (2020)
2010 – 2019
- 2019
- [c171]Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters:
Output Compression, MPC, and iO for Turing Machines. ASIACRYPT (1) 2019: 342-370 - [c170]Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt
, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. CRYPTO (3) 2019: 284-332 - [c169]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptographic Sensing. CRYPTO (3) 2019: 583-604 - [c168]Vipul Goyal, Aayush Jain, Amit Sahai:
Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge. CRYPTO (2) 2019: 608-637 - [c167]Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai:
Sum-of-Squares Meets Program Obfuscation, Revisited. EUROCRYPT (1) 2019: 226-250 - [c166]Aayush Jain, Huijia Lin, Christian Matt
, Amit Sahai:
How to Leverage Hardness of Constant-Degree Expanding Polynomials over \mathbb R R to build i풪 i O. EUROCRYPT (1) 2019: 251-281 - [c165]Ashutosh Kumar, Raghu Meka, Amit Sahai:
Leakage-Resilient Secret Sharing Against Colluding Parties. FOCS 2019: 636-660 - [c164]Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
From FE Combiners to Secure MPC and Back. TCC (1) 2019: 199-228 - [i145]Vipul Goyal, Aayush Jain, Amit Sahai:
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge. IACR Cryptol. ePrint Arch. 2019: 626 (2019) - [i144]Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptographic Sensing. IACR Cryptol. ePrint Arch. 2019: 637 (2019) - [i143]Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. IACR Cryptol. ePrint Arch. 2019: 643 (2019) - [i142]Saikrishna Badrinarayanan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai:
Statistical ZAP Arguments. IACR Cryptol. ePrint Arch. 2019: 780 (2019) - [i141]Martin R. Albrecht, Melissa Chase, Hao Chen, Jintai Ding, Shafi Goldwasser, Sergey Gorbunov, Shai Halevi, Jeffrey Hoffstein, Kim Laine, Kristin E. Lauter, Satya Lokam, Daniele Micciancio, Dustin Moody, Travis Morrison, Amit Sahai, Vinod Vaikuntanathan:
Homomorphic Encryption Standard. IACR Cryptol. ePrint Arch. 2019: 939 (2019) - [i140]Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
How to leverage hardness of constant degree expanding polynomials over R to build iO. IACR Cryptol. ePrint Arch. 2019: 1030 (2019) - [i139]Aayush Jain, Huijia Lin, Amit Sahai:
Simplifying Constructions and Assumptions for i풪. IACR Cryptol. ePrint Arch. 2019: 1252 (2019) - 2018
- [c163]Prabhanjan Ananth, Yuval Ishai, Amit Sahai:
Private Circuits: A Modular Approach. CRYPTO (3) 2018: 427-455 - [c162]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Promise Zero Knowledge and Its Applications to Round Optimal MPC. CRYPTO (2) 2018: 459-487 - [c161]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption. CRYPTO (1) 2018: 565-596 - [c160]Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Statistical Witness Indistinguishability (and more) in Two Messages. EUROCRYPT (3) 2018: 34-65 - [c159]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. EUROCRYPT (3) 2018: 222-255 - [c158]Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Succinct delegation for low-space non-deterministic computation. STOC 2018: 709-721 - [c157]Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters:
Upgrading to Functional Encryption. TCC (1) 2018: 629-658 - [c156]Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:
Exploring Crypto Dark Matter: - New Simple PRF Candidates and Their Applications. TCC (2) 2018: 699-729 - [i138]Peter M. R. Rasmussen, Amit Sahai:
Expander Graphs are Non-Malleable Codes. CoRR abs/1810.00106 (2018) - [i137]Saikrishna Badrinarayanan, Yael Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Non-Interactive Delegation for Low-Space Non-Deterministic Computation. Electron. Colloquium Comput. Complex. 25: 9 (2018) - [i136]Ashutosh Kumar, Raghu Meka, Amit Sahai:
Leakage-Resilient Secret Sharing. Electron. Colloquium Comput. Complex. 25: 200 (2018) - [i135]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. IACR Cryptol. ePrint Arch. 2018: 133 (2018) - [i134]Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Statistical Witness Indistinguishability (and more) in Two Messages. IACR Cryptol. ePrint Arch. 2018: 168 (2018) - [i133]Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, Brent Waters:
Upgrading to Functional Encryption. IACR Cryptol. ePrint Arch. 2018: 281 (2018) - [i132]Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
From FE Combiners to Secure MPC and Back. IACR Cryptol. ePrint Arch. 2018: 457 (2018) - [i131]Prabhanjan Ananth, Yuval Ishai, Amit Sahai:
Private Circuits: A Modular Approach. IACR Cryptol. ePrint Arch. 2018: 566 (2018) - [i130]Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
Secure MPC: Laziness Leads to GOD. IACR Cryptol. ePrint Arch. 2018: 580 (2018) - [i129]Prabhanjan Ananth, Aayush Jain, Dakshita Khurana, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness. IACR Cryptol. ePrint Arch. 2018: 615 (2018) - [i128]Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters:
Output Compression, MPC, and iO for Turing Machines. IACR Cryptol. ePrint Arch. 2018: 866 (2018) - [i127]Peter M. R. Rasmussen, Amit Sahai:
Expander Graphs are Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2018: 929 (2018) - [i126]Aayush Jain, Amit Sahai:
How to leverage hardness of constant-degree expanding polynomials over ℝ to build iO. IACR Cryptol. ePrint Arch. 2018: 973 (2018) - [i125]Ashutosh Kumar, Raghu Meka, Amit Sahai:
Leakage-Resilient Secret Sharing. IACR Cryptol. ePrint Arch. 2018: 1138 (2018) - [i124]Dan Boneh, Yuval Ishai, Alain Passelègue, Amit Sahai, David J. Wu:
Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications. IACR Cryptol. ePrint Arch. 2018: 1218 (2018) - [i123]Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai:
Sum-of-Squares Meets Program Obfuscation, Revisited. IACR Cryptol. ePrint Arch. 2018: 1237 (2018) - 2017
- [c155]Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev:
Non-Interactive Multiparty Computation Without Correlated Randomness. ASIACRYPT (3) 2017: 181-211 - [c154]Rex Fernando, Peter M. R. Rasmussen, Amit Sahai:
Preventing CLT Attacks on Obfuscation with Linear Overhead. ASIACRYPT (3) 2017: 242-271 - [c153]Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, Akshay Wadia:
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions. ASIACRYPT (3) 2017: 275-303 - [c152]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization. CRYPTO (2) 2017: 252-279 - [c151]Prabhanjan Ananth, Aayush Jain, Amit Sahai:
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption. EUROCRYPT (1) 2017: 91-121 - [c150]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Patchable Indistinguishability Obfuscation: iO for Evolving Software. EUROCRYPT (3) 2017: 127-155 - [c149]Prabhanjan Ananth, Amit Sahai:
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps. EUROCRYPT (1) 2017: 152-181 - [c148]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation. EUROCRYPT (3) 2017: 247-277 - [c147]Dakshita Khurana, Amit Sahai:
How to Achieve Non-Malleability in One or Two Rounds. FOCS 2017: 564-575 - [c146]Zvika Brakerski, Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai, Gil Segev:
Hierarchical Functional Encryption. ITCS 2017: 8:1-8:27 - [c145]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai:
Round Optimal Concurrent MPC via Strong Simulation. TCC (1) 2017: 743-775 - [i122]Dakshita Khurana, Amit Sahai:
How to Achieve Non-Malleability in One or Two Rounds. Electron. Colloquium Comput. Complex. 24: 100 (2017) - [i121]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
A note on VRFs from Verifiable Functional Encryption. IACR Cryptol. ePrint Arch. 2017: 51 (2017) - [i120]Prabhanjan Ananth, Aayush Jain, Amit Sahai:
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption. IACR Cryptol. ePrint Arch. 2017: 127 (2017) - [i119]Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation. IACR Cryptol. ePrint Arch. 2017: 240 (2017) - [i118]Aayush Jain, Peter M. R. Rasmussen, Amit Sahai:
Threshold Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 257 (2017) - [i117]Dakshita Khurana, Amit Sahai:
Two-Message Non-Malleable Commitments from Standard Sub-exponential Assumptions. IACR Cryptol. ePrint Arch. 2017: 291 (2017) - [i116]Saikrishna Badrinarayanan, Sanjam Garg, Yuval Ishai, Amit Sahai, Akshay Wadia:
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions. IACR Cryptol. ePrint Arch. 2017: 433 (2017) - [i115]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai:
Round Optimal Concurrent MPC via Strong Simulation. IACR Cryptol. ePrint Arch. 2017: 597 (2017) - [i114]Shai Halevi, Yuval Ishai, Abhishek Jain, Ilan Komargodski, Amit Sahai, Eylon Yogev:
Non-Interactive Multiparty Computation without Correlated Randomness. IACR Cryptol. ePrint Arch. 2017: 871 (2017) - [i113]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 956 (2017) - [i112]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Promise Zero Knowledge and its Applications to Round Optimal MPC. IACR Cryptol. ePrint Arch. 2017: 1088 (2017) - [i111]Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Non-Interactive Delegation for Low-Space Non-Deterministic Computation. IACR Cryptol. ePrint Arch. 2017: 1250 (2017) - 2016
- [j22]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Hiding secrets in software: a cryptographic approach to program obfuscation. Commun. ACM 59(5): 113-120 (2016) - [j21]Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits. SIAM J. Comput. 45(3): 882-929 (2016) - [c144]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
Verifiable Functional Encryption. ASIACRYPT (2) 2016: 557-587 - [c143]Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, Mark Zhandry:
How to Generate and Use Universal Samplers. ASIACRYPT (2) 2016: 715-744 - [c142]Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu:
Secure Protocol Transformations. CRYPTO (2) 2016: 430-458 - [c141]Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev:
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption. CRYPTO (2) 2016: 491-520 - [c140]Eric Miles, Amit Sahai, Mark Zhandry:
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13. CRYPTO (2) 2016: 629-658 - [c139]Dakshita Khurana, Hemanta K. Maji, Amit Sahai:
Secure Computation from Elastic Noisy Channels. EUROCRYPT (2) 2016: 184-212 - [c138]Dakshita Khurana, Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:
All Complete Functionalities are Reversible. EUROCRYPT (2) 2016: 213-242 - [c137]Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry:
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits. EUROCRYPT (2) 2016: 764-791 - [c136]Vipul Goyal, Yuval Ishai, Hemanta K. Maji, Amit Sahai, Alexander A. Sherstov:
Bounded-Communication Leakage Resilience via Parity-Resilient Circuits. FOCS 2016: 1-10 - [c135]Vipul Goyal, Dakshita Khurana, Amit Sahai:
Breaking the Three Round Barrier for Non-malleable Commitments. FOCS 2016: 21-30 - [c134]Vipul Goyal, Dakshita Khurana, Ilya Mironov
, Omkant Pandey, Amit Sahai:
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?. ICALP 2016: 29:1-29:15 - [c133]Shweta Agrawal, Ran Gelles, Amit Sahai:
Adaptive protocols for interactive communication. ISIT 2016: 595-599 - [c132]Prabhanjan Vijendra Ananth, Amit Sahai:
Functional Encryption for Turing Machines. TCC (A1) 2016: 125-153 - [c131]Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry:
Secure Obfuscation in a Weak Multilinear Map Model. TCC (B2) 2016: 241-268 - [i110]Eric Miles, Amit Sahai, Mark Zhandry:
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13. IACR Cryptol. ePrint Arch. 2016: 147 (2016) - [i109]Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev:
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security. IACR Cryptol. ePrint Arch. 2016: 281 (2016) - [i108]Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu:
Secure Protocol Transformations. IACR Cryptol. ePrint Arch. 2016: 456 (2016) - [i107]Daniel Kraschewski, Dakshita Khurana, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:
All Complete Functionalities are Reversible. IACR Cryptol. ePrint Arch. 2016: 496 (2016) - [i106]Dakshita Khurana, Hemanta K. Maji, Amit Sahai:
Secure Computation from Elastic Noisy Channels. IACR Cryptol. ePrint Arch. 2016: 497 (2016) - [i105]Eric Miles, Amit Sahai, Mark Zhandry:
Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks. IACR Cryptol. ePrint Arch. 2016: 588 (2016) - [i104]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
Verifiable Functional Encryption. IACR Cryptol. ePrint Arch. 2016: 629 (2016) - [i103]Sanjam Garg, Eric Miles, Pratyay Mukherjee, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry:
Secure Obfuscation in a Weak Multilinear Map Model. IACR Cryptol. ePrint Arch. 2016: 817 (2016) - [i102]Rex Fernando, Peter M. R. Rasmussen, Amit Sahai:
Preventing CLT Zeroizing Attacks on Obfuscation. IACR Cryptol. ePrint Arch. 2016: 1070 (2016) - [i101]Prabhanjan Ananth, Amit Sahai:
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps. IACR Cryptol. ePrint Arch. 2016: 1097 (2016) - 2015
- [j20]Craig Gentry, Jens Groth
, Yuval Ishai, Chris Peikert, Amit Sahai, Adam D. Smith:
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs. J. Cryptol. 28(4): 820-843 (2015) - [j19]Ran Gelles, Amit Sahai, Akshay Wadia:
Private Interactive Communication Across an Adversarial Channel. IEEE Trans. Inf. Theory 61(12): 6860-6875 (2015) - [c130]Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai:
Multi-input Functional Encryption for Unbounded Arity Functions. ASIACRYPT (1) 2015: 27-51 - [c129]Dakshita Khurana, Vanishree Rao, Amit Sahai:
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation. ASIACRYPT (1) 2015: 52-75 - [c128]Vipul Goyal, Divya Gupta, Amit Sahai:
Concurrent Secure Computation via Non-Black Box Simulation. CRYPTO (2) 2015: 23-42 - [c127]Sanjam Garg, Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai:
Cryptography with One-Way Communication. CRYPTO (2) 2015: 191-208 - [c126]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint
, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi
:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations. CRYPTO (1) 2015: 247-266 - [c125]Divya Gupta, Yuval Ishai, Hemanta K. Maji, Amit Sahai:
Secure Computation from Leaky Correlated Randomness. CRYPTO (2) 2015: 701-720 - [c124]Dan Boneh, Divya Gupta, Ilya Mironov
, Amit Sahai:
Hosting Services on an Untrusted Cloud. EUROCRYPT (2) 2015: 404-436 - [c123]Dan Boneh, Kevin Lewi, Mariana Raykova, Amit Sahai, Mark Zhandry, Joe Zimmerman:
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation. EUROCRYPT (2) 2015: 563-594 - [c122]Craig Gentry, Allison Bishop Lewko, Amit Sahai, Brent Waters:
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption. FOCS 2015: 151-170 - [c121]Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai:
On the Practical Security of Inner Product Functional Encryption. Public Key Cryptography 2015: 777-798 - [c120]Vipul Goyal, Huijia Lin, Omkant Pandey, Rafael Pass, Amit Sahai:
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma. TCC (1) 2015: 260-289 - [c119]Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai:
Functional Encryption for Randomized Functionalities. TCC (2) 2015: 325-351 - [c118]Omkant Pandey, Manoj Prabhakaran, Amit Sahai:
Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP. TCC (2) 2015: 638-667 - [c117]Yuval Ishai, Omkant Pandey, Amit Sahai:
Public-Coin Differing-Inputs Obfuscation and Its Applications. TCC (2) 2015: 668-697 - [i100]Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits Resilient to Additive Attacks with Applications to Secure Computation. IACR Cryptol. ePrint Arch. 2015: 154 (2015) - [i99]Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry:
Post-Zeroizing Obfuscation: The case of Evasive Circuits. IACR Cryptol. ePrint Arch. 2015: 167 (2015) - [i98]Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. IACR Cryptol. ePrint Arch. 2015: 596 (2015) - [i97]Prabhanjan Ananth, Abhishek Jain, Amit Sahai:
Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption. IACR Cryptol. ePrint Arch. 2015: 730 (2015) - [i96]