Follow
Vipul Goyal
Vipul Goyal
Verified email at cs.cmu.edu
Title
Cited by
Cited by
Year
Attribute-based encryption for fine-grained access control of encrypted data
V Goyal, O Pandey, A Sahai, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
65692006
Identity-based encryption with efficient revocation
A Boldyreva, V Goyal, V Kumar
Proceedings of the 15th ACM conference on Computer and communications …, 2008
9262008
Bounded ciphertext policy attribute based encryption
V Goyal, A Jain, O Pandey, A Sahai
Lecture Notes in Computer Science 5126, 579-591, 2008
7582008
Multi-input Functional Encryption.
S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ...
EUROCRYPT 8441, 578-602, 2014
3732014
Reducing trust in the PKG in identity based cryptosystems
V Goyal
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
2412007
Founding cryptography on tamper-proof hardware tokens
V Goyal, Y Ishai, A Sahai, R Venkatesan, A Wadia
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
2202010
Position Based Cryptography.
N Chandran, V Goyal, R Moriarty, R Ostrovsky
CRYPTO 9, 391-407, 2009
2072009
Position-based quantum cryptography: Impossibility and constructions
H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ...
SIAM Journal on Computing 43 (1), 150-178, 2014
1822014
Constant round non-malleable protocols using one way functions
V Goyal
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
1262011
Correlated-Input Secure Hash Functions.
V Goyal, A O'Neill, V Rao
TCC 6597, 182-200, 2011
1262011
Efficient two party and multi party computation against covert adversaries
V Goyal, P Mohassel, A Smith
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
1222008
New constructions for UC secure computation using tamper-proof hardware
N Chandran, V Goyal, A Sahai
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
1172008
Non-malleable extractors and codes, with their many tampered extensions
E Chattopadhyay, V Goyal, X Li
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
1112016
Black-box accountable authority identity-based encryption
V Goyal, S Lu, A Sahai, B Waters
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1102008
Textbook non-malleable commitments
V Goyal, O Pandey, S Richelson
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
1092016
Noiseless database privacy
R Bhaskar, A Bhowmick, V Goyal, S Laxman, A Thakurta
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
1032011
Constructing non-malleable commitments: A black-box approach
V Goyal, CK Lee, R Ostrovsky, I Visconti
2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 51-60, 2012
952012
Certificate revocation using fine grained certificate space partitioning
V Goyal
Financial Cryptography and Data Security: 11th International Conference, FC …, 2007
872007
An efficient solution to the ARP cache poisoning problem
V Goyal, R Tripathy
Information Security and Privacy: 10th Australasian Conference, ACISP 2005 …, 2005
842005
Resolving the simultaneous resettability conjecture and a new non-black-box simulation strategy
Y Deng, V Goyal, A Sahai
2009 50th Annual IEEE Symposium on Foundations of Computer Science, 251-260, 2009
802009
The system can't perform the operation now. Try again later.
Articles 1–20