BibTeX records: Allison Bishop

download as .bib file

@article{DBLP:journals/iacr/BhandariB23,
  author       = {Anindya Bhandari and
                  Allison Bishop},
  title        = {What If Alice Wants Her Story Told?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {900},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/900},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhandariB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmericoBCGMMORS23,
  author       = {Arthur Am{\'{e}}rico and
                  Allison Bishop and
                  Paul Cesaretti and
                  Garrison Grogan and
                  Adam McKoy and
                  Robert Moss and
                  Lisa Oakley and
                  Marcel Ribeiro and
                  Mohammad Shokri},
  title        = {Defining and Controlling Information Leakage in {US} Equities Trading},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {971},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/971},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AmericoBCGMMORS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AlmashaqbehBC20,
  author       = {Ghada Almashaqbeh and
                  Allison Bishop and
                  Justin Cappos},
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {MicroCash: Practical Concurrent Processing of Micropayments},
  booktitle    = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {227--244},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4\_13},
  doi          = {10.1007/978-3-030-51280-4\_13},
  timestamp    = {Wed, 22 Jul 2020 12:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AlmashaqbehBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BienstockBGGL20,
  author       = {Alexander Bienstock and
                  Allison Bishop and
                  Eli Goldin and
                  Garrison Grogan and
                  Victor Lecomte},
  title        = {From discrete-log to lattices: maybe the real lessons were our broken
                  schemes along the way?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {164},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/164},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BienstockBGGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlmashaqbehKBC19,
  author       = {Ghada Almashaqbeh and
                  Kevin Kelley and
                  Allison Bishop and
                  Justin Cappos},
  title        = {CAPnet: {A} Defense Against Cache Accounting Attacks on Content Distribution
                  Networks},
  booktitle    = {7th {IEEE} Conference on Communications and Network Security, {CNS}
                  2019, Washington, DC, USA, June 10-12, 2019},
  pages        = {250--258},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CNS.2019.8802825},
  doi          = {10.1109/CNS.2019.8802825},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlmashaqbehKBC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/AlmashaqbehBC19,
  author       = {Ghada Almashaqbeh and
                  Allison Bishop and
                  Justin Cappos},
  title        = {{ABC:} {A} Cryptocurrency-Focused Threat Modeling Framework},
  booktitle    = {{IEEE} {INFOCOM} 2019 - {IEEE} Conference on Computer Communications
                  Workshops, {INFOCOM} Workshops 2019, Paris, France, April 29 - May
                  2, 2019},
  pages        = {859--864},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/INFCOMW.2019.8845101},
  doi          = {10.1109/INFCOMW.2019.8845101},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/AlmashaqbehBC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1903-03422,
  author       = {Ghada Almashaqbeh and
                  Allison Bishop and
                  Justin Cappos},
  title        = {{ABC:} {A} Cryptocurrency-Focused Threat Modeling Framework},
  journal      = {CoRR},
  volume       = {abs/1903.03422},
  year         = {2019},
  url          = {http://arxiv.org/abs/1903.03422},
  eprinttype    = {arXiv},
  eprint       = {1903.03422},
  timestamp    = {Sun, 31 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1903-03422.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-03231,
  author       = {Kevin Shi and
                  Daniel Hsu and
                  Allison Bishop},
  title        = {A cryptographic approach to black box adversarial machine learning},
  journal      = {CoRR},
  volume       = {abs/1906.03231},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.03231},
  eprinttype    = {arXiv},
  eprint       = {1906.03231},
  timestamp    = {Fri, 14 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-03231.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10272,
  author       = {Ghada Almashaqbeh and
                  Kevin Kelley and
                  Allison Bishop and
                  Justin Cappos},
  title        = {CAPnet: {A} Defense Against Cache Accounting Attacks on Content Distribution
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1906.10272},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10272},
  eprinttype    = {arXiv},
  eprint       = {1906.10272},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10272.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-08520,
  author       = {Ghada Almashaqbeh and
                  Allison Bishop and
                  Justin Cappos},
  title        = {MicroCash: Practical Concurrent Processing of Micropayments},
  journal      = {CoRR},
  volume       = {abs/1911.08520},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.08520},
  eprinttype    = {arXiv},
  eprint       = {1911.08520},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-08520.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BishopKMPRS19,
  author       = {Allison Bishop and
                  Lucas Kowalczyk and
                  Tal Malkin and
                  Valerio Pastro and
                  Mariana Raykova and
                  Kevin Shi},
  title        = {In Pursuit of Clarity In Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BishopKMPRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BishopKMP0S18,
  author       = {Allison Bishop and
                  Lucas Kowalczyk and
                  Tal Malkin and
                  Valerio Pastro and
                  Mariana Raykova and
                  Kevin Shi},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {731--752},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_25},
  doi          = {10.1007/978-3-319-96878-0\_25},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BishopKMP0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BishopKMP0S18,
  author       = {Allison Bishop and
                  Lucas Kowalczyk and
                  Tal Malkin and
                  Valerio Pastro and
                  Mariana Raykova and
                  Kevin Shi},
  title        = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BishopKMP0S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BishopPRW16,
  author       = {Allison Bishop and
                  Valerio Pastro and
                  Rajmohan Rajaraman and
                  Daniel Wichs},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Essentially Optimal Robust Secret Sharing with Maximal Corruptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {58--86},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_3},
  doi          = {10.1007/978-3-662-49890-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BishopPRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BishopP16,
  author       = {Allison Bishop and
                  Valerio Pastro},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Robust Secret Sharing Schemes Against Local Adversaries},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {327--356},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_13},
  doi          = {10.1007/978-3-662-49387-8\_13},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BishopP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BishopD16,
  author       = {Allison Bishop and
                  Yevgeniy Dodis},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Interactive Coding for Interactive Proofs},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9563},
  pages        = {352--366},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49099-0\_13},
  doi          = {10.1007/978-3-662-49099-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BishopD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/LewkoL15,
  author       = {Allison B. Lewko and
                  Mark Lewko},
  title        = {On the complexity of asynchronous agreement against powerful adversaries},
  journal      = {Distributed Comput.},
  volume       = {28},
  number       = {6},
  pages        = {377--389},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00446-014-0224-5},
  doi          = {10.1007/S00446-014-0224-5},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/LewkoL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Bishop0K15,
  author       = {Allison Bishop and
                  Abhishek Jain and
                  Lucas Kowalczyk},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Function-Hiding Inner Product Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {470--491},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_20},
  doi          = {10.1007/978-3-662-48797-6\_20},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Bishop0K15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BishopHW15,
  author       = {Allison Bishop and
                  Susan Hohenberger and
                  Brent Waters},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {New Circular Security Counterexamples from Decision Linear and Learning
                  with Errors},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {776--800},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_32},
  doi          = {10.1007/978-3-662-48800-3\_32},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BishopHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KowalczykL15,
  author       = {Lucas Kowalczyk and
                  Allison Bishop Lewko},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Bilinear Entropy Expansion from the Decisional Linear Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {524--541},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_26},
  doi          = {10.1007/978-3-662-48000-7\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KowalczykL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GentryLSW15,
  author       = {Craig Gentry and
                  Allison Bishop Lewko and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Venkatesan Guruswami},
  title        = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination
                  Assumption},
  booktitle    = {{IEEE} 56th Annual Symposium on Foundations of Computer Science, {FOCS}
                  2015, Berkeley, CA, USA, 17-20 October, 2015},
  pages        = {151--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/FOCS.2015.19},
  doi          = {10.1109/FOCS.2015.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GentryLSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/0002KL15,
  author       = {Abhishek Jain and
                  Yael Tauman Kalai and
                  Allison Bishop Lewko},
  editor       = {Tim Roughgarden},
  title        = {Interactive Coding for Multiparty Protocols},
  booktitle    = {Proceedings of the 2015 Conference on Innovations in Theoretical Computer
                  Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2688073.2688109},
  doi          = {10.1145/2688073.2688109},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/0002KL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LewkoM15,
  author       = {Allison B. Lewko and
                  Sarah Meiklejohn},
  editor       = {Jonathan Katz},
  title        = {A Profitable Sub-prime Loan: Obtaining the Advantages of Composite
                  Order in Prime-Order Bilinear Groups},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {377--398},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_17},
  doi          = {10.1007/978-3-662-46447-2\_17},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/LewkoM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KoppulaLW15,
  author       = {Venkata Koppula and
                  Allison Bishop Lewko and
                  Brent Waters},
  editor       = {Rocco A. Servedio and
                  Ronitt Rubinfeld},
  title        = {Indistinguishability Obfuscation for Turing Machines with Unbounded
                  Memory},
  booktitle    = {Proceedings of the Forty-Seventh Annual {ACM} on Symposium on Theory
                  of Computing, {STOC} 2015, Portland, OR, USA, June 14-17, 2015},
  pages        = {419--428},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746539.2746614},
  doi          = {10.1145/2746539.2746614},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/KoppulaLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2015,
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7},
  doi          = {10.1007/978-3-319-28166-7},
  isbn         = {978-3-319-28165-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/LewkoV15,
  author       = {Allison B. Lewko and
                  Ellen Vitercik},
  title        = {Balancing Communication for Multi-party Interactive Coding},
  journal      = {CoRR},
  volume       = {abs/1503.06381},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.06381},
  eprinttype    = {arXiv},
  eprint       = {1503.06381},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/LewkoV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BishopJK15,
  author       = {Allison Bishop and
                  Abhishek Jain and
                  Lucas Kowalczyk},
  title        = {Function-Hiding Inner Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {672},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/672},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BishopJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BishopHW15,
  author       = {Allison Bishop and
                  Susan Hohenberger and
                  Brent Waters},
  title        = {New Circular Security Counterexamples from Decision Linear and Learning
                  with Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {715},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/715},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BishopHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BishopPRW15,
  author       = {Allison Bishop and
                  Valerio Pastro and
                  Rajmohan Rajaraman and
                  Daniel Wichs},
  title        = {Essentially Optimal Robust Secret Sharing with Maximal Corruptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1032},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BishopPRW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryLW14,
  author       = {Craig Gentry and
                  Allison B. Lewko and
                  Brent Waters},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Witness Encryption from Instance Independent Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {426--443},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_24},
  doi          = {10.1007/978-3-662-44371-2\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoW14,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Why Proving {HIBE} Systems Secure Is Difficult},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {58--76},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_4},
  doi          = {10.1007/978-3-642-55220-5\_4},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryLW14,
  author       = {Craig Gentry and
                  Allison Bishop Lewko and
                  Brent Waters},
  title        = {Witness Encryption from Instance Independent Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryLSW14,
  author       = {Craig Gentry and
                  Allison B. Lewko and
                  Amit Sahai and
                  Brent Waters},
  title        = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryLSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KowalczykL14,
  author       = {Lucas Kowalczyk and
                  Allison Bishop Lewko},
  title        = {Bilinear Entropy Expansion from the Decisional Linear Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {754},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/754},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KowalczykL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisL14,
  author       = {Yevgeniy Dodis and
                  Allison Bishop Lewko},
  title        = {Interactive Coding for Interactive Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {827},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/827},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoP14,
  author       = {Allison Bishop Lewko and
                  Valerio Pastro},
  title        = {Robust Secret Sharing Schemes Against Local Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {909},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/909},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppulaLW14,
  author       = {Venkata Koppula and
                  Allison Bishop Lewko and
                  Brent Waters},
  title        = {Indistinguishability Obfuscation for Turing Machines with Unbounded
                  Memory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {925},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/925},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppulaLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/LewkoL13,
  author       = {Allison B. Lewko and
                  Mark Lewko},
  editor       = {Panagiota Fatourou and
                  Gadi Taubenfeld},
  title        = {On the complexity of asynchronous agreement against powerful adversaries},
  booktitle    = {{ACM} Symposium on Principles of Distributed Computing, {PODC} '13,
                  Montreal, QC, Canada, July 22-24, 2013},
  pages        = {280--289},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484239.2484250},
  doi          = {10.1145/2484239.2484250},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/LewkoL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-3223,
  author       = {Allison B. Lewko and
                  Mark Lewko},
  title        = {On the Complexity of Asynchronous Agreement Against Powerful Adversaries},
  journal      = {CoRR},
  volume       = {abs/1301.3223},
  year         = {2013},
  url          = {http://arxiv.org/abs/1301.3223},
  eprinttype    = {arXiv},
  eprint       = {1301.3223},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1301-3223.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW13,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {Why Proving {HIBE} Systems Secure is Difficult},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoM13,
  author       = {Allison B. Lewko and
                  Sarah Meiklejohn},
  title        = {A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order
                  in Prime-Order Bilinear Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/300},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GerbushLOW12,
  author       = {Michael Gerbush and
                  Allison B. Lewko and
                  Adam O'Neill and
                  Brent Waters},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Dual Form Signatures: An Approach for Proving Security from Static
                  Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {25--42},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_4},
  doi          = {10.1007/978-3-642-34961-4\_4},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GerbushLOW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LewkoW12,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security
                  through Selective Techniques},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {180--198},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_12},
  doi          = {10.1007/978-3-642-32009-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LewkoW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Lewko12,
  author       = {Allison B. Lewko},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Tools for Simulating Features of Composite Order Bilinear Groups in
                  the Prime Order Setting},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {318--335},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_20},
  doi          = {10.1007/978-3-642-29011-4\_20},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Lewko12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HohenbergerLW12,
  author       = {Susan Hohenberger and
                  Allison B. Lewko and
                  Brent Waters},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Detecting Dangerous Queries: {A} New Approach for Chosen Ciphertext
                  Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {663--681},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_39},
  doi          = {10.1007/978-3-642-29011-4\_39},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HohenbergerLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KalaiLR12,
  author       = {Yael Tauman Kalai and
                  Allison B. Lewko and
                  Anup Rao},
  title        = {Formulas Resilient to Short-Circuit Errors},
  booktitle    = {53rd Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2012, New Brunswick, NJ, USA, October 20-23, 2012},
  pages        = {490--499},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FOCS.2012.69},
  doi          = {10.1109/FOCS.2012.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KalaiLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoldwasserLW12,
  author       = {Shafi Goldwasser and
                  Allison B. Lewko and
                  David A. Wilson},
  editor       = {Ronald Cramer},
  title        = {Bounded-Collusion {IBE} from Key Homomorphism},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {564--581},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_32},
  doi          = {10.1007/978-3-642-28914-9\_32},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoldwasserLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerLW12,
  author       = {Susan Hohenberger and
                  Allison B. Lewko and
                  Brent Waters},
  title        = {Detecting Dangerous Queries: {A} New Approach for Chosen Ciphertext
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GerbushLOW12,
  author       = {Michael Gerbush and
                  Allison B. Lewko and
                  Adam O'Neill and
                  Brent Waters},
  title        = {Dual Form Signatures: An Approach for Proving Security from Static
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GerbushLOW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW12,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security
                  through Selective Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejc/LewkoL11,
  author       = {Allison B. Lewko and
                  Mark Lewko},
  title        = {On the structure of sets of large doubling},
  journal      = {Eur. J. Comb.},
  volume       = {32},
  number       = {5},
  pages        = {688--708},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ejc.2011.03.001},
  doi          = {10.1016/J.EJC.2011.03.001},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ejc/LewkoL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoW11,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Kenneth G. Paterson},
  title        = {Unbounded {HIBE} and Attribute-Based Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {547--567},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_30},
  doi          = {10.1007/978-3-642-20465-4\_30},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoW11a,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Kenneth G. Paterson},
  title        = {Decentralizing Attribute-Based Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {568--588},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_31},
  doi          = {10.1007/978-3-642-20465-4\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoW11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DodisLWW11,
  author       = {Yevgeniy Dodis and
                  Allison B. Lewko and
                  Brent Waters and
                  Daniel Wichs},
  editor       = {Rafail Ostrovsky},
  title        = {Storing Secrets on Continually Leaky Devices},
  booktitle    = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS}
                  2011, Palm Springs, CA, USA, October 22-25, 2011},
  pages        = {688--697},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/FOCS.2011.35},
  doi          = {10.1109/FOCS.2011.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DodisLWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/LewkoLW11,
  author       = {Allison B. Lewko and
                  Mark Lewko and
                  Brent Waters},
  editor       = {Lance Fortnow and
                  Salil P. Vadhan},
  title        = {How to leak on key updates},
  booktitle    = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC}
                  2011, San Jose, CA, USA, 6-8 June 2011},
  pages        = {725--734},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1993636.1993732},
  doi          = {10.1145/1993636.1993732},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/LewkoLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LewkoRW11,
  author       = {Allison B. Lewko and
                  Yannis Rouselakis and
                  Brent Waters},
  editor       = {Yuval Ishai},
  title        = {Achieving Leakage Resilience through Dual System Encryption},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {70--88},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_6},
  doi          = {10.1007/978-3-642-19571-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LewkoRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/Lewko11,
  author       = {Allison B. Lewko},
  editor       = {David Peleg},
  title        = {The Contest between Simplicity and Efficiency in Asynchronous Byzantine
                  Agreement},
  booktitle    = {Distributed Computing - 25th International Symposium, {DISC} 2011,
                  Rome, Italy, September 20-22, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6950},
  pages        = {348--362},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24100-0\_35},
  doi          = {10.1007/978-3-642-24100-0\_35},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/Lewko11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1106-5170,
  author       = {Allison B. Lewko},
  title        = {The Contest Between Simplicity and Efficiency in Asynchronous Byzantine
                  Agreement},
  journal      = {CoRR},
  volume       = {abs/1106.5170},
  year         = {2011},
  url          = {http://arxiv.org/abs/1106.5170},
  eprinttype    = {arXiv},
  eprint       = {1106.5170},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1106-5170.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW11,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {Unbounded {HIBE} and Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisLWW11,
  author       = {Yevgeniy Dodis and
                  Allison B. Lewko and
                  Brent Waters and
                  Daniel Wichs},
  title        = {Storing Secrets on Continually Leaky Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisLWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Lewko11,
  author       = {Allison B. Lewko},
  title        = {Tools for Simulating Features of Composite Order Bilinear Groups in
                  the Prime Order Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {490},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/490},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Lewko11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoOSTW10,
  author       = {Allison B. Lewko and
                  Tatsuaki Okamoto and
                  Amit Sahai and
                  Katsuyuki Takashima and
                  Brent Waters},
  editor       = {Henri Gilbert},
  title        = {Fully Secure Functional Encryption: Attribute-Based Encryption and
                  (Hierarchical) Inner Product Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {62--91},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_4},
  doi          = {10.1007/978-3-642-13190-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoOSTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/LewkoW10,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {On the Insecurity of Parallel Repetition for Leakage Resilience},
  booktitle    = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  pages        = {521--530},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FOCS.2010.57},
  doi          = {10.1109/FOCS.2010.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/LewkoW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LewkoSW10,
  author       = {Allison B. Lewko and
                  Amit Sahai and
                  Brent Waters},
  title        = {Revocation Systems with Very Small Private Keys},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {273--285},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.23},
  doi          = {10.1109/SP.2010.23},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LewkoSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LewkoW10,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Daniele Micciancio},
  title        = {New Techniques for Dual System Encryption and Fully Secure {HIBE}
                  with Short Ciphertexts},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {455--479},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_27},
  doi          = {10.1007/978-3-642-11799-2\_27},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LewkoW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoOSTW10,
  author       = {Allison B. Lewko and
                  Tatsuaki Okamoto and
                  Amit Sahai and
                  Katsuyuki Takashima and
                  Brent Waters},
  title        = {Fully Secure Functional Encryption: Attribute-Based Encryption and
                  (Hierarchical) Inner Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoOSTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW10,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {Decentralizing Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW10a,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {On the Insecurity of Parallel Repetition for Leakage Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoRW10,
  author       = {Allison B. Lewko and
                  Yannis Rouselakis and
                  Brent Waters},
  title        = {Achieving Leakage Resilience Through Dual System Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoLW10,
  author       = {Allison B. Lewko and
                  Mark Lewko and
                  Brent Waters},
  title        = {How to Leak on Key Updates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {562},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/562},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LewkoW09,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Efficient pseudorandom functions from the decisional linear assumption
                  and weaker variants},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {112--120},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653677},
  doi          = {10.1145/1653662.1653677},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LewkoW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW09,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {New Techniques for Dual System Encryption and Fully Secure {HIBE}
                  with Short Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW09a,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {Efficient Pseudorandom Functions From the Decisional Linear Assumption
                  and Weaker Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoSW08,
  author       = {Allison B. Lewko and
                  Amit Sahai and
                  Brent Waters},
  title        = {Revocation Systems with Very Small Private Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics