Melissa Chase

Orcid: 0009-0003-8333-3942

Affiliations:
  • Microsoft Research


According to our database1, Melissa Chase authored at least 65 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency.
IACR Cryptol. ePrint Arch., 2024

2023
OPTIKS: An Optimized Key Transparency System.
IACR Cryptol. ePrint Arch., 2023

Anonymous Tokens with Stronger Metadata Bit Hiding from Algebraic MACs.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Anonymous Tokens with Hidden Metadata Bit from Algebraic MACs.
IACR Cryptol. ePrint Arch., 2022

Proofs of discrete logarithm equality across groups.
IACR Cryptol. ePrint Arch., 2022

Acsesor: A New Framework for Auditable Custodial Secret Storage and Recovery.
IACR Cryptol. ePrint Arch., 2022

Active Data Pattern Extraction Attacks on Generative Language Models.
CoRR, 2022

Credential Transparency System.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

2021
Property Inference from Poisoning.
IACR Cryptol. ePrint Arch., 2021

Amortizing Rate-1 OT and Applications to PIR and PSI.
IACR Cryptol. ePrint Arch., 2021

Aggregate Measurement via Oblivious Shuffling.
IACR Cryptol. ePrint Arch., 2021

Membership Inference on Word Embedding and Beyond.
CoRR, 2021

2020
Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF.
IACR Cryptol. ePrint Arch., 2020

2019
The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption.
IACR Cryptol. ePrint Arch., 2019

Secret Shared Shuffle.
IACR Cryptol. ePrint Arch., 2019

Homomorphic Encryption Standard.
IACR Cryptol. ePrint Arch., 2019

SEEMless: Secure End-to-End Encrypted Messaging with less</> Trust.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Reusable Non-Interactive Secure Computation.
IACR Cryptol. ePrint Arch., 2018

Privacy Preserving Verifiable Key Directories.
IACR Cryptol. ePrint Arch., 2018

2017
Private Collaborative Neural Network Learning.
IACR Cryptol. ePrint Arch., 2017

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2017

FAME: Fast Attribute-based Message Encryption.
IACR Cryptol. ePrint Arch., 2017

Simplifying Design and Analysis of Complex Predicate Encryption Schemes.
IACR Cryptol. ePrint Arch., 2017

2016
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
J. Cryptol., 2016

Efficient Post-Quantum Zero-Knowledge and Signatures.
IACR Cryptol. ePrint Arch., 2016

Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions.
IACR Cryptol. ePrint Arch., 2016

Transparency Overlays and Applications.
IACR Cryptol. ePrint Arch., 2016

Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials.
IACR Cryptol. ePrint Arch., 2016

2015
Substring-Searchable Symmetric Encryption.
Proc. Priv. Enhancing Technol., 2015

Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices.
IACR Cryptol. ePrint Arch., 2015

A study of Pair Encodings: Predicate Encryption in prime order groups.
IACR Cryptol. ePrint Arch., 2015

Anonymous Transferable E-Cash.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Pattern Matching Encryption.
IACR Cryptol. ePrint Arch., 2014

Deja Q: Using Dual Systems to Revisit q-Type Assumptions.
IACR Cryptol. ePrint Arch., 2014

Malleable Signatures: New Definitions and Delegatable Anonymous Credentials.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Algebraic MACs and Keyed-Verification Anonymous Credentials.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Inspection-Resistant Memory Architectures.
IEEE Micro, 2013

Mercurial Commitments with Applications to Zero-Knowledge Sets.
J. Cryptol., 2013

MAC Schemes with Efficient Protocols and Keyed-Verification Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013

Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013

Incentivizing Outsourced Computation.
IACR Cryptol. ePrint Arch., 2013

2012
Secure Database Commitments and Universal Arguments of Quasi Knowledge.
IACR Cryptol. ePrint Arch., 2012

Verifiable Elections That Scale for Free.
IACR Cryptol. ePrint Arch., 2012

Succinct Malleable NIZKs and an Application to Compact Shuffles.
IACR Cryptol. ePrint Arch., 2012

Malleable Proof Systems and Applications.
IACR Cryptol. ePrint Arch., 2012

Functional Re-encryption and Collusion-Resistant Obfuscation.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Inspection resistant memory: Architectural support for security from physical examination.
Proceedings of the 39th International Symposium on Computer Architecture (ISCA 2012), 2012

2011
An Anonymous Health Care System.
IACR Cryptol. ePrint Arch., 2011

A Domain Transformation for Structure-Preserving Signatures on Group Elements.
IACR Cryptol. ePrint Arch., 2011

Structured Encryption and Controlled Disclosure.
IACR Cryptol. ePrint Arch., 2011

Collusion Resistant Obfuscation and Functional Re-encryption.
IACR Cryptol. ePrint Arch., 2011

2009
Compact E-Cash and Simulatable VRFs Revisited.
IACR Cryptol. ePrint Arch., 2009

Randomizable Proofs and Delegatable Anonymous Credentials.
Proceedings of the Advances in Cryptology, 2009

Improving privacy and security in multi-authority attribute-based encryption.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Patient controlled encryption: ensuring privacy of electronic medical records.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Efficient Non-Interactive Zero-Knowledge Proofs for Privacy Applications.
PhD thesis, 2008

Delegatable Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2008

P-signatures and Noninteractive Anonymous Credentials.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

2007
Non-Interactive Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2007

Making p2p accountable without losing privacy.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Multi-authority Attribute Based Encryption.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Simulatable VRFs with Applications to Multi-theorem NIZK.
Proceedings of the Advances in Cryptology, 2007

2006
On Signatures of Knowledge.
IACR Cryptol. ePrint Arch., 2006


  Loading...