Author of the publication

Round Optimal Blind Signatures.

, , , , and . CRYPTO, volume 6841 of Lecture Notes in Computer Science, page 630-648. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Sahai, Amit
add a person with the name Sahai, Amit
 

Other publications of authors with the same name

Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products., , and . J. Cryptology, 26 (2): 191-224 (2013)Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs., , , , , and . J. Cryptology, 28 (4): 820-843 (2015)Non-Interactive Delegation for Low-Space Non-Deterministic Computation., , , , and . Electronic Colloquium on Computational Complexity (ECCC), (2018)On the (im)possibility of obfuscating programs., , , , , , and . J. ACM, 59 (2): 6:1-6:48 (2012)On the Equivalence of Obfuscation and Multilinear Maps., and . IACR Cryptology ePrint Archive, (2015)Functional Encryption: Definitions and Challenges., , and . IACR Cryptology ePrint Archive, (2010)A note on VRFs from Verifiable Functional Encryption., , , and . IACR Cryptology ePrint Archive, (2017)Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption., , and . IACR Cryptology ePrint Archive, (2015)Protecting Obfuscation Against Algebraic Attacks., , , , and . IACR Cryptology ePrint Archive, (2013)How to leverage hardness of constant-degree expanding polynomials over ℝ to build iO., and . IACR Cryptology ePrint Archive, (2018)