Follow
Melissa Chase
Melissa Chase
Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Multi-authority attribute based encryption
M Chase
Theory of Cryptography Conference, 515-534, 2007
15642007
Improving privacy and security in multi-authority attribute-based encryption
M Chase, SSM Chow
Proceedings of the 16th ACM conference on Computer and communications …, 2009
12172009
Patient controlled encryption: ensuring privacy of electronic medical records
J Benaloh, M Chase, E Horvitz, K Lauter
Proceedings of the 2009 ACM workshop on Cloud computing security, 103-114, 2009
6872009
Structured encryption and controlled disclosure
M Chase, S Kamara
Advances in Cryptology-ASIACRYPT 2010, 577-594, 2010
6312010
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Advances in Cryptology-CRYPTO 2009, 108-125, 2009
3912009
Post-quantum zero-knowledge and signatures from symmetric-key primitives
M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, C Rechberger, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
3732017
On signatures of knowledge
M Chase, A Lysyanskaya
Advances in Cryptology-CRYPTO 2006, 78-96, 2006
3182006
P-signatures and noninteractive anonymous credentials
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
Theory of Cryptography Conference, 356-374, 2008
3032008
FAME: Fast Attribute-based Message Encryption
S Agrawal, M Chase
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2292017
Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF
M Chase, P Miao
Annual International Cryptology Conference, 34-63, 2020
1622020
Constant-size structure-preserving signatures: Generic constructions and simple assumptions
M Abe, M Chase, B David, M Kohlweiss, R Nishimaki, M Ohkubo
Advances in Cryptology–ASIACRYPT 2012, 4-24, 2012
139*2012
Algebraic MACs and Keyed-Verification Anonymous Credentials
M Chase, S Meiklejohn, G Zaverucha
ACM Conference on Computer and Communications Security 2014, 1205-1216, 2014
1212014
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Advances in Cryptology–EUROCRYPT 2012, 281-300, 2012
1202012
Incentivizing outsourced computation
M Belenkiy, M Chase, CC Erway, J Jannotti, A Küpçü, A Lysyanskaya
Proceedings of the 3rd international workshop on Economics of networked …, 2008
1182008
Substring-Searchable Symmetric Encryption
M Chase, E Shen
Proceedings on Privacy Enhancing Technologies 2015 (2), 263-281, 2015
116*2015
Compact e-cash and simulatable VRFs revisited
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
International Conference on Pairing-Based Cryptography, 114-131, 2009
1062009
Malleable signatures: New definitions and delegatable anonymous credentials
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
CSF, 0
104*
Mercurial Commitments with Applications to Zero-Knowledge Sets
M Chase, A Healy, A Lysyanskaya, T Malkin, L Reyzin
Journal of cryptology 26 (2), 251-279, 2013
103*2013
Making p2p accountable without losing privacy
M Belenkiy, M Chase, CC Erway, J Jannotti, A Küpçü, A Lysyanskaya, ...
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 31-40, 2007
982007
Property Inference from Poisoning
S Mahloujifar, E Ghosh, M Chase
2022 IEEE Symposium on Security and Privacy (SP), 1569-1569, 2022
90*2022
The system can't perform the operation now. Try again later.
Articles 1–20