Vipul Goyal
Vipul Goyal
Verifierad e-postadress på cs.cmu.edu
Titel
Citeras av
Citeras av
År
Attribute-based encryption for fine-grained access control of encrypted data
V Goyal, O Pandey, A Sahai, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
54222006
Identity-based encryption with efficient revocation
A Boldyreva, V Goyal, V Kumar
Proceedings of the 15th ACM conference on Computer and communications …, 2008
7782008
Bounded ciphertext policy attribute based encryption
V Goyal, A Jain, O Pandey, A Sahai
International Colloquium on Automata, Languages, and Programming, 579-591, 2008
6872008
Multi-input functional encryption
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
Annual International Conference on the Theory and Applications of …, 2014
2682014
Founding cryptography on tamper-proof hardware tokens
V Goyal, Y Ishai, A Sahai, R Venkatesan, A Wadia
Theory of Cryptography Conference, 308-326, 2010
1902010
Reducing trust in the PKG in identity based cryptosystems
V Goyal
Annual International Cryptology Conference, 430-447, 2007
1902007
Position based cryptography
N Chandran, V Goyal, R Moriarty, R Ostrovsky
Annual International Cryptology Conference, 391-407, 2009
1792009
Position-based quantum cryptography: Impossibility and constructions
H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ...
SIAM Journal on Computing 43 (1), 150-178, 2014
1552014
New constructions for UC secure computation using tamper-proof hardware
N Chandran, V Goyal, A Sahai
Annual International Conference on the Theory and Applications of …, 2008
1082008
Correlated-input secure hash functions
V Goyal, A O’Neill, V Rao
Theory of Cryptography Conference, 182-200, 2011
1072011
Efficient two party and multi party computation against covert adversaries
V Goyal, P Mohassel, A Smith
Annual International Conference on the Theory and Applications of …, 2008
1052008
Constant round non-malleable protocols using one way functions
V Goyal
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
942011
Nonmalleable extractors and codes, with their many tampered extensions
E Chattopadhyay, V Goyal, X Li
SIAM Journal on Computing 49 (5), 999-1040, 2020
852020
Near-optimal algorithms for capacity constrained assortment optimization
A Désir, V Goyal, J Zhang
Available at SSRN 2543309, 2014
832014
Black-box accountable authority identity-based encryption
V Goyal, S Lu, A Sahai, B Waters
Proceedings of the 15th ACM conference on Computer and communications …, 2008
822008
Certificate revocation using fine grained certificate space partitioning
V Goyal
International Conference on Financial Cryptography and Data Security, 247-259, 2007
802007
Textbook non-malleable commitments
V Goyal, O Pandey, S Richelson
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
762016
An efficient solution to the ARP cache poisoning problem
V Goyal, R Tripathy
Australasian Conference on Information Security and Privacy, 40-51, 2005
732005
Noiseless database privacy
R Bhaskar, A Bhowmick, V Goyal, S Laxman, A Thakurta
International Conference on the Theory and Application of Cryptology and …, 2011
702011
Mnl-bandit: A dynamic learning approach to assortment selection
S Agrawal, V Avadhanula, V Goyal, A Zeevi
Operations Research 67 (5), 1453-1485, 2019
682019
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20