Follow
Melissa Chase
Melissa Chase
Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Multi-authority attribute based encryption
M Chase
Theory of Cryptography Conference, 515-534, 2007
15142007
Improving privacy and security in multi-authority attribute-based encryption
M Chase, SSM Chow
Proceedings of the 16th ACM conference on Computer and communications …, 2009
11932009
Patient controlled encryption: ensuring privacy of electronic medical records
J Benaloh, M Chase, E Horvitz, K Lauter
Proceedings of the 2009 ACM workshop on Cloud computing security, 103-114, 2009
6772009
Structured encryption and controlled disclosure
M Chase, S Kamara
Advances in Cryptology-ASIACRYPT 2010, 577-594, 2010
5952010
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Advances in Cryptology-CRYPTO 2009, 108-125, 2009
3602009
Post-quantum zero-knowledge and signatures from symmetric-key primitives
M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, C Rechberger, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
3462017
On signatures of knowledge
M Chase, A Lysyanskaya
Advances in Cryptology-CRYPTO 2006, 78-96, 2006
3022006
P-signatures and noninteractive anonymous credentials
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
Theory of Cryptography Conference, 356-374, 2008
301*2008
FAME: Fast Attribute-based Message Encryption
S Agrawal, M Chase
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2002017
Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF
M Chase, P Miao
Annual International Cryptology Conference, 34-63, 2020
1352020
Constant-size structure-preserving signatures: Generic constructions and simple assumptions
M Abe, M Chase, B David, M Kohlweiss, R Nishimaki, M Ohkubo
Advances in Cryptology–ASIACRYPT 2012, 4-24, 2012
135*2012
Incentivizing outsourced computation
M Belenkiy, M Chase, CC Erway, J Jannotti, A Küpçü, A Lysyanskaya
Proceedings of the 3rd international workshop on Economics of networked …, 2008
1152008
Substring-Searchable Symmetric Encryption
M Chase, E Shen
Proceedings on Privacy Enhancing Technologies 2015 (2), 263-281, 2015
112*2015
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Advances in Cryptology–EUROCRYPT 2012, 281-300, 2012
1122012
Algebraic MACs and Keyed-Verification Anonymous Credentials
M Chase, S Meiklejohn, G Zaverucha
ACM Conference on Computer and Communications Security 2014, 1205-1216, 2014
1092014
Compact e-cash and simulatable VRFs revisited
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
International Conference on Pairing-Based Cryptography, 114-131, 2009
1032009
Mercurial Commitments with Applications to Zero-Knowledge Sets
M Chase, A Healy, A Lysyanskaya, T Malkin, L Reyzin
Journal of cryptology 26 (2), 251-279, 2013
100*2013
Making p2p accountable without losing privacy
M Belenkiy, M Chase, CC Erway, J Jannotti, A Küpçü, A Lysyanskaya, ...
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 31-40, 2007
992007
Malleable signatures: New definitions and delegatable anonymous credentials
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
CSF, 0
97*
A study of pair encodings: predicate encryption in prime order groups
S Agrawal, M Chase
Theory of Cryptography Conference, 259-288, 2016
772016
The system can't perform the operation now. Try again later.
Articles 1–20