Chapter Correlated-Input Secure Hash Functions 2011 • Lecture Notes in Computer Science • 6597:182-200 Goyal V, O’Neill A, Rao V
Chapter Noiseless Database Privacy 2011 • Lecture Notes in Computer Science • 7073:215-232 Bhaskar R, Bhowmick A, Goyal V, Laxman S, Thakurta A
Chapter Position-Based Quantum Cryptography: Impossibility and Constructions 2011 • Lecture Notes in Computer Science • 6841:429-446 Buhrman H, Chandran N, Fehr S, Gelles R, Goyal V, Ostrovsky R, Schaffner C
Chapter Resettable Cryptography in Constant Rounds – The Case of Zero Knowledge 2011 • Lecture Notes in Computer Science • 7073:390-406 Deng Y, Feng D, Goyal V, Lin D, Sahai A, Yung M
Chapter Secure Composition of Cryptographic Protocols 2011 • Lecture Notes in Computer Science • 7093:71-71 Goyal V
Chapter Secure Composition of Cryptographic Protocols 2011 • Lecture Notes in Computer Science • 6980:2-2 Goyal V
Chapter Founding Cryptography on Tamper-Proof Hardware Tokens 2010 • Lecture Notes in Computer Science • 5978:308-326 Goyal V, Ishai Y, Sahai A, Venkatesan R, Wadia A
Chapter Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography 2010 • Lecture Notes in Computer Science • 6223:173-190 Goyal V, Ishai Y, Mahmoody M, Sahai A
Chapter Password-Authenticated Session-Key Generation on the Internet in the Plain Model 2010 • Lecture Notes in Computer Science • 6223:277-294 Goyal V, Jain A, Ostrovsky R
Preprint Position-Based Quantum Cryptography: Impossibility and Constructions 2010 Buhrman H, Chandran N, Fehr S, Gelles R, Goyal V, Ostrovsky R, Schaffner C
Chapter Position Based Cryptography 2009 • Lecture Notes in Computer Science • 5677:391-407 Chandran N, Goyal V, Moriarty R, Ostrovsky R
Chapter Resettably Secure Computation 2009 • Lecture Notes in Computer Science • 5479:54-71 Goyal V, Sahai A
Conference Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy 2009 • Annual Symposium on Foundations of Computer Science • 251-260 Deng Y, Goyal V, Sahai A
Conference Black-box accountable authority identity-based encryption 2008 427-436 Goyal V, Lu S, Sahai A, Waters B
Chapter Bounded Ciphertext Policy Attribute Based Encryption 2008 • Lecture Notes in Computer Science • 5126:579-591 Goyal V, Jain A, Pandey O, Sahai A
Chapter Efficient Two Party and Multi Party Computation Against Covert Adversaries 2008 • Lecture Notes in Computer Science • 4965:289-306 Goyal V, Mohassel P, Smith A
Conference Identity-based encryption with efficient revocation 2008 417-426 Boldyreva A, Goyal V, Kumar V
Chapter New Constructions for UC Secure Computation Using Tamper-Proof Hardware 2008 • Lecture Notes in Computer Science • 4965:545-562 Chandran N, Goyal V, Sahai A
Chapter Universally Composable Multi-party Computation with an Unreliable Common Reference String 2008 • Lecture Notes in Computer Science • 4948:142-154 Goyal V, Katz J
Chapter Certificate Revocation Using Fine Grained Certificate Space Partitioning 2007 • Lecture Notes in Computer Science • 4886:247-259 Goyal V
Chapter Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions 2007 • Lecture Notes in Computer Science • 4833:444-459 Goyal V, Moriarty R, Ostrovsky R, Sahai A