2018 - ACM Fellow For contributions to cryptography and to the development of indistinguishability obfuscation
2002 - Fellow of Alfred P. Sloan Foundation
Amit Sahai spends much of his time researching Theoretical computer science, Encryption, Cryptography, Functional encryption and Attribute-based encryption. His Theoretical computer science study combines topics from a wide range of disciplines, such as Mathematical proof, Random oracle, Cryptographic primitive, Obfuscation and Standard model. His research investigates the link between Encryption and topics such as Oracle that cross with problems in Homomorphic encryption, Formal proof, Signature, Ring signature and Multisignature.
His Cryptography research is under the purview of Computer security. His research integrates issues of Multiple encryption, Probabilistic encryption and Client-side encryption in his study of Functional encryption. His Attribute-based encryption research integrates issues from Ciphertext and Access structure.
The scientist’s investigation covers issues in Theoretical computer science, Cryptography, Encryption, Computer security and Discrete mathematics. The study incorporates disciplines such as Cryptographic primitive, Obfuscation, Protocol, Zero-knowledge proof and Functional encryption in addition to Theoretical computer science. His Cryptography study integrates concerns from other disciplines, such as Adversary and Bounded function.
His Encryption research focuses on Attribute-based encryption, Ciphertext, Homomorphic encryption, Public-key cryptography and Probabilistic encryption. His work carried out in the field of Probabilistic encryption brings together such families of science as Multiple encryption and 40-bit encryption. His Discrete mathematics study combines topics in areas such as Algorithm, Class, Combinatorics and Constant.
Amit Sahai mostly deals with Theoretical computer science, Discrete mathematics, Cryptography, Obfuscation and Functional encryption. His studies deal with areas such as Homomorphic encryption, Cryptographic primitive, Witness, Pseudorandom number generator and Computation as well as Theoretical computer science. His study in Discrete mathematics is interdisciplinary in nature, drawing from both Turing machine, Multilinear map, Degree, Encryption and Constant.
His work on Security parameter is typically connected to Self processing as part of general Encryption study, connecting several disciplines of science. His study looks at the intersection of Obfuscation and topics like Bilinear interpolation with Mathematical proof. His study connects Ciphertext indistinguishability and Functional encryption.
The scientist’s investigation covers issues in Theoretical computer science, Discrete mathematics, Functional encryption, Cryptography and Bilinear interpolation. His Theoretical computer science research is multidisciplinary, relying on both Homomorphic encryption, Cryptographic primitive, Witness, Pseudorandom number generator and Verifiable secret sharing. The subject of his Homomorphic encryption research is within the realm of Encryption.
His work on Learning with errors as part of general Encryption research is frequently linked to Large class, bridging the gap between disciplines. The concepts of his Functional encryption study are interwoven with issues in Joint and Ciphertext indistinguishability. His Cryptography research is multidisciplinary, incorporating perspectives in Sample and Polynomial.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Attribute-based encryption for fine-grained access control of encrypted data
Vipul Goyal;Omkant Pandey;Amit Sahai;Brent Waters.
computer and communications security (2006)
Ciphertext-Policy Attribute-Based Encryption
J. Bethencourt;A. Sahai;B. Waters.
ieee symposium on security and privacy (2007)
Fuzzy identity-based encryption
Amit Sahai;Brent Waters.
theory and application of cryptographic techniques (2005)
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
Allison Lewko;Tatsuaki Okamoto;Amit Sahai;Katsuyuki Takashima.
theory and application of cryptographic techniques (2010)
Attribute-based encryption with non-monotonic access structures
Rafail Ostrovsky;Amit Sahai;Brent Waters.
computer and communications security (2007)
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
Sanjam Garg;Craig Gentry;Shai Halevi;Mariana Raykova.
foundations of computer science (2013)
Predicate encryption supporting disjunctions, polynomial equations, and inner products
Jonathan Katz;Amit Sahai;Brent Waters.
international cryptology conference (2008)
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
Craig Gentry;Amit Sahai;Brent R Waters.
international cryptology conference (2013)
On the (Im)possibility of Obfuscating Programs
Boaz Barak;Oded Goldreich;Russell Impagliazzo;Steven Rudich.
international cryptology conference (2001)
Efficient non-interactive proof systems for bilinear groups
Jens Groth;Amit Sahai.
international cryptology conference (2008)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: