Name
Papers
Collaborators
AMIT SAHAI
223
218
Citations 
PageRank 
Referers 
13566
545.52
9383
Referees 
References 
1830
4646
Search Limit
1001000
Title
Citations
PageRank
Year
SPECIAL SECTION ON THE FORTY-NINTH ANNUAL ACM SYMPOSIUM ON THE THEORY OF COMPUTING (STOC 2017)00.342022
Indistinguishability obfuscation from well-founded assumptions20.362021
On The Round Complexity Of Black-Box Secure Mpc00.342021
Self-Processing Private Sensor Data via Garbled Encryption.00.342020
Simplifying Constructions and Assumptions for i풪.00.342019
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification.20.362019
How to Leverage Hardness of Constant-Degree Expanding Polynomials over mathbb R R to build i풪 i O.00.342019
Homomorphic Encryption Standard.00.342019
Statistical Witness Indistinguishability (and more) in Two Messages.00.342018
Leakage-Resilient Secret Sharing.00.342018
Private Circuits: A Modular Approach.30.402018
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness.00.342018
Promise Zero Knowledge and its Applications to Round Optimal MPC.30.372018
Exploring Crypto Dark Matter: New Simple Prf Candidates And Their Applications20.352018
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption.20.362018
Expander Graphs are Non-Malleable Codes.00.342018
Non-Interactive Multiparty Computation Without Correlated Randomness.20.372017
A note on VRFs from Verifiable Functional Encryption.00.342017
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization.10.342017
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions.10.352017
Threshold Fully Homomorphic Encryption.10.352017
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps.210.582017
Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks.90.532016
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits.200.662016
Hiding secrets in software: a cryptographic approach to program obfuscation.10.362016
How to Generate and Use Universal Samplers.120.482016
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security.50.402016
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13.440.892016
Bounded-Communication Leakage Resilience via Parity-Resilient Circuits20.372016
On the Equivalence of Obfuscation and Multilinear Maps.70.442015
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation.40.402015
Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption.160.552015
Indistinguishability Obfuscation with Constant Size Overhead.10.352015
Patchable Obfuscation.00.342015
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations701.582015
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.711.722014
Cryptography With One-Way Communication20.382014
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero.260.982014
Statistical Concurrent Non-Malleable Zero Knowledge.10.352014
Multi-Input Functional Encryption.381.022014
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption.190.732014
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits3377.242013
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures.150.742013
Zero Knowledge LTCs and Their Applications.20.372013
Differing-Inputs Obfuscation and Applications.160.662013
Attribute-Based Encryption for Circuits from Multilinear Maps.1123.182013
Secure Computation against Adaptive Auxiliary Information.130.522013
On efficient zero-knowledge PCPs110.462012
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption.531.382012
New Techniques for Noninteractive Zero-Knowledge321.022012
  • 1
  • 2