Cryptographers' World
 

Amit Sahai


Author's Web Page Link

39 papers in database with 2726 citations StarStarStar

H-number: 25

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Benny Applebaum,  David Cash,  Chris Peikert,  Amit Sahai,  Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems, pp. 595 - 618, CRYPTO 2009.

[Electronic Edition][Cited 15 times ]

2. Vipul Goyal,  Amit Sahai,  Resettably Secure Computation, pp. 54 - 71, EUROCRYPT 2009.

[Electronic Edition][Cited 6 times ]

3. Yuval Ishai,  Manoj Prabhakaran,  Amit Sahai,  Secure Arithmetic Computation with No Honest Majority, pp. 294 - 314, TCC 2009.

[Electronic Edition][Cited 10 times ]

4. Yuval Ishai,  Manoj Prabhakaran,  Amit Sahai,  Founding Cryptography on Oblivious Transfer - Efficiently, pp. 572 - 591, CRYPTO 2008.

[Electronic Edition][Cited 44 times ]

5. Yuval Ishai,  Eyal Kushilevitz,  Rafail Ostrovsky,  Amit Sahai,  Cryptography with constant computational overhead, pp. 433 - 442, STOC 2008.

[Electronic Edition][Cited 12 times ]

6. Jonathan Katz,  Amit Sahai,  Brent Waters,  Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products, pp. 146 - 162, EUROCRYPT 2008.

[Electronic Edition][Cited 99 times Red Star]

7. Jens Groth,  Amit Sahai,  Efficient Non-interactive Proof Systems for Bilinear Groups, pp. 415 - 432, EUROCRYPT 2008.

[Electronic Edition][Cited 81 times Red Star]

8. Omkant Pandey,  Rafael Pass,  Amit Sahai,  Wei-Lung Dustin Tseng,  Muthuramakrishnan Venkitasubramaniam,  Precise Concurrent Zero Knowledge, pp. 397 - 414, EUROCRYPT 2008.

[Electronic Edition][Cited 8 times ]

9. Nishanth Chandran,  Vipul Goyal,  Amit Sahai,  New Constructions for UC Secure Computation Using Tamper-Proof Hardware, pp. 545 - 562, EUROCRYPT 2008.

[Electronic Edition][Cited 20 times ]

10. Nishanth Chandran,  Vipul Goyal,  Rafail Ostrovsky,  Amit Sahai,  Covert Multi-Party Computation, pp. 238 - 248, FOCS 2007.

[Electronic Edition][Cited 3 times ]

11. Yuval Ishai,  Eyal Kushilevitz,  Rafail Ostrovsky,  Amit Sahai,  Zero-knowledge from secure multiparty computation, pp. 21 - 30, STOC 2007.

[Electronic Edition][Cited 23 times ]

12. Vipul Goyal,  Ryan Moriarty,  Rafail Ostrovsky,  Amit Sahai,  Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions, pp. 444 - 459, ASIACRYPT 2007.

[Electronic Edition][Cited 4 times ]

13. Yuval Ishai,  Eyal Kushilevitz,  Rafail Ostrovsky,  Amit Sahai,  Cryptography from Anonymity, pp. 239 - 248, FOCS 2006.

[Electronic Edition][Cited 15 times ]

14. Boaz Barak,  Manoj Prabhakaran,  Amit Sahai,  Concurrent Non-Malleable Zero Knowledge, pp. 345 - 354, FOCS 2006.

[Electronic Edition][Cited 32 times ]

15. Jens Groth,  Rafail Ostrovsky,  Amit Sahai,  Perfect Non-interactive Zero Knowledge for NP, pp. 339 - 358, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 100 times Red StarRed Star]

16. Dan Boneh,  Amit Sahai,  Brent Waters,  Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys, pp. 573 - 592, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 100 times Red StarRed Star]

17. Steve Lu,  Rafail Ostrovsky,  Amit Sahai,  Hovav Shacham,  Brent Waters,  Sequential Aggregate Signatures and Multisignatures Without Random Oracles, pp. 465 - 485, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 92 times Red Star]

18. Yuval Ishai,  Manoj Prabhakaran,  Amit Sahai,  David Wagner,  Private Circuits II: Keeping Secrets in Tamperable Circuits, pp. 308 - 327, EUROCRYPT 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 26 times ]

19. Daniele Micciancio,  Shien Jin Ong,  Amit Sahai,  Salil P. Vadhan,  Concurrent Zero Knowledge Without Complexity Assumptions, pp. 1 - 20, TCC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

20. Jens Groth,  Rafail Ostrovsky,  Amit Sahai,  Non-interactive Zaps and New Techniques for NIZK, pp. 97 - 111, CRYPTO 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 35 times ]

21. Boaz Barak,  Amit Sahai,  How To Play Almost Any Mental Game Over The Net - Concurrent Composition via Super-Polynomial Simulation, pp. 543 - 552, FOCS 2005.

[Electronic Edition][Cited 28 times ]

22. Amit Sahai,  Brent Waters,  Fuzzy Identity-Based Encryption, pp. 457 - 473, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 232 times Red StarRed Star]

23. Manoj Prabhakaran,  Amit Sahai,  Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation, pp. 104 - 127, TCC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 7 times ]

24. Amit Sahai,  Secure Protocols for Complex Tasks in Complex Environments, pp. 14 - 16, INDOCRYPT 2004.

[Electronic Edition][No citation]

25. Yevgeniy Dodis,  Shien Jin Ong,  Manoj Prabhakaran,  Amit Sahai,  On the (Im)possibility of Cryptography with Imperfect Randomness, pp. 196 - 205, FOCS 2004.

[Electronic Edition][Cited 25 times ]

26. Manoj Prabhakaran,  Amit Sahai,  New notions of security: achieving universal composability without trusted setup, pp. 242 - 251, STOC 2004.

[Electronic Edition][Cited 61 times Red Star]

27. Ben Lynn,  Manoj Prabhakaran,  Amit Sahai,  Positive Results and Techniques for Obfuscation, pp. 20 - 39, EUROCRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 88 times Red Star]

28. Yuval Ishai,  Amit Sahai,  David Wagner,  Private Circuits: Securing Hardware against Probing Attacks, pp. 463 - 481, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 84 times Red Star]

29. Manoj Prabhakaran,  Alon Rosen,  Amit Sahai,  Concurrent Zero Knowledge with Logarithmic Round-Complexity, pp. 366 - 375, FOCS 2002.

[Electronic Edition][Cited 84 times Red Star]

30. Boaz Barak,  Oded Goldreich,  Russell Impagliazzo,  Steven Rudich,  Amit Sahai,  Salil P. Vadhan,  Ke Yang,  On the (Im)possibility of Obfuscating Programs, pp. 1 - 18, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 441 times Red StarRed StarRed Star]

31. Alfredo De Santis,  Giovanni Di Crescenzo,  Rafail Ostrovsky,  Giuseppe Persiano,  Amit Sahai,  Robust Non-interactive Zero Knowledge, pp. 566 - 598, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 111 times Red StarRed Star]

32. Yevgeniy Dodis,  Amit Sahai,  Adam Smith,  On Perfect and Adaptive Security in Exposure-Resilient Cryptography, pp. 301 - 324, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 50 times Red Star]

33. Ran Canetti,  Yevgeniy Dodis,  Shai Halevi,  Eyal Kushilevitz,  Amit Sahai,  Exposure-Resilient Functions and All-or-Nothing Transforms, pp. 453 - 469, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 115 times Red StarRed Star]

34. Oded Goldreich,  Amit Sahai,  Salil P. Vadhan,  Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK, pp. 467 - 484, CRYPTO 1999.

[Electronic Edition][Cited 39 times ]

35. Anna Lysyanskaya,  Ronald L. Rivest,  Amit Sahai,  Stefan Wolf,  Pseudonym Systems, pp. 184 - 199, SAC 1999.

[Electronic Edition][Cited 289 times Red StarRed StarRed Star]

36. Ravi Kumar,  Sridhar Rajagopalan,  Amit Sahai,  Coding Constructions for Blacklisting Problems without Computational Assumptions, pp. 609 - 623, CRYPTO 1999.

[Electronic Edition][Cited 116 times Red StarRed Star]

37. Mihir Bellare,  Amit Sahai,  Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization, pp. 519 - 536, CRYPTO 1999.

[Electronic Edition][Cited 103 times Red StarRed Star]

38. Mihir Bellare,  Shai Halevi,  Amit Sahai,  Salil P. Vadhan,  Many-to-One Trapdoor Functions and Their Relation to Public-Key Cryptosystems, pp. 283 - 298, CRYPTO 1998.

[Electronic Edition][Cited 37 times ]

39. Cynthia Dwork,  Amit Sahai,  Concurrent Zero-Knowledge: Reducing the Need for Timing Constraints, pp. 442 - 457, CRYPTO 1998.

[Electronic Edition][Cited 76 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...