Melissa Chase

Orcid: 0009-0003-8333-3942

Affiliations:
  • Microsoft Research


According to our database1, Melissa Chase authored at least 69 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Handling Identity and Fraud in the Metaverse.
IEEE Secur. Priv., 2025

2024
Weak Consistency mode in Key Transparency: OPTIKS.
IACR Cryptol. ePrint Arch., 2024

OPTIKS: An Optimized Key Transparency System.
Proceedings of the 33rd USENIX Security Symposium, 2024

Combing for Credentials: Active Pattern Extraction from Smart Reply.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Precio: Private Aggregate Measurement via Oblivious Shuffling.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Anonymous Tokens with Stronger Metadata Bit Hiding from Algebraic MACs.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Anonymous Tokens with Hidden Metadata Bit from Algebraic MACs.
IACR Cryptol. ePrint Arch., 2022

Proofs of discrete logarithm equality across groups.
IACR Cryptol. ePrint Arch., 2022

Acsesor: A New Framework for Auditable Custodial Secret Storage and Recovery.
IACR Cryptol. ePrint Arch., 2022

Active Data Pattern Extraction Attacks on Generative Language Models.
CoRR, 2022

Property Inference from Poisoning.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Credential Transparency System.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

2021
Aggregate Measurement via Oblivious Shuffling.
IACR Cryptol. ePrint Arch., 2021

Membership Inference on Word Embedding and Beyond.
CoRR, 2021

Amortizing Rate-1 OT and Applications to PIR and PSI.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

2020
Private Set Intersection in the Internet Setting from Lightweight Oblivious PRF.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Secret-Shared Shuffle.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Homomorphic Encryption Standard.
IACR Cryptol. ePrint Arch., 2019

Reusable Non-Interactive Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

SEEMless: Secure End-to-End Encrypted Messaging with less</> Trust.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Privacy Preserving Verifiable Key Directories.
IACR Cryptol. ePrint Arch., 2018

2017
Private Collaborative Neural Network Learning.
IACR Cryptol. ePrint Arch., 2017

Simplifying Design and Analysis of Complex Predicate Encryption Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

FAME: Fast Attribute-based Message Encryption.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Efficient Post-Quantum Zero-Knowledge and Signatures.
IACR Cryptol. ePrint Arch., 2016

A Study of Pair Encodings: Predicate Encryption in Prime Order Groups.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Transparency Overlays and Applications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Substring-Searchable Symmetric Encryption.
Proc. Priv. Enhancing Technol., 2015

Anonymous Transferable E-Cash.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Pattern Matching Encryption.
IACR Cryptol. ePrint Arch., 2014

Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Déjà Q: Using Dual Systems to Revisit q-Type Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Malleable Signatures: New Definitions and Delegatable Anonymous Credentials.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Algebraic MACs and Keyed-Verification Anonymous Credentials.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Inspection-Resistant Memory Architectures.
IEEE Micro, 2013

MAC Schemes with Efficient Protocols and Keyed-Verification Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013

Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013

Succinct Malleable NIZKs and an Application to Compact Shuffles.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Verifiable Elections That Scale for Free.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

2012
Functional Re-encryption and Collusion-Resistant Obfuscation.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Inspection resistant memory: Architectural support for security from physical examination.
Proceedings of the 39th International Symposium on Computer Architecture (ISCA 2012), 2012

Malleable Proof Systems and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Secure Database Commitments and Universal Arguments of Quasi Knowledge.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
A Domain Transformation for Structure-Preserving Signatures on Group Elements.
IACR Cryptol. ePrint Arch., 2011

Collusion Resistant Obfuscation and Functional Re-encryption.
IACR Cryptol. ePrint Arch., 2011

2010
An Anonymous Health Care System.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Structured Encryption and Controlled Disclosure.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
Compact E-Cash and Simulatable VRFs Revisited.
Proceedings of the Pairing-Based Cryptography, 2009

Randomizable Proofs and Delegatable Anonymous Credentials.
Proceedings of the Advances in Cryptology, 2009

Improving privacy and security in multi-authority attribute-based encryption.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Patient controlled encryption: ensuring privacy of electronic medical records.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Efficient Non-Interactive Zero-Knowledge Proofs for Privacy Applications.
PhD thesis, 2008

Delegatable Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2008

P-signatures and Noninteractive Anonymous Credentials.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Incentivizing outsourced computation.
Proceedings of the ACM SIGCOMM 2008 Workshop on Economics of Networked Systems, 2008

2007
Non-Interactive Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2007

Making p2p accountable without losing privacy.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Multi-authority Attribute Based Encryption.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Simulatable VRFs with Applications to Multi-theorem NIZK.
Proceedings of the Advances in Cryptology, 2007

2006
On Signatures of Knowledge.
Proceedings of the Advances in Cryptology, 2006

2005
Mercurial Commitments with Applications to Zero-Knowledge Sets.
Proceedings of the Advances in Cryptology, 2005


  Loading...