What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Melissa Chase
Google Scholar
43
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
Precio: Private Aggregate Measurement via Oblivious Shuffling.
Erik Anderson
Melissa Chase
F. Betül Durak
Kim Laine
Chenkai Weng
2024
conf/uss
OPTIKS: An Optimized Key Transparency System.
Julia Len
Melissa Chase
Esha Ghosh
Kim Laine
Radames Cruz Moreno
2024
conf/sp
Combing for Credentials: Active Pattern Extraction from Smart Reply.
Bargav Jayaraman
Esha Ghosh
Melissa Chase
Sambuddha Roy
Wei Dai
David Evans
2023
conf/ccs
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency.
Julia Len
Melissa Chase
Esha Ghosh
Daniel Jost
Balachandar Kesavan
Antonio Marcedone
2023
conf/crypto
Anonymous Tokens with Stronger Metadata Bit Hiding from Algebraic MACs.
Melissa Chase
F. Betül Durak
Serge Vaudenay
2022
conf/sp
Property Inference from Poisoning.
Saeed Mahloujifar
Esha Ghosh
Melissa Chase
2021
conf/tcc
Amortizing Rate-1 OT and Applications to PIR and PSI.
Melissa Chase
Sanjam Garg
Mohammad Hajiabadi
Jialin Li
Peihan Miao
2020
conf/ccs
The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption.
Melissa Chase
Trevor Perrin
Greg Zaverucha
2020
conf/crypto
Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF.
Melissa Chase
Peihan Miao
2020
conf/asiacrypt
Secret-Shared Shuffle.
Melissa Chase
Esha Ghosh
Oxana Poburinnaya
2019
conf/ccs
SEEMless: Secure End-to-End Encrypted Messaging with less</> Trust.
Melissa Chase
Apoorvaa Deshpande
Esha Ghosh
Harjasleen Malvai
2019
conf/crypto
Reusable Non-Interactive Secure Computation.
Melissa Chase
Yevgeniy Dodis
Yuval Ishai
Daniel Kraschewski
Tianren Liu
Rafail Ostrovsky
Vinod Vaikuntanathan
2017
conf/ccs
FAME: Fast Attribute-based Message Encryption.
Shashank Agrawal
Melissa Chase
2017
conf/ccs
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives.
Melissa Chase
David Derler
Steven Goldfeder
Claudio Orlandi
Sebastian Ramacher
Christian Rechberger
Daniel Slamanig
Greg Zaverucha
2017
conf/eurocrypt
Simplifying Design and Analysis of Complex Predicate Encryption Schemes.
Shashank Agrawal
Melissa Chase
2016
journals/joc
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Masayuki Abe
Melissa Chase
Bernardo David
Markulf Kohlweiss
Ryo Nishimaki
Miyako Ohkubo
2016
conf/ccs
Transparency Overlays and Applications.
Melissa Chase
Sarah Meiklejohn
2016
conf/crypto
Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials.
Melissa Chase
Chaya Ganesh
Payman Mohassel
2016
conf/asiacrypt
Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions.
Melissa Chase
Mary Maller
Sarah Meiklejohn
2016
conf/tcc
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups.
Shashank Agrawal
Melissa Chase
2015
journals/popets
Substring-Searchable Symmetric Encryption.
Melissa Chase
Emily Shen
2015
conf/pkc
Anonymous Transferable E-Cash.
Foteini Baldimtsi
Melissa Chase
Georg Fuchsbauer
Markulf Kohlweiss
2015
conf/eurocrypt
Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World.
Melissa Chase
Rafail Ostrovsky
Ivan Visconti
2014
conf/ccs
Algebraic MACs and Keyed-Verification Anonymous Credentials.
Melissa Chase
Sarah Meiklejohn
Greg Zaverucha
2014
conf/pkc
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
Nishanth Chandran
Melissa Chase
Feng-Hao Liu
Ryo Nishimaki
Keita Xagawa
2014
conf/eurocrypt
Déjà Q: Using Dual Systems to Revisit q-Type Assumptions.
Melissa Chase
Sarah Meiklejohn
2013
journals/joc
Mercurial Commitments with Applications to Zero-Knowledge Sets.
Melissa Chase
Alexander Healy
Anna Lysyanskaya
Tal Malkin
Leonid Reyzin
2013
conf/pkc
Verifiable Elections That Scale for Free.
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Sarah Meiklejohn
2013
conf/tcc
Succinct Malleable NIZKs and an Application to Compact Shuffles.
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Sarah Meiklejohn
2012
conf/crypto
Secure Database Commitments and Universal Arguments of Quasi Knowledge.
Melissa Chase
Ivan Visconti
2012
conf/eurocrypt
Malleable Proof Systems and Applications.
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Sarah Meiklejohn
2012
conf/asiacrypt
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Masayuki Abe
Melissa Chase
Bernardo David
Markulf Kohlweiss
Ryo Nishimaki
Miyako Ohkubo
2012
conf/tcc
Functional Re-encryption and Collusion-Resistant Obfuscation.
Nishanth Chandran
Melissa Chase
Vinod Vaikuntanathan
2010
conf/uss
An Anonymous Health Care System.
Melissa Chase
Kristin E. Lauter
2010
conf/asiacrypt
Structured Encryption and Controlled Disclosure.
Melissa Chase
Seny Kamara
2009
conf/ccs
Patient controlled encryption: ensuring privacy of electronic medical records.
Josh Benaloh
Melissa Chase
Eric Horvitz
Kristin E. Lauter
2009
conf/ccs
Improving privacy and security in multi-authority attribute-based encryption.
Melissa Chase
Sherman S. M. Chow
2009
conf/crypto
Randomizable Proofs and Delegatable Anonymous Credentials.
Mira Belenkiy
Jan Camenisch
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Hovav Shacham
2008
conf/tcc
P-signatures and Noninteractive Anonymous Credentials.
Mira Belenkiy
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
2007
conf/crypto
Simulatable VRFs with Applications to Multi-theorem NIZK.
Melissa Chase
Anna Lysyanskaya
2007
conf/tcc
Multi-authority Attribute Based Encryption.
Melissa Chase
2006
conf/crypto
On Signatures of Knowledge.
Melissa Chase
Anna Lysyanskaya
2005
conf/eurocrypt
Mercurial Commitments with Applications to Zero-Knowledge Sets.
Melissa Chase
Alexander Healy
Anna Lysyanskaya
Tal Malkin
Leonid Reyzin
Coauthors
Alexander Healy
(2)
Anna Lysyanskaya
(9)
Antonio Marcedone
(1)
Apoorvaa Deshpande
(1)
Balachandar Kesavan
(1)
Bargav Jayaraman
(1)
Bernardo David
(2)
Chaya Ganesh
(1)
Chenkai Weng
(1)
Christian Rechberger
(1)
Claudio Orlandi
(1)
Daniel Jost
(1)
Daniel Kraschewski
(1)
Daniel Slamanig
(1)
David Derler
(1)
David Evans
(1)
Emily Shen
(1)
Eric Horvitz
(1)
Erik Anderson
(1)
Esha Ghosh
(6)
F. Betül Durak
(2)
Feng-Hao Liu
(1)
Foteini Baldimtsi
(1)
Georg Fuchsbauer
(1)
Greg Zaverucha
(3)
Harjasleen Malvai
(1)
Hovav Shacham
(1)
Ivan Visconti
(2)
Jan Camenisch
(1)
Jialin Li
(1)
Josh Benaloh
(1)
Julia Len
(2)
Keita Xagawa
(1)
Kim Laine
(2)
Kristin E. Lauter
(2)
Leonid Reyzin
(2)
Markulf Kohlweiss
(8)
Mary Maller
(1)
Masayuki Abe
(2)
Melissa Chase
(43)
Mira Belenkiy
(2)
Miyako Ohkubo
(2)
Mohammad Hajiabadi
(1)
Nishanth Chandran
(2)
Oxana Poburinnaya
(1)
Payman Mohassel
(1)
Peihan Miao
(2)
Radames Cruz Moreno
(1)
Rafail Ostrovsky
(2)
Ryo Nishimaki
(3)
Saeed Mahloujifar
(1)
Sambuddha Roy
(1)
Sanjam Garg
(1)
Sarah Meiklejohn
(7)
Sebastian Ramacher
(1)
Seny Kamara
(1)
Serge Vaudenay
(1)
Shashank Agrawal
(3)
Sherman S. M. Chow
(1)
Steven Goldfeder
(1)
Tal Malkin
(2)
Tianren Liu
(1)
Trevor Perrin
(1)
Vinod Vaikuntanathan
(2)
Wei Dai
(1)
Yevgeniy Dodis
(1)
Yuval Ishai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to