Follow
Melissa Chase
Melissa Chase
Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Multi-authority attribute based encryption
M Chase
Theory of Cryptography Conference, 515-534, 2007
15082007
Improving privacy and security in multi-authority attribute-based encryption
M Chase, SSM Chow
Proceedings of the 16th ACM conference on Computer and communications …, 2009
11872009
Patient controlled encryption: ensuring privacy of electronic medical records
J Benaloh, M Chase, E Horvitz, K Lauter
Proceedings of the 2009 ACM workshop on Cloud computing security, 103-114, 2009
6752009
Structured encryption and controlled disclosure
M Chase, S Kamara
Advances in Cryptology-ASIACRYPT 2010, 577-594, 2010
5912010
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Advances in Cryptology-CRYPTO 2009, 108-125, 2009
3602009
Post-quantum zero-knowledge and signatures from symmetric-key primitives
M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, C Rechberger, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
3422017
P-signatures and noninteractive anonymous credentials
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
Theory of Cryptography Conference, 356-374, 2008
300*2008
On signatures of knowledge
M Chase, A Lysyanskaya
Advances in Cryptology-CRYPTO 2006, 78-96, 2006
2982006
FAME: Fast Attribute-based Message Encryption
S Agrawal, M Chase
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1972017
Constant-size structure-preserving signatures: Generic constructions and simple assumptions
M Abe, M Chase, B David, M Kohlweiss, R Nishimaki, M Ohkubo
Advances in Cryptology–ASIACRYPT 2012, 4-24, 2012
135*2012
Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF
M Chase, P Miao
Annual International Cryptology Conference, 34-63, 2020
1322020
Incentivizing outsourced computation
M Belenkiy, M Chase, CC Erway, J Jannotti, A Küpçü, A Lysyanskaya
Proceedings of the 3rd international workshop on Economics of networked …, 2008
1142008
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Advances in Cryptology–EUROCRYPT 2012, 281-300, 2012
1102012
Algebraic MACs and Keyed-Verification Anonymous Credentials
M Chase, S Meiklejohn, G Zaverucha
ACM Conference on Computer and Communications Security 2014, 1205-1216, 2014
1092014
Substring-Searchable Symmetric Encryption
M Chase, E Shen
Proceedings on Privacy Enhancing Technologies 2015 (2), 263-281, 2015
108*2015
Compact e-cash and simulatable VRFs revisited
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
International Conference on Pairing-Based Cryptography, 114-131, 2009
1032009
Mercurial Commitments with Applications to Zero-Knowledge Sets
M Chase, A Healy, A Lysyanskaya, T Malkin, L Reyzin
Journal of cryptology 26 (2), 251-279, 2013
100*2013
Making p2p accountable without losing privacy
M Belenkiy, M Chase, CC Erway, J Jannotti, A Küpçü, A Lysyanskaya, ...
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 31-40, 2007
992007
Malleable signatures: New definitions and delegatable anonymous credentials
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
CSF, 0
97*
A study of pair encodings: predicate encryption in prime order groups
S Agrawal, M Chase
Theory of Cryptography Conference, 259-288, 2016
772016
The system can't perform the operation now. Try again later.
Articles 1–20