Folgen
Vipul Goyal
Vipul Goyal
Bestätigte E-Mail-Adresse bei cs.cmu.edu
Titel
Zitiert von
Zitiert von
Jahr
Attribute-based encryption for fine-grained access control of encrypted data
V Goyal, O Pandey, A Sahai, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
67422006
Identity-based encryption with efficient revocation
A Boldyreva, V Goyal, V Kumar
Proceedings of the 15th ACM conference on Computer and communications …, 2008
9402008
Bounded ciphertext policy attribute based encryption
V Goyal, A Jain, O Pandey, A Sahai
Automata, Languages and Programming: 35th International Colloquium, ICALP …, 2008
7702008
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
3862014
Reducing trust in the PKG in identity based cryptosystems
V Goyal
Annual International Cryptology Conference, 430-447, 2007
2492007
Founding cryptography on tamper-proof hardware tokens
V Goyal, Y Ishai, A Sahai, R Venkatesan, A Wadia
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
2242010
Position based cryptography
N Chandran, V Goyal, R Moriarty, R Ostrovsky
Annual International Cryptology Conference, 391-407, 2009
2122009
Position-based quantum cryptography: Impossibility and constructions
H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ...
SIAM Journal on Computing 43 (1), 150-178, 2014
1922014
Constant round non-malleable protocols using one way functions
V Goyal
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
1292011
Correlated-input secure hash functions
V Goyal, A O’Neill, V Rao
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
1282011
Efficient two party and multi party computation against covert adversaries
V Goyal, P Mohassel, A Smith
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
1232008
New constructions for UC secure computation using tamper-proof hardware
N Chandran, V Goyal, A Sahai
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
1202008
Non-malleable extractors and codes, with their many tampered extensions
E Chattopadhyay, V Goyal, X Li
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
1152016
Textbook non-malleable commitments
V Goyal, O Pandey, S Richelson
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
1132016
Black-box accountable authority identity-based encryption
V Goyal, S Lu, A Sahai, B Waters
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1132008
Noiseless database privacy
R Bhaskar, A Bhowmick, V Goyal, S Laxman, A Thakurta
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
1052011
Constructing non-malleable commitments: A black-box approach
V Goyal, CK Lee, R Ostrovsky, I Visconti
2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 51-60, 2012
982012
Certificate revocation using fine grained certificate space partitioning
V Goyal
International Conference on Financial Cryptography and Data Security, 247-259, 2007
872007
An efficient solution to the ARP cache poisoning problem
V Goyal, R Tripathy
Australasian conference on information security and privacy, 40-51, 2005
842005
Non-malleable secret sharing
V Goyal, A Kumar
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing …, 2018
812018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20