Attribute-based encryption for fine-grained access control of encrypted data V Goyal, O Pandey, A Sahai, B Waters Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 7106 | 2006 |
Ciphertext-policy attribute-based encryption J Bethencourt, A Sahai, B Waters 2007 IEEE symposium on security and privacy (SP'07), 321-334, 2007 | 6855 | 2007 |
Fuzzy identity-based encryption A Sahai, B Waters Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005 | 6160 | 2005 |
On the (im) possibility of obfuscating programs B Barak, O Goldreich, R Impagliazzo, S Rudich, A Sahai, S Vadhan, ... Annual international cryptology conference, 1-18, 2001 | 1931 | 2001 |
Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based C Gentry, A Sahai, B Waters Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 1918 | 2013 |
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption A Lewko, T Okamoto, A Sahai, K Takashima, B Waters Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010 | 1673 | 2010 |
Candidate indistinguishability obfuscation and functional encryption for all circuits S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters SIAM Journal on Computing 45 (3), 882-929, 2016 | 1602 | 2016 |
Attribute-based encryption with non-monotonic access structures R Ostrovsky, A Sahai, B Waters Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 1548 | 2007 |
Predicate encryption supporting disjunctions, polynomial equations, and inner products J Katz, A Sahai, B Waters Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008 | 1436 | 2008 |
Functional encryption: Definitions and challenges D Boneh, A Sahai, B Waters Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011 | 1288 | 2011 |
Private circuits: Securing hardware against probing attacks Y Ishai, A Sahai, D Wagner Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003 | 1189 | 2003 |
Efficient non-interactive proof systems for bilinear groups J Groth, A Sahai Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008 | 1134 | 2008 |
Universally composable two-party and multi-party secure computation R Canetti, Y Lindell, R Ostrovsky, A Sahai Proceedings of the thiry-fourth annual ACM symposium on Theory of computing …, 2002 | 945 | 2002 |
Bounded ciphertext policy attribute based encryption V Goyal, A Jain, O Pandey, A Sahai Automata, Languages and Programming: 35th International Colloquium, ICALP …, 2008 | 784 | 2008 |
How to use indistinguishability obfuscation: deniable encryption, and more A Sahai, B Waters Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014 | 779 | 2014 |
Fast cryptographic primitives and circular-secure encryption based on hard learning problems B Applebaum, D Cash, C Peikert, A Sahai Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009 | 777 | 2009 |
Concurrent zero-knowledge C Dwork, M Naor, A Sahai Journal of the ACM (JACM) 51 (6), 851-898, 2004 | 754 | 2004 |
Pseudonym systems A Lysyanskaya, RL Rivest, A Sahai, S Wolf Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 …, 2000 | 744 | 2000 |
Non-malleable non-interactive zero knowledge and adaptive chosen-ciphertext security A Sahai 40th annual symposium on foundations of computer science (Cat. No. 99CB37039 …, 1999 | 717 | 1999 |
Founding cryptography on oblivious transfer–efficiently Y Ishai, M Prabhakaran, A Sahai Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008 | 588 | 2008 |