Follow
Omkant Pandey
Omkant Pandey
Verified email at cs.stonybrook.edu - Homepage
Title
Cited by
Cited by
Year
Attribute-based encryption for fine-grained access control of encrypted data
V Goyal, O Pandey, A Sahai, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
65622006
Bounded ciphertext policy attribute based encryption
V Goyal, A Jain, O Pandey, A Sahai
Lecture Notes in Computer Science 5126, 579-591, 2008
7582008
Computational differential privacy
I Mironov, O Pandey, O Reingold, S Vadhan
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
2832009
Adaptive one-way functions and applications
O Pandey, R Pass, V Vaikuntanathan
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
1102008
Textbook non-malleable commitments
V Goyal, O Pandey, S Richelson
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
1092016
Cloud key escrow system
RP D'souza, O Pandey
US Patent 8,891,772, 2014
108*2014
Revisiting the cryptographic hardness of finding a nash equilibrium
S Garg, O Pandey, A Srinivasan
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
106*2016
Property Preserving Symmetric Encryption.
O Pandey, Y Rouselakis
EUROCRYPT 7237, 375-391, 2012
932012
Explicit non-malleable codes against bit-wise tampering and permutations
S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
87*2015
The exact round complexity of secure computation
S Garg, P Mukherjee, O Pandey, A Polychroniadou
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
822016
Public-coin differing-inputs obfuscation and its applications
Y Ishai, O Pandey, A Sahai
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
802015
A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations
S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
752015
Incremental deterministic public-key encryption
I Mironov, O Pandey, O Reingold, G Segev
Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012
73*2012
Breaking the sub-exponential barrier in obfustopia
S Garg, O Pandey, A Srinivasan, M Zhandry
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
642017
Optimal computational split-state non-malleable codes
D Aggarwal, S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015
642015
Block-wise non-malleable codes
N Chandran, V Goyal, P Mukherjee, O Pandey, J Upadhyay
Cryptology ePrint Archive, 2015
542015
Integrated data deduplication and encryption
AM El-Shimi, PA Oltean, R Kalach, S Sengupta, J Li, R D'souza, ...
US Patent 9,495,552, 2016
472016
Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for np
O Pandey, M Prabhakaran, A Sahai
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
462015
Method and apparatus for encrypting data for fine-grained access control
B Waters, A Sahai, V Goyal, O Pandey
US Patent App. 12/172,835, 2009
462009
Round-efficient concurrently composable secure computation via a robust extraction lemma
V Goyal, H Lin, O Pandey, R Pass, A Sahai
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
362015
The system can't perform the operation now. Try again later.
Articles 1–20