2018 - ACM Fellow For contributions to cryptography and to the development of indistinguishability obfuscation
2002 - Fellow of Alfred P. Sloan Foundation
Amit Sahai spends much of his time researching Theoretical computer science, Encryption, Cryptography, Functional encryption and Attribute-based encryption. His Theoretical computer science study combines topics from a wide range of disciplines, such as Mathematical proof, Random oracle, Cryptographic primitive, Obfuscation and Standard model. His research investigates the link between Encryption and topics such as Oracle that cross with problems in Homomorphic encryption, Formal proof, Signature, Ring signature and Multisignature.
His Cryptography research is under the purview of Computer security. His research integrates issues of Multiple encryption, Probabilistic encryption and Client-side encryption in his study of Functional encryption. His Attribute-based encryption research integrates issues from Ciphertext and Access structure.
The scientist’s investigation covers issues in Theoretical computer science, Cryptography, Encryption, Computer security and Discrete mathematics. The study incorporates disciplines such as Cryptographic primitive, Obfuscation, Protocol, Zero-knowledge proof and Functional encryption in addition to Theoretical computer science. His Cryptography study integrates concerns from other disciplines, such as Adversary and Bounded function.
His Encryption research focuses on Attribute-based encryption, Ciphertext, Homomorphic encryption, Public-key cryptography and Probabilistic encryption. His work carried out in the field of Probabilistic encryption brings together such families of science as Multiple encryption and 40-bit encryption. His Discrete mathematics study combines topics in areas such as Algorithm, Class, Combinatorics and Constant.
Amit Sahai mostly deals with Theoretical computer science, Discrete mathematics, Cryptography, Obfuscation and Functional encryption. His studies deal with areas such as Homomorphic encryption, Cryptographic primitive, Witness, Pseudorandom number generator and Computation as well as Theoretical computer science. His study in Discrete mathematics is interdisciplinary in nature, drawing from both Turing machine, Multilinear map, Degree, Encryption and Constant.
His work on Security parameter is typically connected to Self processing as part of general Encryption study, connecting several disciplines of science. His study looks at the intersection of Obfuscation and topics like Bilinear interpolation with Mathematical proof. His study connects Ciphertext indistinguishability and Functional encryption.
The scientist’s investigation covers issues in Theoretical computer science, Discrete mathematics, Functional encryption, Cryptography and Bilinear interpolation. His Theoretical computer science research is multidisciplinary, relying on both Homomorphic encryption, Cryptographic primitive, Witness, Pseudorandom number generator and Verifiable secret sharing. The subject of his Homomorphic encryption research is within the realm of Encryption.
His work on Learning with errors as part of general Encryption research is frequently linked to Large class, bridging the gap between disciplines. The concepts of his Functional encryption study are interwoven with issues in Joint and Ciphertext indistinguishability. His Cryptography research is multidisciplinary, incorporating perspectives in Sample and Polynomial.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data.
Vipul Goyal;Omkant Pandey;Amit Sahai;Brent Waters.
IACR Cryptology ePrint Archive (2006)
Ciphertext-Policy Attribute-Based Encryption
J. Bethencourt;A. Sahai;B. Waters.
ieee symposium on security and privacy (2007)
Attribute-based encryption for fine-grained access control of encrypted data
Vipul Goyal;Omkant Pandey;Amit Sahai;Brent Waters.
computer and communications security (2006)
Fuzzy identity-based encryption
Amit Sahai;Brent Waters.
theory and application of cryptographic techniques (2005)
On the (im)possibility of obfuscating programs
Boaz Barak;Oded Goldreich;Russell Impagliazzo;Steven Rudich.
Journal of the ACM (2012)
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
Allison Lewko;Tatsuaki Okamoto;Amit Sahai;Katsuyuki Takashima.
theory and application of cryptographic techniques (2010)
Attribute-Based Encryption with Non-Monotonic Access Structures.
Rafail Ostrovsky;Amit Sahai;Brent Waters.
IACR Cryptology ePrint Archive (2007)
Attribute-based encryption with non-monotonic access structures
Rafail Ostrovsky;Amit Sahai;Brent Waters.
computer and communications security (2007)
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
Craig Gentry;Amit Sahai;Brent Waters.
IACR Cryptology ePrint Archive (2013)
Predicate encryption supporting disjunctions, polynomial equations, and inner products
Jonathan Katz;Amit Sahai;Brent Waters.
international cryptology conference (2008)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
The University of Texas at Austin
Technion – Israel Institute of Technology
Carnegie Mellon University
Indian Institute of Technology Bombay
University of California, Los Angeles
University of California, Berkeley
Harvard University
TripleBlind
Algorand Foundation
Harvard University
University of California, Berkeley
University of Dundee
University of Hong Kong
University of Lübeck
École Normale Supérieure
Technical University of Denmark
Tohoku University
RIKEN
Universidade Federal do Acre
University of Würzburg
Genentech
Grenoble Alpes University
The University of Texas at Austin
University of Illinois at Urbana-Champaign
University of Cape Town
Heidelberg University