BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Denmark
1 × Iceland
1 × Latvia
1 × Poland
2 × Canada
7 × USA
Collaborated with:
R.Ostrovsky M.Prabhakaran Y.Ishai E.Kushilevitz B.Waters O.Pandey S.P.Vadhan M.W.Bern A.Wadia N.Chandran J.Groth C.Dwork M.Naor O.Goldreich M.Charikar S.Garg C.Gentry V.Goyal A.Jain R.Canetti Y.Lindell D.Genkin E.Tromer M.A.Bender A.Fernández D.Ron R.Fagin V.Guruswami J.M.Kleinberg P.Raghavan X.Li D.Zuckerman E.Lehman D.Liu R.Panigrahy A.Rasala A.Shelat
Talks about:
comput (5) secur (5) knowledg (4) zero (4) encrypt (3) applic (3) without (2) univers (2) statist (2) compos (2)

Person: Amit Sahai

DBLP DBLP: Sahai:Amit

Contributed to:

ICALP (1) 20142014
STOC 20142014
ICALP (1) 20132013
STOC 20132013
ICALP (2) 20082008
STOC 20082008
ICALP 20072007
STOC 20072007
STOC 20042004
STOC 20022002
STOC 20002000
STOC 19981998
STOC 19961996

Wrote 19 papers:

ICALP-v1-2014-PrabhakaranSW #using
Secure Computation Using Leaky Tokens (MP, AS, AW), pp. 907–918.
Circuits resilient to additive attacks with applications to secure computation (DG, YI, MP, AS, ET), pp. 495–504.
STOC-2014-SahaiW #encryption #how #obfuscation
How to use indistinguishability obfuscation: deniable encryption, and more (AS, BW), pp. 475–484.
ICALP-v1-2013-IshaiKLOPSZ #generative #pseudo #robust
Robust Pseudorandom Generators (YI, EK, XL, RO, MP, AS, DZ), pp. 576–588.
STOC-2013-GargGSW #encryption
Witness encryption and its applications (SG, CG, AS, BW), pp. 467–476.
ICALP-C-2008-GoyalJPS #bound #encryption #policy
Bounded Ciphertext Policy Attribute Based Encryption (VG, AJ, OP, AS), pp. 579–591.
STOC-2008-IshaiKOS #constant #encryption
Cryptography with constant computational overhead (YI, EK, RO, AS), pp. 433–442.
ICALP-2007-ChandranGS #random
Ring Signatures of Sub-linear Size Without Random Oracles (NC, JG, AS), pp. 423–434.
Private Locally Decodable Codes (RO, OP, AS), pp. 387–398.
STOC-2007-IshaiKOS #multi
Zero-knowledge from secure multiparty computation (YI, EK, RO, AS), pp. 21–30.
Batch codes and their applications (YI, EK, RO, AS), pp. 262–271.
STOC-2004-PrabhakaranS #security
New notions of security: achieving universal composability without trusted setup (MP, AS), pp. 242–251.
STOC-2002-CanettiLOS #composition #multi
Universally composable two-party and multi-party secure computation (RC, YL, RO, AS), pp. 494–503.
STOC-2002-CharikarLLPPRSS #approximate #complexity #modelling
Approximating the smallest grammar: Kolmogorov complexity in natural models (MC, EL, DL, RP, MP, AR, AS, AS), pp. 792–801.
STOC-2000-CharikarFGKRS #query
Query strategies for priced information (MC, RF, VG, JMK, PR, AS), pp. 582–591.
STOC-1998-BenderFRSV #graph #power of
The Power of a Pebble: Exploring and Mapping Directed Graphs (MAB, AF, DR, AS, SPV), pp. 269–278.
STOC-1998-DworkNS #concurrent
Concurrent Zero-Knowledge (CD, MN, AS), pp. 409–418.
STOC-1998-GoldreichSV #statistics
Honest-Verifier Statistical Zero-Knowledge Equals General Statistical Zero-Knowledge (OG, AS, SPV), pp. 399–408.
Pushing Disks Together — The Continuous-Motion Case (MWB, AS), pp. 119–125.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.