Attribute-based encryption for fine-grained access control of encrypted data V Goyal, O Pandey, A Sahai, B Waters Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 5557 | 2006 |
Identity-based encryption with efficient revocation A Boldyreva, V Goyal, V Kumar Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 789 | 2008 |
Bounded ciphertext policy attribute based encryption V Goyal, A Jain, O Pandey, A Sahai International Colloquium on Automata, Languages, and Programming, 579-591, 2008 | 653 | 2008 |
Multi-input functional encryption S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ... Annual International Conference on the Theory and Applications of …, 2014 | 280 | 2014 |
Reducing trust in the PKG in identity based cryptosystems V Goyal Annual International Cryptology Conference, 430-447, 2007 | 197 | 2007 |
Founding cryptography on tamper-proof hardware tokens V Goyal, Y Ishai, A Sahai, R Venkatesan, A Wadia Theory of Cryptography Conference, 308-326, 2010 | 191 | 2010 |
Position based cryptography N Chandran, V Goyal, R Moriarty, R Ostrovsky Annual International Cryptology Conference, 391-407, 2009 | 182 | 2009 |
Position-based quantum cryptography: Impossibility and constructions H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ... SIAM Journal on Computing 43 (1), 150-178, 2014 | 152 | 2014 |
Constructing non-malleable commitments: A black-box approach V Goyal, CK Lee, R Ostrovsky, I Visconti 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 51-60, 2012 | 118* | 2012 |
New constructions for UC secure computation using tamper-proof hardware N Chandran, V Goyal, A Sahai Annual International Conference on the Theory and Applications of …, 2008 | 110 | 2008 |
Correlated-input secure hash functions V Goyal, A O’Neill, V Rao Theory of Cryptography Conference, 182-200, 2011 | 105 | 2011 |
Efficient two party and multi party computation against covert adversaries V Goyal, P Mohassel, A Smith Annual International Conference on the Theory and Applications of …, 2008 | 105 | 2008 |
Constant round non-malleable protocols using one way functions V Goyal Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011 | 97 | 2011 |
Non-malleable extractors and codes, with their many tampered extensions E Chattopadhyay, V Goyal, X Li Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016 | 88 | 2016 |
Black-box accountable authority identity-based encryption V Goyal, S Lu, A Sahai, B Waters Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 85 | 2008 |
Textbook non-malleable commitments V Goyal, O Pandey, S Richelson Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016 | 81 | 2016 |
Certificate revocation using fine grained certificate space partitioning V Goyal International Conference on Financial Cryptography and Data Security, 247-259, 2007 | 80 | 2007 |
An efficient solution to the ARP cache poisoning problem V Goyal, R Tripathy Australasian Conference on Information Security and Privacy, 40-51, 2005 | 76 | 2005 |
Noiseless database privacy R Bhaskar, A Bhowmick, V Goyal, S Laxman, A Thakurta International Conference on the Theory and Application of Cryptology and …, 2011 | 73 | 2011 |
Resolving the simultaneous resettability conjecture and a new non-black-box simulation strategy Y Deng, V Goyal, A Sahai 2009 50th Annual IEEE Symposium on Foundations of Computer Science, 251-260, 2009 | 72 | 2009 |