Amit Sahai

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Witness semantic security2024-11-13Paper
Two-round concurrent 2PC from sub-exponential LWE2024-08-30Paper
Refuting the dream XOR lemma via ideal obfuscation and resettable MPC2024-06-25Paper
Hard languages in NP \(\cap\) coNP and NIZK proofs from unstructured hardness2024-05-08Paper
Indistinguishability obfuscation
International Congress of Mathematicians
2024-03-20Paper
Computational wiretap coding from indistinguishability obfuscation
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Streaming functional encryption
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Round-optimal black-box MPC in the plain model
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Black-box reusable NISC with random oracles
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation
Journal of Cryptology
2023-11-21Paper
Non-interactive publicly-verifiable delegation of committed programs
Lecture Notes in Computer Science
2023-11-16Paper
Indistinguishability obfuscation from well-founded assumptions
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing
2023-11-14Paper
scientific article; zbMATH DE number 7759458 (Why is no real title available?)
(available as arXiv preprint)
2023-11-02Paper
Efficient NIZKs from LWE via polynomial reconstruction and ``MPC in the head
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
Round-optimal black-box secure computation from two-round malicious OT
Theory of Cryptography
2023-08-14Paper
Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Secure MPC: laziness leads to GOD2023-03-29Paper
scientific article; zbMATH DE number 7650430 (Why is no real title available?)2023-02-03Paper
Amplifying the security of functional encryption, unconditionally2022-11-09Paper
Homomorphic Encryption Standard
Protecting Privacy through Homomorphic Encryption
2022-11-02Paper
Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)2022-08-30Paper
Round-optimal black-box protocol compilers2022-08-30Paper
On the round complexity of black-box secure MPC2022-04-22Paper
On pseudorandom encodings2022-03-23Paper
Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification2021-12-08Paper
Statistical ZAP arguments2021-12-01Paper
Combiners for functional encryption, unconditionally2021-12-01Paper
How to use indistinguishability obfuscation: deniable encryption, and more
SIAM Journal on Computing
2021-05-27Paper
Private circuits: a modular approach2020-06-30Paper
Output compression, MPC, and iO for Turing machines2020-05-20Paper
From FE combiners to secure MPC and back2020-04-30Paper
Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification2020-03-09Paper
Simultaneous amplification: the case of non-interactive zero-knowledge2020-03-09Paper
Cryptographic sensing2020-03-09Paper
Sum-of-squares meets program obfuscation, revisited2020-02-04Paper
How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)2020-02-04Paper
Succinct delegation for low-space non-deterministic computation
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
Upgrading to functional encryption2018-12-11Paper
Exploring crypto dark matter: new simple PRF candidates and their applications2018-12-06Paper
Improved algorithms for optimal embeddings
ACM Transactions on Algorithms
2018-11-05Paper
Promise zero knowledge and its applications to round optimal MPC2018-09-26Paper
Quasi-optimal SNARGs via linear multi-prover interactive proofs2018-07-17Paper
Statistical witness indistinguishability (and more) in two messages2018-07-17Paper
scientific article; zbMATH DE number 6866298 (Why is no real title available?)2018-05-03Paper
Preventing CLT attacks on obfuscation with linear overhead2018-02-23Paper
Non-interactive multiparty computation without correlated randomness2018-02-23Paper
Two-message witness indistinguishability and secure computation in the plain model from new assumptions2018-02-23Paper
Round optimal concurrent MPC via strong simulation2018-01-19Paper
Do distributed differentially-private protocols require oblivious transfer?2017-12-19Paper
Indistinguishability obfuscation for Turing machines: constant overhead and amortization2017-11-15Paper
Patchable indistinguishability obfuscation: \(i\mathcal {O}\) for evolving software
Lecture Notes in Computer Science
2017-06-23Paper
Lattice-based SNARGs and their application to more efficient obfuscation
Lecture Notes in Computer Science
2017-06-23Paper
Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps
Lecture Notes in Computer Science
2017-06-13Paper
Robust transforming combiners from indistinguishability obfuscation to functional encryption
Lecture Notes in Computer Science
2017-06-13Paper
Private interactive communication across an adversarial channel
Proceedings of the 5th conference on Innovations in theoretical computer science
2017-05-19Paper
Efficient Coding for Interactive Communication
IEEE Transactions on Information Theory
2017-05-16Paper
Private Interactive Communication Across an Adversarial Channel
IEEE Transactions on Information Theory
2017-04-28Paper
How to Generate and Use Universal Samplers
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Verifiable functional encryption
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Secure Obfuscation in a Weak Multilinear Map Model
Theory of Cryptography
2016-12-22Paper
Secure protocol transformations
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Post-zeroizing obfuscation: new mathematical tools, and the case of evasive circuits
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Secure computation from elastic noisy channels
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
All complete functionalities are reversible
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Candidate indistinguishability obfuscation and functional encryption for all circuits
SIAM Journal on Computing
2016-07-04Paper
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Multi-input functional encryption for unbounded arity functions
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Functional Encryption for Turing Machines
Theory of Cryptography
2016-03-23Paper
Secure computation from leaky correlated randomness
Lecture Notes in Computer Science
2015-12-10Paper
Cryptography with One-Way Communication
Lecture Notes in Computer Science
2015-12-10Paper
Concurrent secure computation via non-black box simulation
Lecture Notes in Computer Science
2015-12-10Paper
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
Lecture Notes in Computer Science
2015-12-10Paper
A complete problem for statistical zero knowledge
Journal of the ACM
2015-12-07Paper
Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Hosting services on an untrusted cloud
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
On constant-round concurrent zero-knowledge from a knowledge assumption
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
On the practical security of inner product functional encryption
Lecture Notes in Computer Science
2015-08-27Paper
Frugality in path auctions2015-08-03Paper
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma
Theory of Cryptography
2015-07-06Paper
Public-coin differing-inputs obfuscation and its applications
Theory of Cryptography
2015-07-06Paper
Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for NP
Theory of Cryptography
2015-07-06Paper
Functional encryption for randomized functionalities
Theory of Cryptography
2015-07-06Paper
How to use indistinguishability obfuscation
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
Circuits resilient to additive attacks with applications to secure computation
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
Black-box separations for differentially private protocols
Lecture Notes in Computer Science
2015-01-06Paper
Query strategies for priced information (extended abstract)
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
Witness encryption and its applications
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
Efficient and Explicit Coding for Interactive Communication
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science
2014-07-30Paper
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy
2009 50th Annual IEEE Symposium on Foundations of Computer Science
2014-07-25Paper
Extracting correlations
2009 50th Annual IEEE Symposium on Foundations of Computer Science
2014-07-25Paper
Secure computation using leaky tokens
Automata, Languages, and Programming
2014-07-01Paper
Protecting obfuscation against algebraic attacks
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Multi-input functional encryption
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Replacing a random oracle: full domain hash from indistinguishability obfuscation
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Obfuscation for evasive functions
Theory of Cryptography
2014-02-18Paper
Statistical concurrent non-malleable zero knowledge
Theory of Cryptography
2014-02-18Paper
On the (im)possibility of obfuscating programs
Journal of the ACM
2014-02-17Paper
New techniques for noninteractive zero-knowledge
Journal of the ACM
2014-02-17Paper
Discrete Gaussian leftover hash lemma over infinite domains
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Zero knowledge LTCs and their applications
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
2013-10-04Paper
Attribute-based encryption for circuits from multilinear maps
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Secure computation against adaptive auxiliary information
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Robust pseudorandom generators
Automata, Languages, and Programming
2013-08-06Paper
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles
Journal of Cryptology
2013-06-27Paper
Predicate encryption supporting disjunctions, polynomial equations, and inner products
Journal of Cryptology
2013-06-27Paper
Efficient noninteractive proof systems for bilinear groups
SIAM Journal on Computing
2013-02-04Paper
Dynamic credentials and ciphertext delegation for attribute-based encryption
Lecture Notes in Computer Science
2012-09-25Paper
Adaptively secure multi-party computation with dishonest majority
Lecture Notes in Computer Science
2012-09-25Paper
New impossibility results for concurrent composition and a non-interactive completeness theorem for secure computation
Lecture Notes in Computer Science
2012-09-25Paper
Concurrently secure computation in constant rounds
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
On Efficient Zero-Knowledge PCPs
Theory of Cryptography
2012-06-15Paper
Resettable cryptography in constant rounds -- the case of zero knowledge
Lecture Notes in Computer Science
2011-12-02Paper
Round optimal blind signatures
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Constant-rate oblivious transfer from noisy channels
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Leakage-resilient zero knowledge
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Cryptography with tamperable and leaky memory
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Efficient non-interactive secure computation
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Functional encryption: definitions and challenges
Theory of Cryptography
2011-05-19Paper
Bringing people of different beliefs together to do UC
Theory of Cryptography
2011-05-19Paper
Fully secure accountable-authority identity-based encryption
Public Key Cryptography – PKC 2011
2011-03-15Paper
On Invertible Sampling and Adaptive Security
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Interactive locking, zero-knowledge PCPs, and unconditional cryptography
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
New notions of security: achieving universal composability without trusted setup
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing
2010-08-15Paper
Batch codes and their applications
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing
2010-08-15Paper
Approximating the smallest grammar
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
2010-08-05Paper
Universally composable two-party and multi-party secure computation
Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
2010-08-05Paper
Zero-knowledge proofs from secure multiparty computation
SIAM Journal on Computing
2010-07-07Paper
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Founding Cryptography on Tamper-Proof Hardware Tokens
Theory of Cryptography
2010-02-24Paper
On complete primitives for fairness
Theory of Cryptography
2010-02-24Paper
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Resettably Secure Computation
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Attribute-based encryption2009-03-24Paper
Secure Arithmetic Computation with No Honest Majority
Theory of Cryptography
2009-03-03Paper
Founding Cryptography on Oblivious Transfer – Efficiently
Lecture Notes in Computer Science
2009-02-10Paper
Cryptography with constant computational overhead2009-01-05Paper
scientific article; zbMATH DE number 5485433 (Why is no real title available?)2009-01-05Paper
The Smallest Grammar Problem
IEEE Transactions on Information Theory
2008-12-21Paper
Bounded Ciphertext Policy Attribute Based Encryption
Automata, Languages and Programming
2008-08-19Paper
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions
Advances in Cryptology – ASIACRYPT 2007
2008-05-15Paper
Fuzzy Identity-Based Encryption
Lecture Notes in Computer Science
2008-05-06Paper
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Precise Concurrent Zero Knowledge
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Efficient Non-interactive Proof Systems for Bilinear Groups
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Concurrent zero-knowledge
Journal of the ACM
2008-01-14Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Ring Signatures of Sub-linear Size Without Random Oracles
Automata, Languages and Programming
2007-11-28Paper
Private Locally Decodable Codes
Automata, Languages and Programming
2007-11-28Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Perfect Non-interactive Zero Knowledge for NP
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Sequential Aggregate Signatures and Multisignatures Without Random Oracles
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Private Circuits II: Keeping Secrets in Tamperable Circuits
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Non-interactive Zaps and New Techniques for NIZK
Lecture Notes in Computer Science
2007-09-04Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Theory of Cryptography
Lecture Notes in Computer Science
2005-12-07Paper
Minimizing Wirelength in Zero and Bounded Skew Clock Trees
SIAM Journal on Discrete Mathematics
2005-02-28Paper
scientific article; zbMATH DE number 1775426 (Why is no real title available?)2004-01-27Paper
scientific article; zbMATH DE number 1842511 (Why is no real title available?)2002-12-08Paper
scientific article; zbMATH DE number 1842483 (Why is no real title available?)2002-12-08Paper
scientific article; zbMATH DE number 1440890 (Why is no real title available?)2002-12-02Paper
scientific article; zbMATH DE number 1775425 (Why is no real title available?)2002-09-17Paper
scientific article; zbMATH DE number 1722684 (Why is no real title available?)2002-03-21Paper
scientific article; zbMATH DE number 1418312 (Why is no real title available?)2000-08-27Paper
scientific article; zbMATH DE number 1418315 (Why is no real title available?)2000-08-27Paper
scientific article; zbMATH DE number 1418320 (Why is no real title available?)2000-03-19Paper
scientific article; zbMATH DE number 1302864 (Why is no real title available?)2000-03-07Paper
Pushing disks together -- The continuous-motion case
Discrete & Computational Geometry
1999-10-06Paper
scientific article; zbMATH DE number 1305406 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1302853 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1256726 (Why is no real title available?)1999-03-01Paper
scientific article; zbMATH DE number 1241395 (Why is no real title available?)1999-01-17Paper


Research outcomes over time


This page was built for person: Amit Sahai