Melissa Chase

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Anonymous tokens with stronger metadata bit hiding from algebraic MACs
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Amortizing rate-1 OT and applications to PIR and PSI2023-04-13Paper
Private set intersection in the internet setting from lightweight oblivious PRF2022-12-07Paper
Homomorphic Encryption Standard
Protecting Privacy through Homomorphic Encryption
2022-11-02Paper
Reusable non-interactive secure computation2020-03-09Paper
Simplifying design and analysis of complex predicate encryption schemes
Lecture Notes in Computer Science
2017-06-13Paper
Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Efficient zero-knowledge proof of algebraic and non-algebraic statements with applications to privacy preserving credentials
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Constant-size structure-preserving signatures: generic constructions and simple assumptions
Journal of Cryptology
2016-10-13Paper
A study of pair encodings: predicate encryption in prime order groups
Theory of Cryptography
2016-04-08Paper
Executable proofs, input-size hiding secure computation and a new ideal world
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Anonymous transferable e-cash
Lecture Notes in Computer Science
2015-08-27Paper
Déjà Q: using dual systems to revisit \(q\)-type assumptions
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Mercurial commitments with applications to zero-knowledge sets
Journal of Cryptology
2013-06-27Paper
Verifiable elections that scale for free
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Constant-size structure-preserving signatures: generic constructions and simple assumptions
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Succinct malleable NIZKs and an application to compact shuffles
Theory of Cryptography
2013-03-18Paper
A new hash-and-sign approach and structure-preserving signatures from DLIN
Lecture Notes in Computer Science
2012-09-25Paper
Secure database commitments and universal arguments of quasi knowledge
Lecture Notes in Computer Science
2012-09-25Paper
Malleable proof systems and applications
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Functional Re-encryption and Collusion-Resistant Obfuscation
Theory of Cryptography
2012-06-15Paper
Structured encryption and controlled disclosure
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Randomizable Proofs and Delegatable Anonymous Credentials
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Compact E-Cash and Simulatable VRFs Revisited
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Simulatable VRFs with Applications to Multi-theorem NIZK
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Mercurial Commitments with Applications to Zero-Knowledge Sets
Lecture Notes in Computer Science
2008-05-06Paper
P-signatures and Noninteractive Anonymous Credentials
Theory of Cryptography
2008-03-05Paper
On Signatures of Knowledge
Lecture Notes in Computer Science
2007-09-04Paper
Multi-authority Attribute Based Encryption
Theory of Cryptography
2007-08-30Paper


Research outcomes over time


This page was built for person: Melissa Chase