Attribute-based encryption for fine-grained access control of encrypted data V Goyal, O Pandey, A Sahai, B Waters Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 6553 | 2006 |
Identity-based encryption with efficient revocation A Boldyreva, V Goyal, V Kumar Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 923 | 2008 |
Bounded ciphertext policy attribute based encryption V Goyal, A Jain, O Pandey, A Sahai Lecture Notes in Computer Science 5126, 579-591, 2008 | 757 | 2008 |
Multi-input Functional Encryption. S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ... EUROCRYPT 8441, 578-602, 2014 | 370 | 2014 |
Reducing trust in the PKG in identity based cryptosystems V Goyal Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007 | 241 | 2007 |
Founding cryptography on tamper-proof hardware tokens V Goyal, Y Ishai, A Sahai, R Venkatesan, A Wadia Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 220 | 2010 |
Position Based Cryptography. N Chandran, V Goyal, R Moriarty, R Ostrovsky CRYPTO 9, 391-407, 2009 | 207 | 2009 |
Position-based quantum cryptography: Impossibility and constructions H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ... SIAM Journal on Computing 43 (1), 150-178, 2014 | 182 | 2014 |
Constant round non-malleable protocols using one way functions V Goyal Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011 | 126 | 2011 |
Correlated-Input Secure Hash Functions. V Goyal, A O'Neill, V Rao TCC 6597, 182-200, 2011 | 126 | 2011 |
Efficient two party and multi party computation against covert adversaries V Goyal, P Mohassel, A Smith Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008 | 122 | 2008 |
New constructions for UC secure computation using tamper-proof hardware N Chandran, V Goyal, A Sahai Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008 | 117 | 2008 |
Non-malleable extractors and codes, with their many tampered extensions E Chattopadhyay, V Goyal, X Li Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016 | 111 | 2016 |
Black-box accountable authority identity-based encryption V Goyal, S Lu, A Sahai, B Waters Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 110 | 2008 |
Textbook non-malleable commitments V Goyal, O Pandey, S Richelson Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016 | 109 | 2016 |
Noiseless database privacy R Bhaskar, A Bhowmick, V Goyal, S Laxman, A Thakurta Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 103 | 2011 |
Constructing non-malleable commitments: A black-box approach V Goyal, CK Lee, R Ostrovsky, I Visconti 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 51-60, 2012 | 95 | 2012 |
Certificate revocation using fine grained certificate space partitioning V Goyal Financial Cryptography and Data Security: 11th International Conference, FC …, 2007 | 87 | 2007 |
An efficient solution to the ARP cache poisoning problem V Goyal, R Tripathy Information Security and Privacy: 10th Australasian Conference, ACISP 2005 …, 2005 | 84 | 2005 |
Resolving the simultaneous resettability conjecture and a new non-black-box simulation strategy Y Deng, V Goyal, A Sahai 2009 50th Annual IEEE Symposium on Foundations of Computer Science, 251-260, 2009 | 80 | 2009 |