Melissa Chase
Melissa Chase
Microsoft Research
Bestätigte E-Mail-Adresse bei microsoft.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Multi-authority attribute based encryption
M Chase
Theory of Cryptography Conference, 515-534, 2007
11142007
Improving privacy and security in multi-authority attribute-based encryption
M Chase, SSM Chow
Proceedings of the 16th ACM conference on Computer and communications …, 2009
9292009
Patient controlled encryption: ensuring privacy of electronic medical records
J Benaloh, M Chase, E Horvitz, K Lauter
Proceedings of the 2009 ACM workshop on Cloud computing security, 103-114, 2009
5332009
Structured encryption and controlled disclosure
M Chase, S Kamara
Advances in Cryptology-ASIACRYPT 2010, 577-594, 2010
3422010
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Advances in Cryptology-CRYPTO 2009, 108-125, 2009
2842009
P-signatures and noninteractive anonymous credentials
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
Theory of Cryptography Conference, 356-374, 2008
246*2008
On signatures of knowledge
M Chase, A Lysyanskaya
Advances in Cryptology-CRYPTO 2006, 78-96, 2006
1562006
Post-quantum zero-knowledge and signatures from symmetric-key primitives
M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, C Rechberger, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1132017
Constant-size structure-preserving signatures: Generic constructions and simple assumptions
M Abe, M Chase, B David, M Kohlweiss, R Nishimaki, M Ohkubo
Advances in Cryptology–ASIACRYPT 2012, 4-24, 2012
105*2012
Making p2p accountable without losing privacy
M Belenkiy, M Chase, CC Erway, J Jannotti, A Küpçü, A Lysyanskaya, ...
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 31-40, 2007
822007
Mercurial Commitments with Applications to Zero-Knowledge Sets
M Chase, A Healy, A Lysyanskaya, T Malkin, L Reyzin
Journal of cryptology 26 (2), 251-279, 2013
80*2013
Incentivizing outsourced computation
M Belenkiy, M Chase, CC Erway, J Jannotti, A Küpçü, A Lysyanskaya
Proceedings of the 3rd international workshop on Economics of networked …, 2008
802008
Substring-Searchable Symmetric Encryption
M Chase, E Shen
Proceedings on Privacy Enhancing Technologies 2015 (2), 263-281, 2015
76*2015
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Advances in Cryptology–EUROCRYPT 2012, 281-300, 2012
752012
Compact e-cash and simulatable VRFs revisited
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
International Conference on Pairing-Based Cryptography, 114-131, 2009
742009
Malleable signatures: New definitions and delegatable anonymous credentials
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
CSF, 0
63*
A study of pair encodings: predicate encryption in prime order groups
S Agrawal, M Chase
Theory of Cryptography Conference, 259-288, 2016
512016
Functional re-encryption and collusion-resistant obfuscation
N Chandran, M Chase, V Vaikuntanathan
Theory of Cryptography Conference, 404-421, 2012
472012
Déja Q: Using Dual Systems to Revisit q-Type Assumptions
M Chase, S Meiklejohn
Advances in Cryptology–EUROCRYPT 2014, 622-639, 2014
462014
Simulatable VRFs with applications to multi-theorem NIZK
M Chase, A Lysyanskaya
Advances in Cryptology-CRYPTO 2007, 303-322, 2007
442007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20