views: 2471

# Amit Sahai

Professor

Sign in to view more

Show Academic Trajectory

Ego Network

D-Core

Research Interests

Author Statistics

Experience

Sign in to view more

Education

Sign in to view more

Bio

Amit Sahai is a Fellow of the ACM and a Fellow of the IACR. He received his Ph.D. in Computer Science from MIT in 2000. From 2000 to 2004, he was on the faculty at Princeton University; in 2004 he joined UCLA, where he currently holds the position of Professor of Computer Science. His research interests are in security and cryptography, and theoretical computer science more broadly. He is the co-inventor of Attribute-Based Encryption, Functional Encryption, and Indistinguishability Obfuscation. He has published more than 100 original technical research papers at venues such as the ACM Symposium on Theory of Computing (STOC), CRYPTO, and the Journal of the ACM. He has given a number of invited talks at institutions such as MIT, Stanford, and Berkeley, including the 2004 Distinguished Cryptographer Lecture Series at NTT Labs, Japan. Professor Sahai is the recipient of numerous honors; he was named an Alfred P. Sloan Foundation Research Fellow in 2002, received an Okawa Research Grant Award in 2007, a Xerox Foundation Faculty Award in 2010, a Google Faculty Research Award in 2010, a 2012 Pazy Memorial Award, a 2016 ACM CCS Test of Time Award, and a 2019 AWS Machine Learning Research Award. For his teaching, he was awarded the 2016 Lockheed Martin Excellence in Teaching Award from the Samueli School of Engineering at UCLA. His research has been covered by several news agencies including the BBC World Service, Quanta Magazine, Wired, and IEEE Spectrum.

## Papers266 papers

Sort

By YearBy Citation

IACR Cryptology ePrint Archive, (2020): 154

ITCS, (2020)

IACR Cryptology ePrint Archive, (2019): 1252

Martin R. Albrecht,Melissa Chase,Hao Chen, Jintai Ding,Shafi Goldwasser,Sergey Gorbunov,Shai Halevi,Jeffrey Hoffstein, Kim Laine,Kristin E. Lauter, Satya Lokam,Daniele Micciancio

IACR Cryptology ePrint Archive, (2019): 939

IACR Cryptology ePrint Archive, (2019): 637

CRYPTO (2), pp.608-637, (2019)

IACR Cryptology ePrint Archive, (2019): 626

CRYPTO (3), pp.583-604, (2019)

IACR Cryptology ePrint Archive, (2019): 1030

international cryptology conference, (2019): 643-332

IACR Cryptology ePrint Archive, (2019): 342-370

IACR Cryptology ePrint Archive, (2019): 199-228

theory and application of cryptographic techniques, pp.251-281, (2019)

IACR Cryptology ePrint Archive, (2019): 780

foundations of computer science, pp.636-660, (2019)

EIBibtex

IACR Cryptology ePrint Archive, (2018)

STOC '18: Symposium on Theory of Computing
Los Angeles
CA
USA
June, 20..., pp.709-721, (2018)

CRYPTO, pp.459-487, (2018)

IACR Cryptology ePrint Archive, (2018)

CRYPTO, pp.565-596, (2018)

IACR Cryptology ePrint Archive, (2018)

TCC, pp.699-729, (2018)

IACR Cryptology ePrint Archive, (2018)

Electronic Colloquium on Computational Complexity (ECCC), (2018)

IACR Cryptology ePrint Archive, (2018): 1237

IACR Cryptology ePrint Archive, (2018)

IACR Cryptology ePrint Archive, (2018)

IACR Cryptology ePrint Archive, (2017)

ASIACRYPT, pp.242-271, (2017)

IACR Cryptology ePrint Archive, (2017)

IACR Cryptology ePrint Archive, (2017)

EUROCRYPT, pp.152-181, (2017)

Electronic Colloquium on Computational Complexity (ECCC), (2017)

theory and application of cryptographic techniques, pp.127-155, (2017)

Bibtex

IACR Cryptology ePrint Archive, (2017)

IACR Cryptology ePrint Archive, (2017)

IACR Cryptology ePrint Archive, (2017)

ASIACRYPT, (2017): 181-211

CRYPTO, pp.252-279, (2017)

IACR Cryptology ePrint Archive, (2017)

EUROCRYPT, pp.127-155, (2017)

IACR Cryptology ePrint Archive, (2016)

ICALP, pp.29:1-29:15, (2016)

IACR Cryptology ePrint Archive, (2016)

Communications of the ACM, no. 5 (2016): 113-120

Foundations of Computer Science, no. 3 (2016): 40-49

EUROCRYPT, (2016): 184-212

EUROCRYPT, (2016): 213-242

FOCS, pp.1-10, (2016)

EUROCRYPT, pp.764-791, (2016)

IACR Cryptology ePrint Archive, (2016)

IACR Cryptology ePrint Archive, (2016)

IACR Cryptology ePrint Archive, (2016)

FOCS, pp.21-30, (2016)

CRYPTO, pp.491-520, (2016)

IACR Cryptology ePrint Archive, (2016)

ASIACRYPT, pp.715-744, (2016)

international symposium on information theory, (2016)

IACR Cryptology ePrint Archive, (2016)

IACR Cryptology ePrint Archive, (2015)

TCC (2), (2015): 638-667

EUROCRYPT, (2015): 563-594

IACR Cryptology ePrint Archive, (2015)

CRYPTO, pp.701-720, (2015)

IACR Cryptology ePrint Archive, (2015)

IACR Cryptology ePrint Archive, (2015)

Public Key Cryptography, pp.777-798, (2015)

IEEE Transactions on Information Theory, no. 12 (2015)

ASIACRYPT, pp.52-75, (2015)

IACR Cryptology ePrint Archive, (2015)

TCC (2), (2015): 325-351

TCC (2), (2015): 668-697

IACR Cryptology ePrint Archive, (2015)

IACR Cryptology ePrint Archive, (2015)

IACR Cryptology ePrint Archive, (2015)

IACR Cryptology ePrint Archive, (2015)

IACR Cryptology ePrint Archive, (2015)

TCC, (2015): 260-289

Journal of Cryptology, no. 4 (2014)

IACR Cryptology ePrint Archive, (2014)

EUROCRYPT, (2014): 659-676

STOC, (2014): 475-484

Bioinformatics, no. 12 (2014): i204-11

Shafi Goldwasser,S Dov Gordon,Vipul Goyal,Abhishek Jain,Jonathan L Katz, Fenghao Liu,Amit Sahai,Elaine Shi, Hongsheng Zhou

EUROCRYPT, (2014): 578-602

STOC, (2014): 495-504

IACR Cryptology ePrint Archive, (2014): 957

Bibtex

IACR Cryptology ePrint Archive, (2014)

IACR Cryptology ePrint Archive, (2014)

ACM Conference on Computer and Communications Security, (2014): 646-658

Genome research, no. 4 (2014): 664-672

EUROCRYPT, (2014): 201-220

FOCS, (2014)

ASIACRYPT (2), (2014): 386-405

ICALP, pp.907-918, (2014)

international symposium on information theory, (2014)

TCC, (2014): 167-191

EUROCRYPT, (2013): 221-238

IACR Cryptology ePrint Archive, (2013): 494-512

View All