Attribute-based encryption for fine-grained access control of encrypted data V Goyal, O Pandey, A Sahai, B Waters Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 7282 | 2006 |
Identity-based encryption with efficient revocation A Boldyreva, V Goyal, V Kumar Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 995 | 2008 |
Bounded ciphertext policy attribute based encryption V Goyal, A Jain, O Pandey, A Sahai Automata, Languages and Programming: 35th International Colloquium, ICALP …, 2008 | 795 | 2008 |
Multi-input functional encryption S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ... Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 446 | 2014 |
Reducing trust in the PKG in identity based cryptosystems V Goyal Annual International Cryptology Conference, 430-447, 2007 | 268 | 2007 |
Founding cryptography on tamper-proof hardware tokens V Goyal, Y Ishai, A Sahai, R Venkatesan, A Wadia Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 239 | 2010 |
Position based cryptography N Chandran, V Goyal, R Moriarty, R Ostrovsky Annual International Cryptology Conference, 391-407, 2009 | 233 | 2009 |
Position-based quantum cryptography: Impossibility and constructions H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ... SIAM Journal on Computing 43 (1), 150-178, 2014 | 229 | 2014 |
Constant round non-malleable protocols using one way functions V Goyal Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011 | 138 | 2011 |
Non-malleable extractors and codes, with their many tampered extensions E Chattopadhyay, V Goyal, X Li Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016 | 132 | 2016 |
Correlated-input secure hash functions V Goyal, A O’Neill, V Rao Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011 | 127 | 2011 |
Efficient two party and multi party computation against covert adversaries V Goyal, P Mohassel, A Smith Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008 | 127 | 2008 |
New constructions for UC secure computation using tamper-proof hardware N Chandran, V Goyal, A Sahai Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008 | 124 | 2008 |
Textbook non-malleable commitments V Goyal, O Pandey, S Richelson Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016 | 122 | 2016 |
Black-box accountable authority identity-based encryption V Goyal, S Lu, A Sahai, B Waters Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 120 | 2008 |
Noiseless database privacy R Bhaskar, A Bhowmick, V Goyal, S Laxman, A Thakurta Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 119 | 2011 |
Constructing non-malleable commitments: A black-box approach V Goyal, CK Lee, R Ostrovsky, I Visconti 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 51-60, 2012 | 105 | 2012 |
Non-malleable secret sharing V Goyal, A Kumar Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing …, 2018 | 99 | 2018 |
Certificate revocation using fine grained certificate space partitioning V Goyal International Conference on Financial Cryptography and Data Security, 247-259, 2007 | 89 | 2007 |
An efficient solution to the ARP cache poisoning problem V Goyal, R Tripathy Australasian conference on information security and privacy, 40-51, 2005 | 88 | 2005 |