Melissa Chase
Melissa Chase
Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Multi-authority attribute based encryption
M Chase
Theory of Cryptography Conference, 515-534, 2007
12932007
Improving privacy and security in multi-authority attribute-based encryption
M Chase, SSM Chow
Proceedings of the 16th ACM conference on Computer and communications …, 2009
10582009
Patient controlled encryption: ensuring privacy of electronic medical records
J Benaloh, M Chase, E Horvitz, K Lauter
Proceedings of the 2009 ACM workshop on Cloud computing security, 103-114, 2009
5942009
Structured encryption and controlled disclosure
M Chase, S Kamara
Advances in Cryptology-ASIACRYPT 2010, 577-594, 2010
4172010
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Advances in Cryptology-CRYPTO 2009, 108-125, 2009
2992009
P-signatures and noninteractive anonymous credentials
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
Theory of Cryptography Conference, 356-374, 2008
260*2008
Post-quantum zero-knowledge and signatures from symmetric-key primitives
M Chase, D Derler, S Goldfeder, C Orlandi, S Ramacher, C Rechberger, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1902017
On signatures of knowledge
M Chase, A Lysyanskaya
Advances in Cryptology-CRYPTO 2006, 78-96, 2006
1812006
Constant-size structure-preserving signatures: Generic constructions and simple assumptions
M Abe, M Chase, B David, M Kohlweiss, R Nishimaki, M Ohkubo
Advances in Cryptology–ASIACRYPT 2012, 4-24, 2012
112*2012
Making p2p accountable without losing privacy
M Belenkiy, M Chase, CC Erway, J Jannotti, A Küpçü, A Lysyanskaya, ...
Proceedings of the 2007 ACM workshop on Privacy in electronic society, 31-40, 2007
922007
Substring-Searchable Symmetric Encryption
M Chase, E Shen
Proceedings on Privacy Enhancing Technologies 2015 (2), 263-281, 2015
90*2015
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Advances in Cryptology–EUROCRYPT 2012, 281-300, 2012
892012
Incentivizing outsourced computation
M Belenkiy, M Chase, CC Erway, J Jannotti, A Küpçü, A Lysyanskaya
Proceedings of the 3rd international workshop on Economics of networked …, 2008
892008
Compact e-cash and simulatable VRFs revisited
M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya
International Conference on Pairing-Based Cryptography, 114-131, 2009
832009
Mercurial Commitments with Applications to Zero-Knowledge Sets
M Chase, A Healy, A Lysyanskaya, T Malkin, L Reyzin
Journal of cryptology 26 (2), 251-279, 2013
80*2013
FAME: Fast Attribute-based Message Encryption
S Agrawal, M Chase
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
762017
Malleable signatures: New definitions and delegatable anonymous credentials
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
CSF, 0
72*
A study of pair encodings: predicate encryption in prime order groups
S Agrawal, M Chase
Theory of Cryptography Conference, 259-288, 2016
572016
Algebraic MACs and Keyed-Verification Anonymous Credentials
M Chase, S Meiklejohn, G Zaverucha
ACM Conference on Computer and Communications Security 2014, 1205-1216, 2014
572014
Functional re-encryption and collusion-resistant obfuscation
N Chandran, M Chase, V Vaikuntanathan
Theory of Cryptography Conference, 404-421, 2012
562012
The system can't perform the operation now. Try again later.
Articles 1–20