Amit Sahai

From MaRDI portal
Person:775984

Available identifiers

zbMath Open sahai.amitDBLPs/AmitSahaiWikidataQ18631258 ScholiaQ18631258MaRDI QIDQ775984

List of research outcomes





PublicationDate of PublicationType
Witness semantic security2024-11-13Paper
Two-round concurrent 2PC from sub-exponential LWE2024-08-30Paper
Refuting the dream XOR lemma via ideal obfuscation and resettable MPC2024-06-25Paper
Hard languages in NP \(\cap\) coNP and NIZK proofs from unstructured hardness2024-05-08Paper
Indistinguishability obfuscation2024-03-20Paper
Computational wiretap coding from indistinguishability obfuscation2024-02-06Paper
Streaming functional encryption2024-02-06Paper
Round-optimal black-box MPC in the plain model2024-02-02Paper
Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)2024-01-16Paper
Black-box reusable NISC with random oracles2023-12-08Paper
Beyond the Csiszár-Körner bound: best-possible wiretap coding via obfuscation2023-11-21Paper
Non-interactive publicly-verifiable delegation of committed programs2023-11-16Paper
Indistinguishability obfuscation from well-founded assumptions2023-11-14Paper
https://portal.mardi4nfdi.de/entity/Q60593652023-11-02Paper
Efficient NIZKs from LWE via polynomial reconstruction and ``MPC in the head2023-08-16Paper
Round-optimal black-box secure computation from two-round malicious OT2023-08-14Paper
Beyond the Csiszár-Korner bound: best-possible wiretap coding via obfuscation2023-06-28Paper
Secure MPC: laziness leads to GOD2023-03-29Paper
https://portal.mardi4nfdi.de/entity/Q58757892023-02-03Paper
Amplifying the security of functional encryption, unconditionally2022-11-09Paper
Homomorphic Encryption Standard2022-11-02Paper
Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)2022-08-30Paper
Round-optimal black-box protocol compilers2022-08-30Paper
On the round complexity of black-box secure MPC2022-04-22Paper
On pseudorandom encodings2022-03-23Paper
Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification2021-12-08Paper
Statistical ZAP arguments2021-12-01Paper
Combiners for functional encryption, unconditionally2021-12-01Paper
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More2021-05-27Paper
Private circuits: a modular approach2020-06-30Paper
Output compression, MPC, and iO for Turing machines2020-05-20Paper
From FE combiners to secure MPC and back2020-04-30Paper
Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification2020-03-09Paper
Simultaneous amplification: the case of non-interactive zero-knowledge2020-03-09Paper
Cryptographic sensing2020-03-09Paper
Sum-of-squares meets program obfuscation, revisited2020-02-04Paper
How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\)2020-02-04Paper
Succinct delegation for low-space non-deterministic computation2019-08-22Paper
Upgrading to functional encryption2018-12-11Paper
Exploring crypto dark matter: new simple PRF candidates and their applications2018-12-06Paper
Improved algorithms for optimal embeddings2018-11-05Paper
Promise zero knowledge and its applications to round optimal MPC2018-09-26Paper
Quasi-optimal SNARGs via linear multi-prover interactive proofs2018-07-17Paper
Statistical witness indistinguishability (and more) in two messages2018-07-17Paper
https://portal.mardi4nfdi.de/entity/Q46380572018-05-03Paper
Preventing CLT attacks on obfuscation with linear overhead2018-02-23Paper
Non-interactive multiparty computation without correlated randomness2018-02-23Paper
Two-message witness indistinguishability and secure computation in the plain model from new assumptions2018-02-23Paper
Round optimal concurrent MPC via strong simulation2018-01-19Paper
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?2017-12-19Paper
Indistinguishability obfuscation for Turing machines: constant overhead and amortization2017-11-15Paper
Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software2017-06-23Paper
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation2017-06-23Paper
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps2017-06-13Paper
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption2017-06-13Paper
Private interactive communication across an adversarial channel2017-05-19Paper
Efficient Coding for Interactive Communication2017-05-16Paper
Private Interactive Communication Across an Adversarial Channel2017-04-28Paper
How to Generate and Use Universal Samplers2017-01-06Paper
Verifiable Functional Encryption2017-01-06Paper
Secure Obfuscation in a Weak Multilinear Map Model2016-12-22Paper
Secure Protocol Transformations2016-10-27Paper
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption2016-10-27Paper
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH132016-10-27Paper
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits2016-07-15Paper
Secure Computation from Elastic Noisy Channels2016-07-15Paper
All Complete Functionalities are Reversible2016-07-15Paper
Candidate indistinguishability obfuscation and functional encryption for all circuits2016-07-04Paper
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation2016-06-10Paper
Multi-input Functional Encryption for Unbounded Arity Functions2016-06-10Paper
Functional Encryption for Turing Machines2016-03-23Paper
Secure Computation from Leaky Correlated Randomness2015-12-10Paper
Cryptography with One-Way Communication2015-12-10Paper
Concurrent Secure Computation via Non-Black Box Simulation2015-12-10Paper
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations2015-12-10Paper
A complete problem for statistical zero knowledge2015-12-07Paper
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation2015-09-30Paper
Hosting Services on an Untrusted Cloud2015-09-30Paper
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption2015-09-10Paper
On the Practical Security of Inner Product Functional Encryption2015-08-27Paper
https://portal.mardi4nfdi.de/entity/Q55013292015-08-03Paper
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma2015-07-06Paper
Public-Coin Differing-Inputs Obfuscation and Its Applications2015-07-06Paper
Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP2015-07-06Paper
Functional Encryption for Randomized Functionalities2015-07-06Paper
How to use indistinguishability obfuscation2015-06-26Paper
Circuits resilient to additive attacks with applications to secure computation2015-06-26Paper
Black-Box Separations for Differentially Private Protocols2015-01-06Paper
Query strategies for priced information (extended abstract)2014-09-26Paper
Witness encryption and its applications2014-08-07Paper
Efficient and Explicit Coding for Interactive Communication2014-07-30Paper
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy2014-07-25Paper
Extracting Correlations2014-07-25Paper
Secure Computation Using Leaky Tokens2014-07-01Paper
Protecting Obfuscation against Algebraic Attacks2014-05-27Paper
Multi-input Functional Encryption2014-05-27Paper
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation2014-05-27Paper
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation2014-05-27Paper
Obfuscation for Evasive Functions2014-02-18Paper
Statistical Concurrent Non-malleable Zero Knowledge2014-02-18Paper
On the (im)possibility of obfuscating programs2014-02-17Paper
New Techniques for Noninteractive Zero-Knowledge2014-02-17Paper
Discrete Gaussian Leftover Hash Lemma over Infinite Domains2013-12-10Paper
Zero knowledge LTCs and their applications2013-10-04Paper
Attribute-based encryption for circuits from multilinear maps2013-09-17Paper
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures2013-09-02Paper
Secure computation against adaptive auxiliary information2013-09-02Paper
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols2013-09-02Paper
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based2013-09-02Paper
Robust pseudorandom generators2013-08-06Paper
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles2013-06-27Paper
Predicate encryption supporting disjunctions, polynomial equations, and inner products2013-06-27Paper
Efficient noninteractive proof systems for bilinear groups2013-02-04Paper
Dynamic credentials and ciphertext delegation for attribute-based encryption2012-09-25Paper
Adaptively secure multi-party computation with dishonest majority2012-09-25Paper
New impossibility results for concurrent composition and a non-interactive completeness theorem for secure computation2012-09-25Paper
Concurrently secure computation in constant rounds2012-06-29Paper
On Efficient Zero-Knowledge PCPs2012-06-15Paper
Resettable cryptography in constant rounds -- the case of zero knowledge2011-12-02Paper
Round optimal blind signatures2011-08-12Paper
Constant-rate oblivious transfer from noisy channels2011-08-12Paper
Leakage-resilient zero knowledge2011-08-12Paper
Cryptography with tamperable and leaky memory2011-08-12Paper
Efficient non-interactive secure computation2011-05-27Paper
Functional encryption: definitions and challenges2011-05-19Paper
Bringing people of different beliefs together to do UC2011-05-19Paper
Fully secure accountable-authority identity-based encryption2011-03-15Paper
On Invertible Sampling and Adaptive Security2010-12-07Paper
Interactive locking, zero-knowledge PCPs, and unconditional cryptography2010-08-24Paper
New notions of security: achieving universal composability without trusted setup2010-08-15Paper
Batch codes and their applications2010-08-15Paper
Approximating the smallest grammar2010-08-05Paper
Universally composable two-party and multi-party secure computation2010-08-05Paper
Zero-knowledge proofs from secure multiparty computation2010-07-07Paper
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption2010-06-01Paper
Founding Cryptography on Tamper-Proof Hardware Tokens2010-02-24Paper
On complete primitives for fairness2010-02-24Paper
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems2009-10-20Paper
Resettably Secure Computation2009-05-12Paper
Attribute-based encryption2009-03-24Paper
Secure Arithmetic Computation with No Honest Majority2009-03-03Paper
Founding Cryptography on Oblivious Transfer – Efficiently2009-02-10Paper
Cryptography with constant computational overhead2009-01-05Paper
https://portal.mardi4nfdi.de/entity/Q35495932009-01-05Paper
The Smallest Grammar Problem2008-12-21Paper
Bounded Ciphertext Policy Attribute Based Encryption2008-08-19Paper
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions2008-05-15Paper
Fuzzy Identity-Based Encryption2008-05-06Paper
New Constructions for UC Secure Computation Using Tamper-Proof Hardware2008-04-15Paper
Precise Concurrent Zero Knowledge2008-04-15Paper
Efficient Non-interactive Proof Systems for Bilinear Groups2008-04-15Paper
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products2008-04-15Paper
Concurrent zero-knowledge2008-01-14Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Ring Signatures of Sub-linear Size Without Random Oracles2007-11-28Paper
Private Locally Decodable Codes2007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Perfect Non-interactive Zero Knowledge for NP2007-09-24Paper
Sequential Aggregate Signatures and Multisignatures Without Random Oracles2007-09-24Paper
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys2007-09-24Paper
Private Circuits II: Keeping Secrets in Tamperable Circuits2007-09-24Paper
Non-interactive Zaps and New Techniques for NIZK2007-09-04Paper
Theory of Cryptography2007-02-12Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Theory of Cryptography2005-12-07Paper
Minimizing Wirelength in Zero and Bounded Skew Clock Trees2005-02-28Paper
https://portal.mardi4nfdi.de/entity/Q45425592004-01-27Paper
https://portal.mardi4nfdi.de/entity/Q47837452002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q47837162002-12-08Paper
https://portal.mardi4nfdi.de/entity/Q49493362002-12-02Paper
https://portal.mardi4nfdi.de/entity/Q45425582002-09-17Paper
https://portal.mardi4nfdi.de/entity/Q27788552002-03-21Paper
https://portal.mardi4nfdi.de/entity/Q49418742000-08-27Paper
https://portal.mardi4nfdi.de/entity/Q49418772000-08-27Paper
https://portal.mardi4nfdi.de/entity/Q49418822000-03-19Paper
https://portal.mardi4nfdi.de/entity/Q42493492000-03-07Paper
Pushing disks together -- The continuous-motion case1999-10-06Paper
https://portal.mardi4nfdi.de/entity/Q42522871999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42493371999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42284611999-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42249351999-01-17Paper

Research outcomes over time

This page was built for person: Amit Sahai