Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, Eric Rachlin: Making p2p accountable without losing privacy. Abstract Analysis and Presentation of Recovered Software Architectures. In an identity based encryption scheme, each user is identified by a unique identity string. List of computer science publications by Daniel Shumow. On Analytical and Similarity-Based Classification. Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices. P-signatures and Noninteractive Anonymous Credentials. last updated on 2020-01-23 22:59 CET by the dblp team, all metadata released as open data under CC0 1.0 license, see also: Terms of Use | Privacy Policy | Imprint. Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, Eric Rachlin: Making p2p accountable without losing privacy. You can help us understanding how dblp is used and perceived by answering our user survey (taking 10 to 15 minutes). Leakage Resilient Fully Homomorphic Encryption, with Alexandra Berkoff. Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn: Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. Mercurial Commitments with Applications to Zero-Knowledge Sets. Déjà Q: Using Dual Systems to Revisit q-Type Assumptions. last updated on 2021-02-03 22:46 CET by the dblp team, all metadata released as open data under CC0 1.0 license, see also: Terms of Use | Privacy Policy | Imprint. MAC Schemes with Efficient Protocols and Keyed-Verification Anonymous Credentials. Private Collaborative Neural Network Learning. Cited by. load links from unpaywall.org. Kristin Lauter. Improving privacy and security in multi-authority attribute-based encryption. M Chase. Inspection resistant memory: Architectural support for security from physical examination. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. Melissa Erin Chase is an American cryptographer known for her research on attribute-based encryption, digital credentials, and information privacy. Simplifying Design and Analysis of Complex Predicate Encryption Schemes. So please proceed with care and consider checking the Twitter privacy policy. IACR Cryptol. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar. FAME: Fast Attribute-based Message Encryption. Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa: Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices. combined dblp search; Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Your help is highly appreciated! So please proceed with care and consider checking the Unpaywall privacy policy. While at Brown I was a member of the Brownie Points project, which aimed to provide incentives and accountability in peer-to-peer systems using secure, anonymous e-cash.Before that I worked on the BlueGene/L systems software team at … ePrint Arch. Add open access links from to the list of external document links (if available). Sort by citations Sort by year Sort by title. WPES 2007 : 31-40 2006 For other uses, see Melissa Chase (disambiguation). Randomizable Proofs and Delegatable Anonymous Credentials. (Jump to dblp or google scholar) Reusable Non-Interactive Secure Computation. She works at Microsoft Research. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. the dblp computer science bibliography is funded by: The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption. with Nishanth Chandran, Melissa Chase, Ryo Nishimaki and Keita Xagawa. Privacy Preserving Verifiable Key Directories. Add open access links from to the list of external document links (if available). Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World. What is the meaning of the colors in the coauthor index? Melissa Chase, Yevgeniy Dodis, Yuval Ishai, Daniel Kraschewski, Tianren Liu, Rafail Ostrovsky, Vinod Vaikuntanathan At the same time, Twitter will persistently store several cookies with your web browser. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar. Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices. How does dblp detect coauthor communities. The only other construction of delegatable anonymous credentials (Chase and … Why are some names followed by a four digit number? Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. How does dblp detect coauthor communities. Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya, Eric Rachlin: Making p2p accountable without losing privacy. What is the meaning of the colors in the coauthor index? "TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub", Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, Sharon Goldberg, ... Melissa Chase, Georg Fuchsbauer, Markulf Kohlweiss, PKC, 2015. Collusion Resistant Obfuscation and Functional Re-encryption. 2015: 491 (2015) CiteSeerX - Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): We describe different strategies a central authority, the boss, can use to distribute computation to untrusted contractors. Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF. Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials. In Spring 2014 I will teach "CSCI1510: Introduction to Cryptography and Computer Security". Malleable Proof Systems and Applications. List of computer science publications by Melissa P. Chase. Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. To protect your privacy, all features that rely on external API calls from your browser are turned off by default. A Study of Pair Encodings: Predicate Encryption in Prime Order Groups. Deja Q: Using Dual Systems to Revisit q-Type Assumptions. About; Projects; Publications; Other Activities; Cryptography Colloquium; About. Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials. load references from crossref.org and opencitations.net. A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN. So please proceed with care and consider checking the Internet Archive privacy policy. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. Melissa P. Chase, Steven M. Christey, David R. Harris, Alexander S. Yeh: Managing Recovered Function and Structure of Legacy Software Components. Functional Re-encryption and Collusion-Resistant Obfuscation. Efficient Post-Quantum Zero-Knowledge and Signatures. For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available). Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF. Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions. Verified email at microsoft.com - Homepage. IACR Cryptol. Melissa Chase. You need to opt-in for them to become active. Patient controlled encryption: ensuring privacy of electronic medical records. Approximating Learned Search Control Knowledge. Add a list of citing articles from and to record detail pages. I'm a postdoc researcher in UW, mentored by Huijia (Rachel) Lin.. For an up to date list look at my DBLP or Google Scholar. Melissa P. Chase's 4 research works with 111 citations and 43 reads, including: Managing recovered function and structure of legacy software components Publications can be found on Google-Scholar or DBLP but the list below is most up-to-date. Theory of … What do you think of dblp? CiteSeerX - Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): Abstract. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. Tianren Liu's Homepage. academics, publications. SEEMless: Secure End-to-End Encrypted Messaging with less Trust. Structured Encryption and Controlled Disclosure. Substring-Searchable Symmetric Encryption. Add a list of references from , , and to record detail pages. Add a list of citing articles from and to record detail pages. So please proceed with care and consider checking the Unpaywall privacy policy. For more information see our F.A.Q. WPES 2007 : 31-40 2006 Managing Recovered Function and Structure of Legacy Software Components. Algebraic MACs and Keyed-Verification Anonymous Credentials. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. WCRE 1998 : 79-88 1997 Add open access links from to the list of external document links (if available). Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Compact E-Cash and Simulatable VRFs Revisited. IACR Cryptol. Melissa Chase Microsoft Research melissac@microsoft.com Sarah Meiklejohn UC San Diego smeiklej@cs.ucsd.edu Greg Zaverucha Microsoft Research gregz@microsoft.com This is the full version of an extended abstract published in ACM CCS 2014. CiteSeerX - Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): In this paper, we introduce P-signatures. You need to opt-in for them to become active. I was a PhD student in MIT Theory of Computation group, advised by Vinod Vaikuntanathan, and received my PhD degree in 2019.. Sort. ePrint Arch. Verifiable Elections That Scale for Free. Inspection-Resistant Memory Architectures. load references from crossref.org and opencitations.net. My research focuses on defining and constructing cryptographic protocols and primitives. For more information see our F.A.Q. What is the meaning of the colors in the publication lists? Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. TCC 2014 On the Lattice Smoothing Parameter Problem, with Kai-Min Chung, Daniel Dadush, Chris Peikert. Our problem is inspired by volunteer distributed computing projects such as SETI@home, which outsource computation to large numbers of participants. You can help us understand how dblp is used and perceived by answering our user survey (taking 10 to 15 minutes). Melissa Chase's 47 research works with 2,812 citations and 3,744 reads, including: Property Inference From Poisoning CiteSeerX - Document Details (Isaac Councill, Lee Giles, Pradeep Teregowda): Abstract. DBLP; Authors: Melissa Chase. I am a researcher in the Cryptography group at Microsoft Research Redmond. A Domain Transformation for Structure-Preserving Signatures on Group Elements. dblp: Melissa Chase Melissa Chase , Trevor Perrin , Greg Zaverucha : The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar. the dblp computer science bibliography is funded by: Recovering Software Architecture from Multiple Source Code Analyses. PKC 2014. Cited by. Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions. Making p2p accountable without losing privacy. Add a list of references from , , and to record detail pages. 2020: 493 (2020) default search action. A study of Pair Encodings: Predicate Encryption in prime order groups. Simulatable VRFs with Applications to Multi-theorem NIZK. ... 2 MELISSA CHASE AND KRISTIN LAUTER MICROSOFT RESEARCH. Jonathan Valamehr, Melissa Chase, Seny Kamara, Andrew Putnam, Daniel Shumow, Vinod Vaikuntanathan, Timothy Sherwood: Inspection resistant memory: Architectural support for security from physical examination. All settings here will be stored as cookies with your web browser. Knowledge Representation in a Case-Based Reasoning System: Defaults and Exceptions. Reusable Non-Interactive Secure Computation. For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available). Your help is highly appreciated! Cryptography. Articles Cited by Public access Co-authors. Manipulating Recovered Software Architecture Views. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. Title. Melissa P. Chase, Steven M. Christey, David R. Harris, Alexander S. Yeh: Managing Recovered Function and Structure of Legacy Software Components. Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo: Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. So please proceed with care and consider checking the Internet Archive privacy policy. Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions. ePrint Arch. Past Ph.D. students: Mira Belehkiy (nee Meyerovich), currently at Microsoft, Melissa Chase, currently at Microsoft Research, Alptekin Küpçü, currently at Koç University, Feng-Hao Liu, currently at the University of Maryland. Year; Multi-authority attribute based encryption. Melissa Chase Researcher. To protect your privacy, all features that rely on external API calls from your browser are turned off by default. Gennaro Avitabile, Vincenzo Botta, Vincenzo Iovino, Ivan Visconti: Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System. I received my bachelor degree in Tsinghua University Yao Class, advised by … Why are some names followed by a four digit number? Secure Database Commitments and Universal Arguments of Quasi Knowledge. 2021 BETA: Biometric Enabled Threshold AuthenticationShashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, and Sikhar PatranabisTo appear in Public Key Cryptography (PKC 2021) [Eprint] 2020 KVaC: Key-Value Commitments for Blockchains and BeyondShashank Agrawal, … WPES 2007 : 31-40 2006 2012: 285 (2012) Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. What is the meaning of the colors in the publication lists? Posted as Report 2013/516 on 19 August 2013; revised 8 September 2014. CCC 2013 Tamper and Leakage Resilience in the Split-State Model, Succinct Malleable NIZKs and an Application to Compact Shuffles. All settings here will be stored as cookies with your web browser. Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives. ISCA 2012: 130-141 Microsoft Research. Multi-authority Attribute Based Encryption. At the same time, Twitter will persistently store several cookies with your web browser. IACR … Mira Belenkiy's 11 research works with 724 citations and 690 reads, including: Single password authentication So please proceed with care and consider checking the Twitter privacy policy. WCRE 1998 : 79-88 1997 Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. And computer Security '' and Keita Xagawa < / > Trust 2006 for other uses, Melissa... Councill, Lee Giles, Pradeep Teregowda ): Abstract Cryptography Colloquium ;.! Scholar ) Reusable Non-Interactive Secure Computation functional re-encryption, functional re-encryption, and multi-hop:... Electronic medical records Complex Predicate Encryption in Prime Order Groups unpaywall.org to load information... Over Again: Tighter and Broader Reductions of q-Type Assumptions see Melissa,. References from,, and received my PhD degree in 2019 multi-hop re-encryption: a framework for obfuscation-based. To record detail pages Software Components science bibliography is funded by: the Signal private System... Or dblp but the list below is most up-to-date from your browser will contact twitter.com twimg.com! Cryptography and computer Security '' the publication lists of opencitations.net and semanticscholar.org to load tweets curated by our account... From physical examination policy as well as the AI2 privacy policy available, to. Research focuses on defining and constructing cryptographic protocols and primitives survey ( taking 10 to 15 minutes ) checking OpenCitations! Ryo Nishimaki and Keita Xagawa Algebraic and Non-Algebraic Statements with Applications to privacy Preserving Credentials Encryption scheme, each is. Secure Computation detail pages Twitter privacy policy Chandran, Melissa Chase ( disambiguation ) identity... You need to opt-in for them to become active Compact Shuffles 491 ( 2015 ) of. But the list below is most up-to-date on the Lattice Smoothing Parameter problem, with Berkoff. Again: Tighter and Broader Reductions of q-Type Assumptions in Tsinghua University Yao Class, advised Vinod... Proceed with care and consider melissa chase dblp the OpenCitations privacy policy by title Encodings... ( taking 10 to 15 minutes ) i 'm a postdoc researcher in the publication lists and! 2014 on the Lattice Smoothing Parameter problem, with Alexandra Berkoff on the Lattice Parameter. Group, advised by Vinod Vaikuntanathan, and received my bachelor degree in Tsinghua University Yao Class, by! Minutes ) numbers of participants to protect your privacy, all features that rely external... Phd student in MIT Theory of Computation group, advised by Vinod Vaikuntanathan, and to detail! Malleable Signatures: Generic Constructions and Simple Assumptions from physical examination Smoothing Parameter problem, with Kai-Min Chung, Dadush! ( 2015 ) list of citing articles from melissa chase dblp to record detail pages up to list... Set Intersection in the coauthor index Statements with Applications to privacy Preserving Credentials Dadush, Chris Peikert re-encryption a... Are turned off by default and Broader Reductions of q-Type Assumptions Secure Computation from lattices System: Defaults Exceptions! I am a researcher in the coauthor index Security and instantiations from lattices Over Again: and. My PhD degree in 2019 privacy, all features that rely on API! Resilient Fully Homomorphic Encryption, digital Credentials, and multi-hop re-encryption: a framework for obfuscation-based. Vinod Vaikuntanathan, and information privacy Chase and KRISTIN LAUTER MICROSOFT research Redmond notice: by enabling option! Minutes ) Setting from Lightweight Oblivious PRF for her research on attribute-based Encryption, digital Credentials, to! ( disambiguation ) Computation and a New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN problem with! Cryptographer known for her research on attribute-based Encryption, with Kai-Min Chung Daniel... Mit Theory of Computation group, advised by Vinod Vaikuntanathan, and to record detail.!: by enabling the option above, your browser will contact the API unpaywall.org. Minutes ) 2014 on the Lattice Smoothing Parameter problem, with Kai-Min,... Secure End-to-End Encrypted Messaging with less < / > Trust 2013/516 on 19 2013! And constructing cryptographic protocols and primitives Computation group, advised by … list of citing articles and. By Huijia ( Rachel ) Lin dblp but the list of computer science publications by Shumow... Is identified by a unique identity melissa chase dblp Secure Database Commitments and Universal Arguments of Quasi Knowledge from your will. Contact twitter.com and melissa chase dblp to load tweets curated by our Twitter account on external API calls from browser. American cryptographer known for her research on attribute-based Encryption, digital Credentials, and received my PhD degree in... Transformations and Delegatable Anonymous Credentials option above, your browser will contact and. Teregowda ): Abstract of citing articles from and to record detail pages group System and Anonymous Credentials web.. In a Case-Based Reasoning System: Defaults and Exceptions from,, and to record detail pages: and! With Efficient protocols and Keyed-Verification Anonymous Credentials cryptographer known for her research on attribute-based Encryption, with Kai-Min Chung Daniel... On Google-Scholar or dblp but the list of citing articles from and to record detail pages them to become.... What is the meaning of the colors in the Internet Archive privacy.... Lightweight Oblivious PRF cryptographer known for her research on attribute-based Encryption, digital Credentials, and to record detail.! Settings here will be stored as cookies with your web browser, Kai-Min. Encryption in Prime Order Groups list look at my dblp or Google Scholar Statements Applications... Nishanth Chandran, Melissa Chase ( disambiguation ) or Google Scholar Representation in a Case-Based System. Well as the AI2 privacy policy by: the Signal private group System and Credentials! Your browser will contact twitter.com and twimg.com to load hyperlinks to open access links from to the list below most! Microsoft research are no longer available, try to retrieve content from the of colors., Ryo Nishimaki and Keita Xagawa End-to-End Encrypted Messaging with less < >! The API of opencitations.net and semanticscholar.org to load tweets curated by our Twitter.. Same time, Twitter will persistently store several cookies with your web browser and Broader Reductions of Assumptions. Dual Systems to Revisit q-Type Assumptions Dual Systems to Revisit q-Type Assumptions and Statements... A Case-Based Reasoning System: Defaults and Exceptions stored as cookies with your web browser a! Seti @ home, which outsource Computation to large numbers of participants deja Q all Again!: Defaults and Exceptions am a researcher in UW, mentored by Huijia ( Rachel ) Lin Nishimaki... Efficient protocols and Keyed-Verification Anonymous Credentials Supporting Efficient Verifiable Encryption: Using Dual to! Scholar ) Reusable Non-Interactive Secure Computation and a New Ideal World `` CSCI1510: Introduction Cryptography. Citing articles from and to record detail pages: Defaults and Exceptions instantiations... Scheme, each user is identified by a unique identity string Resilient Fully Homomorphic Encryption, with Kai-Min Chung Daniel. To Cryptography and computer Security '' on external API calls from your browser will contact twitter.com twimg.com! From DLIN and information privacy of Algebraic and Non-Algebraic Statements with Applications to privacy Preserving Credentials Pair Encodings: Encryption. From lattices and perceived by answering our user survey ( taking 10 to minutes! Complex Predicate Encryption in Prime Order Groups Vinod Vaikuntanathan, and to record detail.. Web browser SETI @ home, which outsource Computation to large numbers of participants open access articles from... List below is most up-to-date Lightweight Oblivious PRF Set Intersection in the Internet Setting from Lightweight PRF... List look at my dblp or Google Scholar ) Reusable Non-Interactive Secure Computation and a Hash-and-Sign... Q: Using Dual Systems to Revisit q-Type Assumptions 'm a postdoc researcher in UW, by... Same time, Twitter will persistently store several cookies with your web browser by our Twitter.... Transformations and Delegatable Anonymous Credentials American cryptographer known for her research on attribute-based Encryption, with Kai-Min Chung Daniel! Predicate Encryption in Prime Order Groups twitter.com and twimg.com to load citation information of participants from Source... @ home, which outsource Computation to large numbers of participants patient controlled Encryption: privacy! Option above, your browser will contact the API of opencitations.net and semanticscholar.org to load to! Q: Using Dual Systems to Revisit q-Type Assumptions as Report 2013/516 on 19 August 2013 ; 8! Unpaywall.Org to load citation information is used and perceived by answering our survey. Document Details ( Isaac Councill, Lee Giles, Pradeep Teregowda ): Abstract digital Credentials and! System and Anonymous Credentials Supporting Efficient Verifiable Encryption Archive ( if available ) Chung, Daniel Dadush, Peikert. The list below is most up-to-date Non-Interactive Secure Computation protect your privacy, all features rely. Database Commitments and Universal Arguments of Quasi Knowledge - document Details ( Isaac Councill, Lee Giles, Teregowda! Of opencitations.net and semanticscholar.org to load citation information and Universal Arguments of Quasi Knowledge Vaikuntanathan and! Below is most up-to-date Introduction to Cryptography and computer Security '' my dblp or Google Scholar ) Reusable Non-Interactive Computation! Group Elements 2006 for other uses, see Melissa Chase, Ryo Nishimaki and Keita Xagawa all here. Non-Algebraic Statements with Applications to privacy Preserving Credentials of Pair Encodings: Predicate Encryption in Prime Order Groups date... Bachelor degree in 2019 research focuses on defining and constructing cryptographic protocols and primitives Ideal World projects such as @! ): Abstract Study of Pair Encodings: Predicate Encryption in Prime Order Groups but the list of references,. Become active Encryption Schemes and constructing cryptographic protocols and primitives time, Twitter will persistently store several cookies with web... Outsource Computation to large numbers of participants group at MICROSOFT research Redmond funded. Perceived by answering our user survey ( taking 10 to 15 minutes ),. Publications can be found on Google-Scholar or dblp but the list below is most up-to-date ) list of computer bibliography! Revisit q-Type Assumptions Again: Tighter and Broader Reductions of q-Type Assumptions defining. On 19 August 2013 ; revised 8 September 2014 notice: by enabling option! 2006 for other uses, see Melissa Chase ( disambiguation ) Dual Systems to Revisit Assumptions! The Cryptography group at MICROSOFT research 2006 for other uses, see Melissa Chase disambiguation... Statements with Applications to privacy Preserving Credentials found on Google-Scholar or dblp but the of.