default search action
BibTeX records: Brent Waters
@inproceedings{DBLP:conf/crypto/WatersZ24, author = {Brent Waters and Mark Zhandry}, editor = {Leonid Reyzin and Douglas Stebila}, title = {Adaptive Security in SNARGs via iO and Lossy Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part {X}}, series = {Lecture Notes in Computer Science}, volume = {14929}, pages = {72--104}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-68403-6\_3}, doi = {10.1007/978-3-031-68403-6\_3}, timestamp = {Tue, 20 Aug 2024 16:20:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WatersZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargLWW24, author = {Rachit Garg and George Lu and Brent Waters and David J. Wu}, editor = {Leonid Reyzin and Douglas Stebila}, title = {Reducing the {CRS} Size in Registered {ABE} Systems}, booktitle = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14922}, pages = {143--177}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-68382-4\_5}, doi = {10.1007/978-3-031-68382-4\_5}, timestamp = {Tue, 20 Aug 2024 16:20:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargLWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/AnanthAGKSW24, author = {Prabhanjan Ananth and Gilad Asharov and Vipul Goyal and Hadar Kaner and Pratik Soni and Brent Waters}, editor = {Clemente Galdi and Duong Hieu Phan}, title = {NIZKs with Maliciously Chosen {CRS:} Subversion Advice-ZK and Accountable Soundness}, booktitle = {Security and Cryptography for Networks - 14th International Conference, {SCN} 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14973}, pages = {3--23}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-71070-4\_1}, doi = {10.1007/978-3-031-71070-4\_1}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/AnanthAGKSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Waters024, author = {Brent Waters and David J. Wu}, editor = {Bojan Mohar and Igor Shinkar and Ryan O'Donnell}, title = {Adaptively-Sound Succinct Arguments for {NP} from Indistinguishability Obfuscation}, booktitle = {Proceedings of the 56th Annual {ACM} Symposium on Theory of Computing, {STOC} 2024, Vancouver, BC, Canada, June 24-28, 2024}, pages = {387--398}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3618260.3649671}, doi = {10.1145/3618260.3649671}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/Waters024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Waters24, author = {Brent Waters}, editor = {Bojan Mohar and Igor Shinkar and Ryan O'Donnell}, title = {A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors}, booktitle = {Proceedings of the 56th Annual {ACM} Symposium on Theory of Computing, {STOC} 2024, Vancouver, BC, Canada, June 24-28, 2024}, pages = {399--410}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3618260.3649683}, doi = {10.1145/3618260.3649683}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/Waters24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatersW24, author = {Brent Waters and David J. Wu}, title = {Adaptively-Sound Succinct Arguments for {NP} from Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2024}, url = {https://eprint.iacr.org/2024/165}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WatersW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthAGKSW24, author = {Prabhanjan Ananth and Gilad Asharov and Vipul Goyal and Hadar Kaner and Pratik Soni and Brent Waters}, title = {NIZKs with Maliciously Chosen {CRS:} Subversion Advice-ZK and Accountable Soundness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2024}, url = {https://eprint.iacr.org/2024/207}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AnanthAGKSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatersZ24, author = {Brent Waters and Mark Zhandry}, title = {Adaptive Security in SNARGs via iO and Lossy Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {254}, year = {2024}, url = {https://eprint.iacr.org/2024/254}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WatersZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Waters24, author = {Brent Waters}, title = {A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2024}, url = {https://eprint.iacr.org/2024/340}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Waters24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargLWW24, author = {Rachit Garg and George Lu and Brent Waters and David J. Wu}, title = {Reducing the {CRS} Size in Registered {ABE} Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {749}, year = {2024}, url = {https://eprint.iacr.org/2024/749}, timestamp = {Wed, 29 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargLWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatersW24a, author = {Brent Waters and David J. Wu}, title = {A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for {NP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {933}, year = {2024}, url = {https://eprint.iacr.org/2024/933}, timestamp = {Mon, 01 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatersW24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HolmgrenW24, author = {Justin Holmgren and Brent Waters}, title = {Separating Selective Opening Security From Standard Security, Assuming {IO}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1080}, year = {2024}, url = {https://eprint.iacr.org/2024/1080}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HolmgrenW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DattaKW23, author = {Pratish Datta and Ilan Komargodski and Brent Waters}, title = {Decentralized Multi-authority {ABE} for sfNC\({}^{\mbox{1}}\) from {BDH}}, journal = {J. Cryptol.}, volume = {36}, number = {2}, pages = {6}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09445-7}, doi = {10.1007/S00145-023-09445-7}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/DattaKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001LW023, author = {Rachit Garg and George Lu and Brent Waters and David J. Wu}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1093--1107}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623168}, doi = {10.1145/3576915.3623168}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001LW023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbramWZ23, author = {Damiano Abram and Brent Waters and Mark Zhandry}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Security-Preserving Distributed Samplers: How to Generate Any {CRS} in One Round Without Random Oracles}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {489--514}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_16}, doi = {10.1007/978-3-031-38557-5\_16}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbramWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FreitagWW23, author = {Cody Freitag and Brent Waters and David J. Wu}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {498--531}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_16}, doi = {10.1007/978-3-031-38551-3\_16}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FreitagWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WatersW23, author = {Brent Waters and Daniel Wichs}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Universal Amplification of {KDM} Security: From 1-Key Circular to Multi-Key {KDM}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {674--693}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_22}, doi = {10.1007/978-3-031-38545-2\_22}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WatersW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargKLW23, author = {Rachit Garg and Dakshita Khurana and George Lu and Brent Waters}, editor = {Carmit Hazay and Martijn Stam}, title = {On Non-uniform Security for Black-Box Non-interactive {CCA} Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {173--204}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_7}, doi = {10.1007/978-3-031-30545-0\_7}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargKLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DattaKW23, author = {Pratish Datta and Ilan Komargodski and Brent Waters}, editor = {Carmit Hazay and Martijn Stam}, title = {Fully Adaptive Decentralized Multi-Authority {ABE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {447--478}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_15}, doi = {10.1007/978-3-031-30620-4\_15}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DattaKW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerLWW23, author = {Susan Hohenberger and George Lu and Brent Waters and David J. Wu}, editor = {Carmit Hazay and Martijn Stam}, title = {Registered Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {511--542}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_17}, doi = {10.1007/978-3-031-30620-4\_17}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerLWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GhosalSW23, author = {Riddhi Ghosal and Amit Sahai and Brent Waters}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Non-Interactive Publicly-Verifiable Delegation of Committed Programs}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {575--605}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_20}, doi = {10.1007/978-3-031-31371-4\_20}, timestamp = {Fri, 05 May 2023 22:44:30 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GhosalSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FernandoSSVW23, author = {Rex Fernando and Elaine Shi and Pratik Soni and Nikhil Vanjani and Brent Waters}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Non-Interactive Anonymous Router with Quasi-Linear Router Computation}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14371}, pages = {62--92}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48621-0\_3}, doi = {10.1007/978-3-031-48621-0\_3}, timestamp = {Wed, 06 Dec 2023 13:56:15 +0100}, biburl = {https://dblp.org/rec/conf/tcc/FernandoSSVW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FreitagWW23, author = {Cody Freitag and Brent Waters and David J. Wu}, title = {How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {812}, year = {2023}, url = {https://eprint.iacr.org/2023/812}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FreitagWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbramWZ23, author = {Damiano Abram and Brent Waters and Mark Zhandry}, title = {Security-Preserving Distributed Samplers: How to Generate any {CRS} in One Round without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {860}, year = {2023}, url = {https://eprint.iacr.org/2023/860}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbramWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatersW23, author = {Brent Waters and Daniel Wichs}, title = {Universal Amplification of {KDM} Security: From 1-Key Circular to Multi-Key {KDM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1058}, year = {2023}, url = {https://eprint.iacr.org/2023/1058}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatersW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargLWW23, author = {Rachit Garg and George Lu and Brent Waters and David J. Wu}, title = {Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1583}, year = {2023}, url = {https://eprint.iacr.org/2023/1583}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GargLWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehPW23, author = {Dan Boneh and Aditi Partap and Brent Waters}, title = {Accountable Multi-Signatures with Constant Size Public Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1793}, year = {2023}, url = {https://eprint.iacr.org/2023/1793}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BonehPW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BradleyWW23, author = {Eli Bradley and Brent Waters and David J. Wu}, title = {Batch Arguments to NIZKs from One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1938}, year = {2023}, url = {https://eprint.iacr.org/2023/1938}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BradleyWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NassarWW23, author = {Shafik Nassar and Brent Waters and David J. Wu}, title = {Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1967}, year = {2023}, url = {https://eprint.iacr.org/2023/1967}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NassarWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WatersW22, author = {Brent Waters and David J. Wu}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Batch Arguments for sfNP and More from Standard Bilinear Group Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13508}, pages = {433--463}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15979-4\_15}, doi = {10.1007/978-3-031-15979-4\_15}, timestamp = {Wed, 19 Oct 2022 17:37:44 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WatersW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargGLW22, author = {Rachit Garg and Rishab Goyal and George Lu and Brent Waters}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {736--763}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_25}, doi = {10.1007/978-3-031-07085-3\_25}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargGLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KoppulaWZ22, author = {Venkata Koppula and Brent Waters and Mark Zhandry}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Adaptive Multiparty {NIKE}}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {244--273}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_9}, doi = {10.1007/978-3-031-22365-5\_9}, timestamp = {Fri, 23 Dec 2022 17:47:38 +0100}, biburl = {https://dblp.org/rec/conf/tcc/KoppulaWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargSWW22, author = {Rachit Garg and Kristin Sheridan and Brent Waters and David J. Wu}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Fully Succinct Batch Arguments for sfNP from Indistinguishability Obfuscation}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13747}, pages = {526--555}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22318-1\_19}, doi = {10.1007/978-3-031-22318-1\_19}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GargSWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/WatersWW22, author = {Brent Waters and Hoeteck Wee and David J. Wu}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Multi-authority {ABE} from Lattices Without Random Oracles}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13747}, pages = {651--679}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22318-1\_23}, doi = {10.1007/978-3-031-22318-1\_23}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/WatersWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LuW22, author = {George Lu and Brent Waters}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {How to Sample a Discrete Gaussian (and more) from a Random Oracle}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {653--682}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_23}, doi = {10.1007/978-3-031-22365-5\_23}, timestamp = {Fri, 23 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/LuW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatersW22, author = {Brent Waters and David J. Wu}, title = {Batch Arguments for {NP} and More from Standard Bilinear Group Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2022}, url = {https://eprint.iacr.org/2022/336}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatersW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001KLW22, author = {Rachit Garg and Dakshita Khurana and George Lu and Brent Waters}, title = {On Non-uniform Security for Black-box Non-Interactive {CCA} Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1032}, year = {2022}, url = {https://eprint.iacr.org/2022/1032}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001KLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatersW022, author = {Brent Waters and Hoeteck Wee and David J. Wu}, title = {Multi-Authority {ABE} from Lattices without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1194}, year = {2022}, url = {https://eprint.iacr.org/2022/1194}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatersW022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuW22, author = {George Lu and Brent Waters}, title = {How to Sample a Discrete Gaussian (and more) from a Random Oracle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1227}, year = {2022}, url = {https://eprint.iacr.org/2022/1227}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaKW22, author = {Pratish Datta and Ilan Komargodski and Brent Waters}, title = {Fully Adaptive Decentralized Multi-Authority {ABE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1311}, year = {2022}, url = {https://eprint.iacr.org/2022/1311}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaKW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppulaWZ22, author = {Venkata Koppula and Brent Waters and Mark Zhandry}, title = {Adaptive Multiparty {NIKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1324}, year = {2022}, url = {https://eprint.iacr.org/2022/1324}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppulaWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerLWW22, author = {Susan Hohenberger and George Lu and Brent Waters and David J. Wu}, title = {Registered Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1500}, year = {2022}, url = {https://eprint.iacr.org/2022/1500}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerLWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GhosalSW22, author = {Riddhi Ghosal and Amit Sahai and Brent Waters}, title = {Non-Interactive Publicly-Verifiable Delegation of Committed Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1508}, year = {2022}, url = {https://eprint.iacr.org/2022/1508}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GhosalSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargSWW22, author = {Rachit Garg and Kristin Sheridan and Brent Waters and David J. Wu}, title = {Fully Succinct Batch Arguments for {NP} from Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1760}, year = {2022}, url = {https://eprint.iacr.org/2022/1760}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GargSWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/SahaiW21, author = {Amit Sahai and Brent Waters}, title = {How to Use Indistinguishability Obfuscation: Deniable Encryption, and More}, journal = {{SIAM} J. Comput.}, volume = {50}, number = {3}, pages = {857--908}, year = {2021}, url = {https://doi.org/10.1137/15M1030108}, doi = {10.1137/15M1030108}, timestamp = {Wed, 14 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/SahaiW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GoyalKWW21, author = {Rishab Goyal and Sam Kim and Brent Waters and David J. Wu}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13092}, pages = {250--280}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92078-4\_9}, doi = {10.1007/978-3-030-92078-4\_9}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GoyalKWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GoyalLW21, author = {Rishab Goyal and Jiahui Liu and Brent Waters}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, pages = {311--341}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5\_11}, doi = {10.1007/978-3-030-92068-5\_11}, timestamp = {Fri, 03 Dec 2021 17:36:41 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GoyalLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GoyalSW21, author = {Rishab Goyal and Ridwan Syed and Brent Waters}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Bounded Collusion {ABE} for TMs from {IBE}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, pages = {371--402}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5\_13}, doi = {10.1007/978-3-030-92068-5\_13}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GoyalSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/QuachWW21, author = {Willy Quach and Brent Waters and Daniel Wichs}, editor = {Tal Malkin and Chris Peikert}, title = {Targeted Lossy Functions and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {424--453}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_15}, doi = {10.1007/978-3-030-84259-8\_15}, timestamp = {Mon, 16 Aug 2021 09:08:12 +0200}, biburl = {https://dblp.org/rec/conf/crypto/QuachWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargKLW21, author = {Rachit Garg and Dakshita Khurana and George Lu and Brent Waters}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Black-Box Non-interactive Non-malleable Commitments}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {159--185}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_6}, doi = {10.1007/978-3-030-77883-5\_6}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargKLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DattaKW21, author = {Pratish Datta and Ilan Komargodski and Brent Waters}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Decentralized Multi-authority {ABE} for DNFs from {LWE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {177--209}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_7}, doi = {10.1007/978-3-030-77870-5\_7}, timestamp = {Wed, 16 Jun 2021 11:49:32 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DattaKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KhuranaW21, author = {Dakshita Khurana and Brent Waters}, editor = {Juan A. Garay}, title = {On the {CCA} Compatibility of Public-Key Infrastructure}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {235--260}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_9}, doi = {10.1007/978-3-030-75248-4\_9}, timestamp = {Fri, 07 May 2021 15:40:46 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KhuranaW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2021-1, editor = {Kobbi Nissim and Brent Waters}, title = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13042}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90459-3}, doi = {10.1007/978-3-030-90459-3}, isbn = {978-3-030-90458-6}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/2021-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2021-2, editor = {Kobbi Nissim and Brent Waters}, title = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13043}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90453-1}, doi = {10.1007/978-3-030-90453-1}, isbn = {978-3-030-90452-4}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/2021-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tcc/2021-3, editor = {Kobbi Nissim and Brent Waters}, title = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13044}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90456-2}, doi = {10.1007/978-3-030-90456-2}, isbn = {978-3-030-90455-5}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/2021-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaW21, author = {Dakshita Khurana and Brent Waters}, title = {On the {CCA} Compatibility of Public-Key Infrastructure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {271}, year = {2021}, url = {https://eprint.iacr.org/2021/271}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalLW21, author = {Rishab Goyal and Jiahui Liu and Brent Waters}, title = {Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2021}, url = {https://eprint.iacr.org/2021/343}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalSW21, author = {Rishab Goyal and Ridwan Syed and Brent Waters}, title = {Bounded Collusion {ABE} for TMs from {IBE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {709}, year = {2021}, url = {https://eprint.iacr.org/2021/709}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalSW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGLW21, author = {Rachit Garg and Rishab Goyal and George Lu and Brent Waters}, title = {Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {847}, year = {2021}, url = {https://eprint.iacr.org/2021/847}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GargGLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/QuachWW21, author = {Willy Quach and Brent Waters and Daniel Wichs}, title = {Targeted Lossy Functions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {895}, year = {2021}, url = {https://eprint.iacr.org/2021/895}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/QuachWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaKW21, author = {Pratish Datta and Ilan Komargodski and Brent Waters}, title = {Decentralized Multi-Authority {ABE} for NC{\^{}}1 from Computational-BDH}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1325}, year = {2021}, url = {https://eprint.iacr.org/2021/1325}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DattaKW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/GoyalKW20, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Collusion Resistant Traitor Tracing from Learning with Errors}, journal = {{SIAM} J. Comput.}, volume = {49}, number = {5}, year = {2020}, url = {https://doi.org/10.1137/18M1197825}, doi = {10.1137/18M1197825}, timestamp = {Thu, 26 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/siamcomp/GoyalKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HohenbergerW20, author = {Susan Hohenberger and Brent Waters}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {New Methods and Abstractions for RSA-Based Forward Secure Signatures}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12146}, pages = {292--312}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57808-4\_15}, doi = {10.1007/978-3-030-57808-4\_15}, timestamp = {Thu, 27 Aug 2020 11:49:09 +0200}, biburl = {https://dblp.org/rec/conf/acns/HohenbergerW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HohenbergerVW20, author = {Susan Hohenberger and Satyanarayana Vusirikala and Brent Waters}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {{PPE} Circuits: Formal Definition to Software Automation}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {391--408}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417230}, doi = {10.1145/3372297.3417230}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HohenbergerVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalVW20, author = {Rishab Goyal and Satyanarayana Vusirikala and Brent Waters}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {New Constructions of Hinting PRGs, OWFs with Encryption, and More}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {527--558}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_18}, doi = {10.1007/978-3-030-56784-2\_18}, timestamp = {Wed, 12 Aug 2020 14:16:56 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HohenbergerKW20, author = {Susan Hohenberger and Venkata Koppula and Brent Waters}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Chosen Ciphertext Security from Injective Trapdoor Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {836--866}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_28}, doi = {10.1007/978-3-030-56784-2\_28}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HohenbergerKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalKVW20, author = {Rishab Goyal and Venkata Koppula and Satyanarayana Vusirikala and Brent Waters}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {On Perfect Correctness in (Lockable) Obfuscation}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {229--259}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_9}, doi = {10.1007/978-3-030-64375-1\_9}, timestamp = {Tue, 15 Dec 2020 11:52:09 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GoyalKVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargLW20, author = {Rachit Garg and George Lu and Brent Waters}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {New Techniques in Replica Encodings with Client Setup}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12552}, pages = {550--583}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64381-2\_20}, doi = {10.1007/978-3-030-64381-2\_20}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GargLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKWW20, author = {Rishab Goyal and Sam Kim and Brent Waters and David J. Wu}, title = {Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2020}, url = {https://eprint.iacr.org/2020/316}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargLW20, author = {Rachit Garg and George Lu and Brent Waters}, title = {New Techniques in Replica Encodings with Client Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2020}, url = {https://eprint.iacr.org/2020/617}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GargLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerKW20, author = {Susan Hohenberger and Venkata Koppula and Brent Waters}, title = {Chosen Ciphertext Security from Injective Trapdoor Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {759}, year = {2020}, url = {https://eprint.iacr.org/2020/759}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerW20, author = {Susan Hohenberger and Brent Waters}, title = {New Methods and Abstractions for RSA-Based Forward Secure Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {874}, year = {2020}, url = {https://eprint.iacr.org/2020/874}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargKLW20, author = {Rachit Garg and Dakshita Khurana and George Lu and Brent Waters}, title = {Black-Box Non-Interactive Non-Malleable Commitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1197}, year = {2020}, url = {https://eprint.iacr.org/2020/1197}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GargKLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaKW20, author = {Pratish Datta and Ilan Komargodski and Brent Waters}, title = {Decentralized Multi-Authority {ABE} for DNFs from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1386}, year = {2020}, url = {https://eprint.iacr.org/2020/1386}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DattaKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BadrinarayananF19, author = {Saikrishna Badrinarayanan and Rex Fernando and Venkata Koppula and Amit Sahai and Brent Waters}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Output Compression, MPC, and iO for Turing Machines}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11921}, pages = {342--370}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34578-5\_13}, doi = {10.1007/978-3-030-34578-5\_13}, timestamp = {Tue, 26 Nov 2019 14:11:51 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/BadrinarayananF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalKMWW19, author = {Rishab Goyal and Sam Kim and Nathan Manohar and Brent Waters and David J. Wu}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Watermarking Public-Key Cryptographic Primitives}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {367--398}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_12}, doi = {10.1007/978-3-030-26954-8\_12}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalKMWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KoppulaW19, author = {Venkata Koppula and Brent Waters}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {671--700}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_23}, doi = {10.1007/978-3-030-26951-7\_23}, timestamp = {Fri, 09 Aug 2019 14:22:41 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KoppulaW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GongWW19, author = {Junqing Gong and Brent Waters and Hoeteck Wee}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {{ABE} for {DFA} from k-Lin}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {732--764}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_25}, doi = {10.1007/978-3-030-26951-7\_25}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GongWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalQWW19, author = {Rishab Goyal and Willy Quach and Brent Waters and Daniel Wichs}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Broadcast and Trace with N{\^{}}{\(\epsilon\)} Ciphertext Size from Standard Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {826--855}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_27}, doi = {10.1007/978-3-030-26954-8\_27}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalQWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HofheinzKKW19, author = {Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters}, editor = {Ian Goldberg and Tyler Moore}, title = {Adaptively Secure Constrained Pseudorandom Functions}, booktitle = {Financial Cryptography and Data Security - 23rd International Conference, {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11598}, pages = {357--376}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-32101-7\_22}, doi = {10.1007/978-3-030-32101-7\_22}, timestamp = {Wed, 12 Aug 2020 17:59:02 +0200}, biburl = {https://dblp.org/rec/conf/fc/HofheinzKKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GoyalVW19, author = {Rishab Goyal and Satyanarayana Vusirikala and Brent Waters}, editor = {Dongdai Lin and Kazue Sako}, title = {Collusion Resistant Broadcast and Trace from Positional Witness Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {3--33}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_1}, doi = {10.1007/978-3-030-17259-6\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GoyalVW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalKW19, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, editor = {Dennis Hofheinz and Alon Rosen}, title = {New Approaches to Traitor Tracing with Embedded Identities}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11892}, pages = {149--179}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36033-7\_6}, doi = {10.1007/978-3-030-36033-7\_6}, timestamp = {Mon, 25 Nov 2019 13:59:31 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GoyalKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalVW19, author = {Rishab Goyal and Satyanarayana Vusirikala and Brent Waters}, title = {Collusion Resistant Broadcast and Trace from Positional Witness Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {31}, year = {2019}, url = {https://eprint.iacr.org/2019/031}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalVW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKMWW19, author = {Rishab Goyal and Sam Kim and Nathan Manohar and Brent Waters and David J. Wu}, title = {Watermarking Public-Key Cryptographic Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {628}, year = {2019}, url = {https://eprint.iacr.org/2019/628}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKMWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GongWW19, author = {Junqing Gong and Brent Waters and Hoeteck Wee}, title = {{ABE} for {DFA} from k-Lin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {630}, year = {2019}, url = {https://eprint.iacr.org/2019/630}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GongWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalQWW19, author = {Rishab Goyal and Willy Quach and Brent Waters and Daniel Wichs}, title = {Broadcast and Trace with N{\^{}}epsilon Ciphertext Size from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {636}, year = {2019}, url = {https://eprint.iacr.org/2019/636}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalQWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalVW19a, author = {Rishab Goyal and Satyanarayana Vusirikala and Brent Waters}, title = {New Constructions of Hinting PRGs, OWFs with Encryption, and more}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {962}, year = {2019}, url = {https://eprint.iacr.org/2019/962}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalVW19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKW19, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {New Approaches to Traitor Tracing with Embedded Identities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {980}, year = {2019}, url = {https://eprint.iacr.org/2019/980}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKVW19, author = {Rishab Goyal and Venkata Koppula and Satyanarayana Vusirikala and Brent Waters}, title = {On Perfect Correctness in (Lockable) Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1010}, year = {2019}, url = {https://eprint.iacr.org/2019/1010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKVW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalKRW18, author = {Rishab Goyal and Venkata Koppula and Andrew Russell and Brent Waters}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Risky Traitor Tracing and New Differential Privacy Negative Results}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {467--497}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_16}, doi = {10.1007/978-3-319-96884-1\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalKRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerW18, author = {Susan Hohenberger and Brent Waters}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Synchronized Aggregate Signatures from the {RSA} Assumption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {197--229}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_7}, doi = {10.1007/978-3-319-78375-8\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GoyalKW18, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, editor = {Ilias Diakonikolas and David Kempe and Monika Henzinger}, title = {Collusion resistant traitor tracing from learning with errors}, booktitle = {Proceedings of the 50th Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2018, Los Angeles, CA, USA, June 25-29, 2018}, pages = {660--670}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3188745.3188844}, doi = {10.1145/3188745.3188844}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GoyalKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChenVWWW18, author = {Yilei Chen and Vinod Vaikuntanathan and Brent Waters and Hoeteck Wee and Daniel Wichs}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Traitor-Tracing from {LWE} Made Simple and Attribute-Based}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {341--369}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03810-6\_13}, doi = {10.1007/978-3-030-03810-6\_13}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChenVWWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Upgrading to Functional Encryption}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {629--658}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_23}, doi = {10.1007/978-3-030-03807-6\_23}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalKW18, author = {Shashank Agrawal and Venkata Koppula and Brent Waters}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Impossibility of Simulation Secure Functional Encryption Even with Random Oracles}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {659--688}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_24}, doi = {10.1007/978-3-030-03807-6\_24}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerW18, author = {Susan Hohenberger and Brent Waters}, title = {Synchronized Aggregate Signatures from the {RSA} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2018}, url = {http://eprint.iacr.org/2018/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananK18, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters}, title = {Upgrading to Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2018}, url = {https://eprint.iacr.org/2018/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKW18, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Collusion Resistant Traitor Tracing from Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {346}, year = {2018}, url = {https://eprint.iacr.org/2018/346}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppulaW18, author = {Venkata Koppula and Brent Waters}, title = {Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {847}, year = {2018}, url = {https://eprint.iacr.org/2018/847}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppulaW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananF18, author = {Saikrishna Badrinarayanan and Rex Fernando and Venkata Koppula and Amit Sahai and Brent Waters}, title = {Output Compression, MPC, and iO for Turing Machines}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {866}, year = {2018}, url = {https://eprint.iacr.org/2018/866}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenVWWW18, author = {Yilei Chen and Vinod Vaikuntanathan and Brent Waters and Hoeteck Wee and Daniel Wichs}, title = {Traitor-Tracing from {LWE} Made Simple and Attribute-Based}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {897}, year = {2018}, url = {https://eprint.iacr.org/2018/897}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenVWWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FreitagGHKLOTW17, author = {Cody Freitag and Rishab Goyal and Susan Hohenberger and Venkata Koppula and Eysa Lee and Tatsuaki Okamoto and Jordan Tran and Brent Waters}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Signature Schemes with Randomized Verification}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {373--389}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_19}, doi = {10.1007/978-3-319-61204-1\_19}, timestamp = {Tue, 07 May 2024 20:12:06 +0200}, biburl = {https://dblp.org/rec/conf/acns/FreitagGHKLOTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GoyalKW17, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {528--557}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_18}, doi = {10.1007/978-3-319-56614-6\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GoyalKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GoyalKW17, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, editor = {Chris Umans}, title = {Lockable Obfuscation}, booktitle = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2017, Berkeley, CA, USA, October 15-17, 2017}, pages = {612--621}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/FOCS.2017.62}, doi = {10.1109/FOCS.2017.62}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GoyalKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GoyalKW17, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, editor = {Serge Fehr}, title = {Separating {IND-CPA} and Circular Security for Unbounded Length Key Cycles}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {232--246}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_10}, doi = {10.1007/978-3-662-54365-8\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GoyalKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KoppulaPW17, author = {Venkata Koppula and Andrew Poelstra and Brent Waters}, editor = {Serge Fehr}, title = {Universal Samplers with Fast Verification}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {525--554}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_18}, doi = {10.1007/978-3-662-54388-7\_18}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KoppulaPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalHKW17, author = {Rishab Goyal and Susan Hohenberger and Venkata Koppula and Brent Waters}, editor = {Yael Kalai and Leonid Reyzin}, title = {A Generic Approach to Constructing and Proving Verifiable Random Functions}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, pages = {537--566}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3\_18}, doi = {10.1007/978-3-319-70503-3\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoyalHKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppulaPW17, author = {Venkata Koppula and Andrew Poelstra and Brent Waters}, title = {Universal Samplers with Fast Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {12}, year = {2017}, url = {http://eprint.iacr.org/2017/012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppulaPW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalHKW17, author = {Rishab Goyal and Susan Hohenberger and Venkata Koppula and Brent Waters}, title = {A Generic Approach to Constructing and Proving Verifiable Random Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2017}, url = {http://eprint.iacr.org/2017/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalHKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKW17, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2017}, url = {http://eprint.iacr.org/2017/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKW17a, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Separating {IND-CPA} and Circular Security for Unbounded Length Key Cycles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2017}, url = {http://eprint.iacr.org/2017/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKW17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKW17b, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Lockable Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {274}, year = {2017}, url = {http://eprint.iacr.org/2017/274}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKW17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKRW17, author = {Rishab Goyal and Venkata Koppula and Andrew Russell and Brent Waters}, title = {Risky Traitor Tracing and New Differential Privacy Negative Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1117}, year = {2017}, url = {http://eprint.iacr.org/2017/1117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKRW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GargGH0SW16, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Hiding secrets in software: a cryptographic approach to program obfuscation}, journal = {Commun. {ACM}}, volume = {59}, number = {5}, pages = {113--120}, year = {2016}, url = {https://doi.org/10.1145/2902313}, doi = {10.1145/2902313}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/GargGH0SW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/GargGH0SW16, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits}, journal = {{SIAM} J. Comput.}, volume = {45}, number = {3}, pages = {882--929}, year = {2016}, url = {https://doi.org/10.1137/14095772X}, doi = {10.1137/14095772X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/GargGH0SW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KoppulaPRW16, author = {Venkata Koppula and Omkant Pandey and Yannis Rouselakis and Brent Waters}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Deterministic Public-Key Encryption Under Continual Leakage}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {304--323}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_17}, doi = {10.1007/978-3-319-39555-5\_17}, timestamp = {Fri, 07 Aug 2020 17:57:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/KoppulaPRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HofheinzJKSWZ16, author = {Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {How to Generate and Use Universal Samplers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {715--744}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_24}, doi = {10.1007/978-3-662-53890-6\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HofheinzJKSWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KoppulaW16, author = {Venkata Koppula and Brent Waters}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Circular Security Separations for Arbitrary Length Cycles from {LWE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {681--700}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_24}, doi = {10.1007/978-3-662-53008-5\_24}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KoppulaW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DeshpandeKW16, author = {Apoorvaa Deshpande and Venkata Koppula and Brent Waters}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Constrained Pseudorandom Functions for Unconstrained Inputs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {124--153}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_5}, doi = {10.1007/978-3-662-49896-5\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DeshpandeKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareSW16, author = {Mihir Bellare and Igors Stepanovs and Brent Waters}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {New Negative Results on Differing-Inputs Obfuscation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {792--821}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_28}, doi = {10.1007/978-3-662-49896-5\_28}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BitanskyG0PVW16, author = {Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters}, editor = {Madhu Sudan}, title = {Time-Lock Puzzles from Randomized Encodings}, booktitle = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical Computer Science, Cambridge, MA, USA, January 14-16, 2016}, pages = {345--356}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2840728.2840745}, doi = {10.1145/2840728.2840745}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/BitanskyG0PVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalKW16, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, editor = {Martin Hirt and Adam D. Smith}, title = {Semi-adaptive Security and Bundling Functionalities Made Generic and Easy}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {361--388}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_14}, doi = {10.1007/978-3-662-53644-5\_14}, timestamp = {Tue, 20 Aug 2024 08:48:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoyalKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppulaW16, author = {Venkata Koppula and Brent Waters}, title = {Circular Security Counterexamples for Arbitrary Length Cycles from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2016}, url = {http://eprint.iacr.org/2016/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppulaW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareSW16, author = {Mihir Bellare and Igors Stepanovs and Brent Waters}, title = {New Negative Results on Differing-Inputs Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2016}, url = {http://eprint.iacr.org/2016/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DeshpandeKW16, author = {Apoorvaa Deshpande and Venkata Koppula and Brent Waters}, title = {Constrained Pseudorandom Functions for Unconstrained Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2016}, url = {http://eprint.iacr.org/2016/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DeshpandeKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalKW16, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2016}, url = {http://eprint.iacr.org/2016/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalKW16, author = {Shashank Agrawal and Venkata Koppula and Brent Waters}, title = {Impossibility of Simulation Secure Functional Encryption Even with Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {959}, year = {2016}, url = {http://eprint.iacr.org/2016/959}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AhnBCHSW15, author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters}, title = {Computing on Authenticated Data}, journal = {J. Cryptol.}, volume = {28}, number = {2}, pages = {351--395}, year = {2015}, url = {https://doi.org/10.1007/s00145-014-9182-0}, doi = {10.1007/S00145-014-9182-0}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AhnBCHSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/ApplebaumIKW15, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters}, title = {Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys}, journal = {{SIAM} J. Comput.}, volume = {44}, number = {2}, pages = {433--466}, year = {2015}, url = {https://doi.org/10.1137/130929643}, doi = {10.1137/130929643}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/ApplebaumIKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HohenbergerKW15, author = {Susan Hohenberger and Venkata Koppula and Brent Waters}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {79--102}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_4}, doi = {10.1007/978-3-662-48797-6\_4}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HohenbergerKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OkamotoPWW15, author = {Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {121--145}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_6}, doi = {10.1007/978-3-662-48797-6\_6}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/OkamotoPWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BishopHW15, author = {Allison Bishop and Susan Hohenberger and Brent Waters}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {New Circular Security Counterexamples from Decision Linear and Learning with Errors}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {776--800}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_32}, doi = {10.1007/978-3-662-48800-3\_32}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BishopHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Waters15, author = {Brent Waters}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {A Punctured Programming Approach to Adaptively Secure Functional Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {678--697}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_33}, doi = {10.1007/978-3-662-48000-7\_33}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Waters15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerKW15, author = {Susan Hohenberger and Venkata Koppula and Brent Waters}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Universal Signature Aggregators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {3--34}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_1}, doi = {10.1007/978-3-662-46803-6\_1}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerKW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/RouselakisW15, author = {Yannis Rouselakis and Brent Waters}, editor = {Rainer B{\"{o}}hme and Tatsuaki Okamoto}, title = {Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption}, booktitle = {Financial Cryptography and Data Security - 19th International Conference, {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8975}, pages = {315--332}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47854-7\_19}, doi = {10.1007/978-3-662-47854-7\_19}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/RouselakisW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GentryLSW15, author = {Craig Gentry and Allison Bishop Lewko and Amit Sahai and Brent Waters}, editor = {Venkatesan Guruswami}, title = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption}, booktitle = {{IEEE} 56th Annual Symposium on Foundations of Computer Science, {FOCS} 2015, Berkeley, CA, USA, 17-20 October, 2015}, pages = {151--170}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FOCS.2015.19}, doi = {10.1109/FOCS.2015.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GentryLSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/KoppulaLW15, author = {Venkata Koppula and Allison Bishop Lewko and Brent Waters}, editor = {Rocco A. Servedio and Ronitt Rubinfeld}, title = {Indistinguishability Obfuscation for Turing Machines with Unbounded Memory}, booktitle = {Proceedings of the Forty-Seventh Annual {ACM} on Symposium on Theory of Computing, {STOC} 2015, Portland, OR, USA, June 14-17, 2015}, pages = {419--428}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2746539.2746614}, doi = {10.1145/2746539.2746614}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/KoppulaLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KoppulaRW15, author = {Venkata Koppula and Kim Ramchen and Brent Waters}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Separations in Circular Security for Arbitrary Length Key Cycles}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {378--400}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_15}, doi = {10.1007/978-3-662-46497-7\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KoppulaRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RouselakisW15, author = {Yannis Rouselakis and Brent Waters}, title = {Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2015}, url = {http://eprint.iacr.org/2015/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RouselakisW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyG0PVW15, author = {Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters}, title = {Time-Lock Puzzles from Randomized Encodings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2015}, url = {http://eprint.iacr.org/2015/514}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyG0PVW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BishopHW15, author = {Allison Bishop and Susan Hohenberger and Brent Waters}, title = {New Circular Security Counterexamples from Decision Linear and Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {715}, year = {2015}, url = {http://eprint.iacr.org/2015/715}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BishopHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkamotoPWW15, author = {Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs}, title = {New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {869}, year = {2015}, url = {http://eprint.iacr.org/2015/869}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkamotoPWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/LeeDKWW14, author = {Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel}, title = {Anon-Pass: Practical Anonymous Subscriptions}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {3}, pages = {20--27}, year = {2014}, url = {https://doi.org/10.1109/MSP.2013.158}, doi = {10.1109/MSP.2013.158}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/LeeDKWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RamchenW14, author = {Kim Ramchen and Brent Waters}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Fully Secure and Fast Signing from Obfuscation}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {659--673}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660306}, doi = {10.1145/2660267.2660306}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RamchenW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehWZ14, author = {Dan Boneh and Brent Waters and Mark Zhandry}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Low Overhead Broadcast Encryption from Multilinear Maps}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {206--223}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_12}, doi = {10.1007/978-3-662-44371-2\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentryLW14, author = {Craig Gentry and Allison B. Lewko and Brent Waters}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Witness Encryption from Instance Independent Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {426--443}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_24}, doi = {10.1007/978-3-662-44371-2\_24}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentryLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/CalderonMSW14, author = {Theresa Calderon and Sarah Meiklejohn and Hovav Shacham and Brent Waters}, editor = {Josh Benaloh}, title = {Rethinking Verifiably Encrypted Signatures: {A} Gap in Functionality and Potential Solutions}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {349--366}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_18}, doi = {10.1007/978-3-319-04852-9\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/CalderonMSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoW14, author = {Allison B. Lewko and Brent Waters}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Why Proving {HIBE} Systems Secure Is Difficult}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {58--76}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_4}, doi = {10.1007/978-3-642-55220-5\_4}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerSW14, author = {Susan Hohenberger and Amit Sahai and Brent Waters}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {201--220}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_12}, doi = {10.1007/978-3-642-55220-5\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HohenbergerW14, author = {Susan Hohenberger and Brent Waters}, editor = {Hugo Krawczyk}, title = {Online/Offline Attribute-Based Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {293--310}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_17}, doi = {10.1007/978-3-642-54631-0\_17}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HohenbergerW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PandeyRW14, author = {Omkant Pandey and Kim Ramchen and Brent Waters}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Relaxed Two-to-One Recoding Schemes}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {57--76}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_4}, doi = {10.1007/978-3-319-10879-7\_4}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/PandeyRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/SahaiW14, author = {Amit Sahai and Brent Waters}, editor = {David B. Shmoys}, title = {How to use indistinguishability obfuscation: deniable encryption, and more}, booktitle = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA, May 31 - June 03, 2014}, pages = {475--484}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2591796.2591825}, doi = {10.1145/2591796.2591825}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/SahaiW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerW14, author = {Susan Hohenberger and Brent Waters}, title = {Online/Offline Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {21}, year = {2014}, url = {http://eprint.iacr.org/2014/021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehWZ14, author = {Dan Boneh and Brent Waters and Mark Zhandry}, title = {Low Overhead Broadcast Encryption from Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2014}, url = {http://eprint.iacr.org/2014/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryLW14, author = {Craig Gentry and Allison Bishop Lewko and Brent Waters}, title = {Witness Encryption from Instance Independent Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {273}, year = {2014}, url = {http://eprint.iacr.org/2014/273}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryLSW14, author = {Craig Gentry and Allison B. Lewko and Amit Sahai and Brent Waters}, title = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2014}, url = {http://eprint.iacr.org/2014/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryLSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PandeyRW14, author = {Omkant Pandey and Kim Ramchen and Brent Waters}, title = {Relaxed Two-to-one Recoding Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2014}, url = {http://eprint.iacr.org/2014/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PandeyRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KhuranaSW14, author = {Dakshita Khurana and Amit Sahai and Brent Waters}, title = {How to Generate and use Universal Parameters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2014}, url = {http://eprint.iacr.org/2014/507}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KhuranaSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerKW14, author = {Susan Hohenberger and Venkata Koppula and Brent Waters}, title = {Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {521}, year = {2014}, url = {http://eprint.iacr.org/2014/521}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RamchenW14, author = {Kim Ramchen and Brent Waters}, title = {Fully Secure and Fast Signing from Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {523}, year = {2014}, url = {http://eprint.iacr.org/2014/523}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RamchenW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Waters14, author = {Brent Waters}, title = {A Punctured Programming Approach to Adaptively Secure Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2014}, url = {http://eprint.iacr.org/2014/588}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Waters14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzKKW14, author = {Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters}, title = {Adaptively Secure Constrained Pseudorandom Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {720}, year = {2014}, url = {http://eprint.iacr.org/2014/720}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzKKW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerKW14a, author = {Susan Hohenberger and Venkata Koppula and Brent Waters}, title = {Universal Signature Aggregators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {745}, year = {2014}, url = {http://eprint.iacr.org/2014/745}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerKW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppulaPRW14, author = {Venkata Koppula and Omkant Pandey and Yannis Rouselakis and Brent Waters}, title = {Deterministic Public-Key Encryption under Continual Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {780}, year = {2014}, url = {http://eprint.iacr.org/2014/780}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppulaPRW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppulaLW14, author = {Venkata Koppula and Allison Bishop Lewko and Brent Waters}, title = {Indistinguishability Obfuscation for Turing Machines with Unbounded Memory}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {925}, year = {2014}, url = {http://eprint.iacr.org/2014/925}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppulaLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KatzSW13, author = {Jonathan Katz and Amit Sahai and Brent Waters}, title = {Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products}, journal = {J. Cryptol.}, volume = {26}, number = {2}, pages = {191--224}, year = {2013}, url = {https://doi.org/10.1007/s00145-012-9119-4}, doi = {10.1007/S00145-012-9119-4}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KatzSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/LuOSSW13, author = {Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav Shacham and Brent Waters}, title = {Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles}, journal = {J. Cryptol.}, volume = {26}, number = {2}, pages = {340--373}, year = {2013}, url = {https://doi.org/10.1007/s00145-012-9126-5}, doi = {10.1007/S00145-012-9126-5}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/LuOSSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ShachamW13, author = {Hovav Shacham and Brent Waters}, title = {Compact Proofs of Retrievability}, journal = {J. Cryptol.}, volume = {26}, number = {3}, pages = {442--483}, year = {2013}, url = {https://doi.org/10.1007/s00145-012-9129-2}, doi = {10.1007/S00145-012-9129-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ShachamW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BonehW13, author = {Dan Boneh and Brent Waters}, editor = {Kazue Sako and Palash Sarkar}, title = {Constrained Pseudorandom Functions and Their Applications}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {280--300}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_15}, doi = {10.1007/978-3-642-42045-0\_15}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BonehW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RouselakisW13, author = {Yannis Rouselakis and Brent Waters}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Practical constructions and new proof methods for large universe attribute-based encryption}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {463--474}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516672}, doi = {10.1145/2508859.2516672}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RouselakisW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GentrySW13, author = {Craig Gentry and Amit Sahai and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {75--92}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_5}, doi = {10.1007/978-3-642-40041-4\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GentrySW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ApplebaumIKW13, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {166--184}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_10}, doi = {10.1007/978-3-642-40084-1\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ApplebaumIKW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargGHSW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {479--499}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_27}, doi = {10.1007/978-3-642-40084-1\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargGHSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HohenbergerSW13, author = {Susan Hohenberger and Amit Sahai and Brent Waters}, editor = {Ran Canetti and Juan A. Garay}, title = {Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {494--512}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_27}, doi = {10.1007/978-3-642-40041-4\_27}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HohenbergerSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BensonSW13, author = {Karyn Benson and Hovav Shacham and Brent Waters}, editor = {Ed Dawson}, title = {The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {310--325}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_20}, doi = {10.1007/978-3-642-36095-4\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BensonSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/GargGH0SW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits}, booktitle = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2013, 26-29 October, 2013, Berkeley, CA, {USA}}, pages = {40--49}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/FOCS.2013.13}, doi = {10.1109/FOCS.2013.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/GargGH0SW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Waters13, author = {Brent Waters}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Functional Encryption: Origins and Recent Developments}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {51--54}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_4}, doi = {10.1007/978-3-642-36362-7\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Waters13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HohenbergerW13, author = {Susan Hohenberger and Brent Waters}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Attribute-Based Encryption with Fast Decryption}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {162--179}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_11}, doi = {10.1007/978-3-642-36362-7\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HohenbergerW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LeeDWWK13, author = {Michael Z. Lee and Alan M. Dunn and Brent Waters and Emmett Witchel and Jonathan Katz}, title = {Anon-Pass: Practical Anonymous Subscriptions}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {319--333}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.29}, doi = {10.1109/SP.2013.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/LeeDWWK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GargGSW13, author = {Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters}, editor = {Dan Boneh and Tim Roughgarden and Joan Feigenbaum}, title = {Witness encryption and its applications}, booktitle = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013}, pages = {467--476}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488608.2488667}, doi = {10.1145/2488608.2488667}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/GargGSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wacv/LuongGWG13, author = {Andy Luong and Michael Gerbush and Brent Waters and Kristen Grauman}, title = {Reconstructing a fragmented face from a cryptographic identification protocol}, booktitle = {2013 {IEEE} Workshop on Applications of Computer Vision, {WACV} 2013, Clearwater Beach, FL, USA, January 15-17, 2013}, pages = {238--245}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/WACV.2013.6475024}, doi = {10.1109/WACV.2013.6475024}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wacv/LuongGWG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW13, author = {Allison B. Lewko and Brent Waters}, title = {Why Proving {HIBE} Systems Secure is Difficult}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2013}, url = {http://eprint.iacr.org/2013/068}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGHSW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2013}, url = {http://eprint.iacr.org/2013/128}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGHSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGSW13, author = {Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters}, title = {Witness Encryption and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {258}, year = {2013}, url = {http://eprint.iacr.org/2013/258}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerW13, author = {Susan Hohenberger and Brent Waters}, title = {Attribute-Based Encryption with Fast Decryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2013}, url = {http://eprint.iacr.org/2013/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeDKWW13, author = {Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel}, title = {Anon-Pass: Practical Anonymous Subscriptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2013}, url = {http://eprint.iacr.org/2013/317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeDKWW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentrySW13, author = {Craig Gentry and Amit Sahai and Brent Waters}, title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2013}, url = {http://eprint.iacr.org/2013/340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentrySW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehW13, author = {Dan Boneh and Brent Waters}, title = {Constrained Pseudorandom Functions and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2013}, url = {http://eprint.iacr.org/2013/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerSW13, author = {Susan Hohenberger and Amit Sahai and Brent Waters}, title = {Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2013}, url = {http://eprint.iacr.org/2013/434}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargGH0SW13, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2013}, url = {http://eprint.iacr.org/2013/451}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargGH0SW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiW13, author = {Amit Sahai and Brent Waters}, title = {How to Use Indistinguishability Obfuscation: Deniable Encryption, and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2013}, url = {http://eprint.iacr.org/2013/454}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerSW13a, author = {Susan Hohenberger and Amit Sahai and Brent Waters}, title = {Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2013}, url = {http://eprint.iacr.org/2013/509}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerSW13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KoppulaRW13, author = {Venkata Koppula and Kim Ramchen and Brent Waters}, title = {Separations in Circular Security for Arbitrary Length Key Cycles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {683}, year = {2013}, url = {http://eprint.iacr.org/2013/683}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KoppulaRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BonehSW12, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Functional encryption: a new vision for public-key cryptography}, journal = {Commun. {ACM}}, volume = {55}, number = {11}, pages = {56--64}, year = {2012}, url = {https://doi.org/10.1145/2366316.2366333}, doi = {10.1145/2366316.2366333}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BonehSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GerbushLOW12, author = {Michael Gerbush and Allison B. Lewko and Adam O'Neill and Brent Waters}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Dual Form Signatures: An Approach for Proving Security from Static Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {25--42}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_4}, doi = {10.1007/978-3-642-34961-4\_4}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GerbushLOW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LewkoW12, author = {Allison B. Lewko and Brent Waters}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {180--198}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_12}, doi = {10.1007/978-3-642-32009-5\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LewkoW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SahaiSW12, author = {Amit Sahai and Hakan Seyalioglu and Brent Waters}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {199--217}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_13}, doi = {10.1007/978-3-642-32009-5\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SahaiSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Waters12, author = {Brent Waters}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Functional Encryption for Regular Languages}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {218--235}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_14}, doi = {10.1007/978-3-642-32009-5\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Waters12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareKPW12, author = {Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters}, editor = {David Pointcheval and Thomas Johansson}, title = {Identity-Based (Lossy) Trapdoor Functions and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {228--245}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_15}, doi = {10.1007/978-3-642-29011-4\_15}, timestamp = {Sun, 12 Nov 2023 02:15:08 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareKPW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BellareDWY12, author = {Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek}, editor = {David Pointcheval and Thomas Johansson}, title = {Standard Security Does Not Imply Security against Selective-Opening}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {645--662}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_38}, doi = {10.1007/978-3-642-29011-4\_38}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BellareDWY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerLW12, author = {Susan Hohenberger and Allison B. Lewko and Brent Waters}, editor = {David Pointcheval and Thomas Johansson}, title = {Detecting Dangerous Queries: {A} New Approach for Chosen Ciphertext Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7237}, pages = {663--681}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29011-4\_39}, doi = {10.1007/978-3-642-29011-4\_39}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/BonehSW12, author = {Dan Boneh and Gil Segev and Brent Waters}, editor = {Shafi Goldwasser}, title = {Targeted malleability: homomorphic encryption for restricted computations}, booktitle = {Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA, January 8-10, 2012}, pages = {350--366}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2090236.2090264}, doi = {10.1145/2090236.2090264}, timestamp = {Sun, 16 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/BonehSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AhnBCHSW12, author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters}, editor = {Ronald Cramer}, title = {Computing on Authenticated Data}, booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC} 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7194}, pages = {1--20}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28914-9\_1}, doi = {10.1007/978-3-642-28914-9\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AhnBCHSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-5287, author = {Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, journal = {CoRR}, volume = {abs/1210.5287}, year = {2012}, url = {http://arxiv.org/abs/1210.5287}, eprinttype = {arXiv}, eprint = {1210.5287}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-5287.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerLW12, author = {Susan Hohenberger and Allison B. Lewko and Brent Waters}, title = {Detecting Dangerous Queries: {A} New Approach for Chosen Ciphertext Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2012}, url = {http://eprint.iacr.org/2012/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GerbushLOW12, author = {Michael Gerbush and Allison B. Lewko and Adam O'Neill and Brent Waters}, title = {Dual Form Signatures: An Approach for Proving Security from Static Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {261}, year = {2012}, url = {http://eprint.iacr.org/2012/261}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GerbushLOW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW12, author = {Allison B. Lewko and Brent Waters}, title = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {326}, year = {2012}, url = {http://eprint.iacr.org/2012/326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Waters12, author = {Brent Waters}, title = {Functional Encryption for Regular Languages}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2012}, url = {http://eprint.iacr.org/2012/384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Waters12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiSW12, author = {Amit Sahai and Hakan Seyalioglu and Brent Waters}, title = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2012}, url = {http://eprint.iacr.org/2012/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RouselakisW12, author = {Yannis Rouselakis and Brent Waters}, title = {New Constructions and Proof Methods for Large Universe Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {583}, year = {2012}, url = {http://eprint.iacr.org/2012/583}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RouselakisW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiW12, author = {Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {592}, year = {2012}, url = {http://eprint.iacr.org/2012/592}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BensonSW12, author = {Karyn Benson and Hovav Shacham and Brent Waters}, title = {The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {687}, year = {2012}, url = {http://eprint.iacr.org/2012/687}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BensonSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ApplebaumIKW12, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters}, title = {Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {693}, year = {2012}, url = {http://eprint.iacr.org/2012/693}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ApplebaumIKW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/PeikertW11, author = {Chris Peikert and Brent Waters}, title = {Lossy Trapdoor Functions and Their Applications}, journal = {{SIAM} J. Comput.}, volume = {40}, number = {6}, pages = {1803--1844}, year = {2011}, url = {https://doi.org/10.1137/080733954}, doi = {10.1137/080733954}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/PeikertW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ONeillPW11, author = {Adam O'Neill and Chris Peikert and Brent Waters}, editor = {Phillip Rogaway}, title = {Bi-Deniable Public-Key Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {525--542}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_30}, doi = {10.1007/978-3-642-22792-9\_30}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ONeillPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoW11, author = {Allison B. Lewko and Brent Waters}, editor = {Kenneth G. Paterson}, title = {Unbounded {HIBE} and Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {547--567}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_30}, doi = {10.1007/978-3-642-20465-4\_30}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoW11a, author = {Allison B. Lewko and Brent Waters}, editor = {Kenneth G. Paterson}, title = {Decentralizing Attribute-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {568--588}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_31}, doi = {10.1007/978-3-642-20465-4\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoW11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DodisLWW11, author = {Yevgeniy Dodis and Allison B. Lewko and Brent Waters and Daniel Wichs}, editor = {Rafail Ostrovsky}, title = {Storing Secrets on Continually Leaky Devices}, booktitle = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS} 2011, Palm Springs, CA, USA, October 22-25, 2011}, pages = {688--697}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FOCS.2011.35}, doi = {10.1109/FOCS.2011.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/DodisLWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Waters11, author = {Brent Waters}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {53--70}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_4}, doi = {10.1007/978-3-642-19379-8\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Waters11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/LewkoLW11, author = {Allison B. Lewko and Mark Lewko and Brent Waters}, editor = {Lance Fortnow and Salil P. Vadhan}, title = {How to leak on key updates}, booktitle = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC} 2011, San Jose, CA, USA, 6-8 June 2011}, pages = {725--734}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1993636.1993732}, doi = {10.1145/1993636.1993732}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/LewkoLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LewkoRW11, author = {Allison B. Lewko and Yannis Rouselakis and Brent Waters}, editor = {Yuval Ishai}, title = {Achieving Leakage Resilience through Dual System Encryption}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {70--88}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_6}, doi = {10.1007/978-3-642-19571-6\_6}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LewkoRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BellareWY11, author = {Mihir Bellare and Brent Waters and Scott Yilek}, editor = {Yuval Ishai}, title = {Identity-Based Encryption Secure against Selective Opening Attack}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {235--252}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_15}, doi = {10.1007/978-3-642-19571-6\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BellareWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BonehSW11, author = {Dan Boneh and Amit Sahai and Brent Waters}, editor = {Yuval Ishai}, title = {Functional Encryption: Definitions and Challenges}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {253--273}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_16}, doi = {10.1007/978-3-642-19571-6\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BonehSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DunnHWW11, author = {Alan M. Dunn and Owen S. Hofmann and Brent Waters and Emmett Witchel}, title = {Cloaking Malware with the Trusted Platform Module}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Dunn.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DunnHWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GreenHW11, author = {Matthew Green and Susan Hohenberger and Brent Waters}, title = {Outsourcing the Decryption of {ABE} Ciphertexts}, booktitle = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings}, publisher = {{USENIX} Association}, year = {2011}, url = {http://static.usenix.org/events/sec11/tech/full\_papers/Green.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/GreenHW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW11, author = {Allison B. Lewko and Brent Waters}, title = {Unbounded {HIBE} and Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {49}, year = {2011}, url = {http://eprint.iacr.org/2011/049}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AhnBCHSW11, author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and Abhi Shelat and Brent Waters}, title = {Computing on Authenticated Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2011}, url = {http://eprint.iacr.org/2011/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AhnBCHSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehSW11, author = {Dan Boneh and Gil Segev and Brent Waters}, title = {Targeted Malleability: Homomorphic Encryption for Restricted Computations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2011}, url = {http://eprint.iacr.org/2011/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ONeillPW11, author = {Adam O'Neill and Chris Peikert and Brent Waters}, title = {Bi-Deniable Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2011}, url = {http://eprint.iacr.org/2011/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ONeillPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisLWW11, author = {Yevgeniy Dodis and Allison B. Lewko and Brent Waters and Daniel Wichs}, title = {Storing Secrets on Continually Leaky Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2011}, url = {http://eprint.iacr.org/2011/369}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisLWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareKPW11, author = {Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters}, title = {Identity-Based (Lossy) Trapdoor Functions and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2011}, url = {http://eprint.iacr.org/2011/479}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareKPW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareDWY11, author = {Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek}, title = {Standard Security Does Not Imply Security Against Selective-Opening}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {581}, year = {2011}, url = {http://eprint.iacr.org/2011/581}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareDWY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/PirrettiTMW10, author = {Matthew Pirretti and Patrick Traynor and Patrick D. McDaniel and Brent Waters}, title = {Secure attribute-based systems}, journal = {J. Comput. Secur.}, volume = {18}, number = {5}, pages = {799--837}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0383}, doi = {10.3233/JCS-2009-0383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/PirrettiTMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BoyenW10, author = {Xavier Boyen and Brent Waters}, editor = {Jianying Zhou and Moti Yung}, title = {Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {35--52}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_3}, doi = {10.1007/978-3-642-13708-2\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BoyenW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GargKSW10, author = {Sanjam Garg and Abishek Kumarasubramanian and Amit Sahai and Brent Waters}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Building efficient fully collusion-resilient traitor tracing and revocation schemes}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {121--130}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866322}, doi = {10.1145/1866307.1866322}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GargKSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChowDRW10, author = {Sherman S. M. Chow and Yevgeniy Dodis and Yannis Rouselakis and Brent Waters}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Practical leakage-resilient identity-based encryption from simple assumptions}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {152--161}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866325}, doi = {10.1145/1866307.1866325}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChowDRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LewkoOSTW10, author = {Allison B. Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters}, editor = {Henri Gilbert}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {62--91}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_4}, doi = {10.1007/978-3-642-13190-5\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LewkoOSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerW10, author = {Susan Hohenberger and Brent Waters}, editor = {Henri Gilbert}, title = {Constructing Verifiable Random Functions with Large Input Spaces}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {656--672}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_33}, doi = {10.1007/978-3-642-13190-5\_33}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/LewkoW10, author = {Allison B. Lewko and Brent Waters}, title = {On the Insecurity of Parallel Repetition for Leakage Resilience}, booktitle = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2010, October 23-26, 2010, Las Vegas, Nevada, {USA}}, pages = {521--530}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/FOCS.2010.57}, doi = {10.1109/FOCS.2010.57}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/LewkoW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WolchokHHFHRWW10, author = {Scott Wolchok and Owen S. Hofmann and Nadia Heninger and Edward W. Felten and J. Alex Halderman and Christopher J. Rossbach and Brent Waters and Emmett Witchel}, title = {Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March 2010}, publisher = {The Internet Society}, year = {2010}, url = {https://www.ndss-symposium.org/ndss2010/defeating-vanish-low-cost-sybil-attacks-against-large-dhts}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WolchokHHFHRWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/LewkoSW10, author = {Allison B. Lewko and Amit Sahai and Brent Waters}, title = {Revocation Systems with Very Small Private Keys}, booktitle = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May 2010, Berleley/Oakland, California, {USA}}, pages = {273--285}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SP.2010.23}, doi = {10.1109/SP.2010.23}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/LewkoSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LewkoW10, author = {Allison B. Lewko and Brent Waters}, editor = {Daniele Micciancio}, title = {New Techniques for Dual System Encryption and Fully Secure {HIBE} with Short Ciphertexts}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {455--479}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_27}, doi = {10.1007/978-3-642-11799-2\_27}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LewkoW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerW10, author = {Susan Hohenberger and Brent Waters}, title = {Constructing Verifiable Random Functions with Large Input Spaces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2010}, url = {http://eprint.iacr.org/2010/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoOSTW10, author = {Allison B. Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {110}, year = {2010}, url = {http://eprint.iacr.org/2010/110}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoOSTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BellareWY10, author = {Mihir Bellare and Brent Waters and Scott Yilek}, title = {Identity-Based Encryption Secure against Selective Opening Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {159}, year = {2010}, url = {http://eprint.iacr.org/2010/159}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BellareWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW10, author = {Allison B. Lewko and Brent Waters}, title = {Decentralizing Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {351}, year = {2010}, url = {http://eprint.iacr.org/2010/351}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW10a, author = {Allison B. Lewko and Brent Waters}, title = {On the Insecurity of Parallel Repetition for Leakage Resilience}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2010}, url = {http://eprint.iacr.org/2010/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoRW10, author = {Allison B. Lewko and Yannis Rouselakis and Brent Waters}, title = {Achieving Leakage Resilience Through Dual System Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2010}, url = {http://eprint.iacr.org/2010/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehSW10, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Functional Encryption: Definitions and Challenges}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2010}, url = {http://eprint.iacr.org/2010/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoLW10, author = {Allison B. Lewko and Mark Lewko and Brent Waters}, title = {How to Leak on Key Updates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {562}, year = {2010}, url = {http://eprint.iacr.org/2010/562}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BethencourtSW09, author = {John Bethencourt and Dawn Xiaodong Song and Brent Waters}, title = {New Techniques for Private Stream Searching}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {3}, pages = {16:1--16:32}, year = {2009}, url = {https://doi.org/10.1145/1455526.1455529}, doi = {10.1145/1455526.1455529}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BethencourtSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LewkoW09, author = {Allison B. Lewko and Brent Waters}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {Efficient pseudorandom functions from the decisional linear assumption and weaker variants}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {112--120}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653677}, doi = {10.1145/1653662.1653677}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LewkoW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Waters09, author = {Brent Waters}, editor = {Shai Halevi}, title = {Dual System Encryption: Realizing Fully Secure {IBE} and {HIBE} under Simple Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {619--636}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_36}, doi = {10.1007/978-3-642-03356-8\_36}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Waters09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HohenbergerW09, author = {Susan Hohenberger and Brent Waters}, editor = {Shai Halevi}, title = {Short and Stateless Signatures from the {RSA} Assumption}, booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5677}, pages = {654--670}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03356-8\_38}, doi = {10.1007/978-3-642-03356-8\_38}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HohenbergerW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GentryW09, author = {Craig Gentry and Brent Waters}, editor = {Antoine Joux}, title = {Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {171--188}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_10}, doi = {10.1007/978-3-642-01001-9\_10}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GentryW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HohenbergerW09, author = {Susan Hohenberger and Brent Waters}, editor = {Antoine Joux}, title = {Realizing Hash-and-Sign Signatures under Standard Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {333--350}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_19}, doi = {10.1007/978-3-642-01001-9\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HohenbergerW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BonehFKW09, author = {Dan Boneh and David Mandell Freeman and Jonathan Katz and Brent Waters}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Signing a Linear Subspace: Signature Schemes for Network Coding}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {68--87}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_5}, doi = {10.1007/978-3-642-00468-1\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BonehFKW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ShenSW09, author = {Emily Shen and Elaine Shi and Brent Waters}, editor = {Omer Reingold}, title = {Predicate Privacy in Encryption Systems}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {457--473}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_27}, doi = {10.1007/978-3-642-00457-5\_27}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ShenSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ciss/SahaiWL09, author = {Amit Sahai and Brent Waters and Steve Lu}, editor = {Marc Joye and Gregory Neven}, title = {Attribute-Based Encryption}, booktitle = {Identity-Based Cryptography}, series = {Cryptology and Information Security Series}, volume = {2}, pages = {156--168}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-58603-947-9-156}, doi = {10.3233/978-1-58603-947-9-156}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ciss/SahaiWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pairing/2009, editor = {Hovav Shacham and Brent Waters}, title = {Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5671}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03298-1}, doi = {10.1007/978-3-642-03298-1}, isbn = {978-3-642-03297-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerW09, author = {Susan Hohenberger and Brent Waters}, title = {Realizing Hash-and-Sign Signatures under Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2009}, url = {http://eprint.iacr.org/2009/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerW09a, author = {Susan Hohenberger and Brent Waters}, title = {Short and Stateless Signatures from the {RSA} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {283}, year = {2009}, url = {http://eprint.iacr.org/2009/283}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerW09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Waters09, author = {Brent Waters}, title = {Dual System Encryption: Realizing Fully Secure {IBE} and {HIBE} under Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2009}, url = {http://eprint.iacr.org/2009/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Waters09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW09, author = {Allison B. Lewko and Brent Waters}, title = {New Techniques for Dual System Encryption and Fully Secure {HIBE} with Short Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2009}, url = {http://eprint.iacr.org/2009/482}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoW09a, author = {Allison B. Lewko and Brent Waters}, title = {Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2009}, url = {http://eprint.iacr.org/2009/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoW09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargKSW09, author = {Sanjam Garg and Abishek Kumarasubramanian and Amit Sahai and Brent Waters}, title = {Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {532}, year = {2009}, url = {http://eprint.iacr.org/2009/532}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargKSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ShachamW08, author = {Hovav Shacham and Brent Waters}, editor = {Josef Pieprzyk}, title = {Compact Proofs of Retrievability}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {90--107}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_7}, doi = {10.1007/978-3-540-89255-7\_7}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ShachamW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoyalLSW08, author = {Vipul Goyal and Steve Lu and Amit Sahai and Brent Waters}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Black-box accountable authority identity-based encryption}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {427--436}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455824}, doi = {10.1145/1455770.1455824}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoyalLSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PeikertVW08, author = {Chris Peikert and Vinod Vaikuntanathan and Brent Waters}, editor = {David A. Wagner}, title = {A Framework for Efficient and Composable Oblivious Transfer}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {554--571}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_31}, doi = {10.1007/978-3-540-85174-5\_31}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PeikertVW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KatzSW08, author = {Jonathan Katz and Amit Sahai and Brent Waters}, editor = {Nigel P. Smart}, title = {Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {146--162}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_9}, doi = {10.1007/978-3-540-78967-3\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KatzSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/BonehPRVW08, author = {Dan Boneh and Periklis A. Papakonstantinou and Charles Rackoff and Yevgeniy Vahlis and Brent Waters}, title = {On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations}, booktitle = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2008, October 25-28, 2008, Philadelphia, PA, {USA}}, pages = {283--292}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/FOCS.2008.67}, doi = {10.1109/FOCS.2008.67}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/BonehPRVW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/ShiW08, author = {Elaine Shi and Brent Waters}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Delegating Capabilities in Predicate Encryption Systems}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {560--578}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_46}, doi = {10.1007/978-3-540-70583-3\_46}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/ShiW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BethencourtSW08, author = {John Bethencourt and Dawn Song and Brent Waters}, title = {Analysis-Resistant Malware}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2008, San Diego, California, USA, 10th February - 13th February 2008}, publisher = {The Internet Society}, year = {2008}, url = {https://www.ndss-symposium.org/ndss2008/analysis-resistant-malware/}, timestamp = {Mon, 01 Feb 2021 08:42:15 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BethencourtSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/PeikertW08, author = {Chris Peikert and Brent Waters}, editor = {Cynthia Dwork}, title = {Lossy trapdoor functions and their applications}, booktitle = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008}, pages = {187--196}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1374376.1374406}, doi = {10.1145/1374376.1374406}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/PeikertW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShachamW08, author = {Hovav Shacham and Brent Waters}, title = {Compact Proofs of Retrievability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2008}, url = {http://eprint.iacr.org/2008/073}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShachamW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GentryW08, author = {Craig Gentry and Brent Waters}, title = {Adaptive Security in Broadcast Encryption Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2008}, url = {http://eprint.iacr.org/2008/268}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GentryW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiW08, author = {Elaine Shi and Brent Waters}, title = {Delegating Capabilities in Predicate Encryption Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2008}, url = {http://eprint.iacr.org/2008/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Waters08, author = {Brent Waters}, title = {Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2008}, url = {http://eprint.iacr.org/2008/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Waters08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LewkoSW08, author = {Allison B. Lewko and Amit Sahai and Brent Waters}, title = {Revocation Systems with Very Small Private Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2008}, url = {http://eprint.iacr.org/2008/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LewkoSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehFKW08, author = {Dan Boneh and David Mandell Freeman and Jonathan Katz and Brent Waters}, title = {Signing a Linear Subspace: Signature Schemes for Network Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2008}, url = {http://eprint.iacr.org/2008/316}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehFKW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShenSW08, author = {Emily Shen and Elaine Shi and Brent Waters}, title = {Predicate Privacy in Encryption Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2008}, url = {http://eprint.iacr.org/2008/536}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShenSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OstrovskySW07, author = {Rafail Ostrovsky and Amit Sahai and Brent Waters}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Attribute-based encryption with non-monotonic access structures}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {195--203}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315270}, doi = {10.1145/1315245.1315270}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OstrovskySW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaldermanW07, author = {J. Alex Halderman and Brent Waters}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Harvesting verifiable challenges from oblivious online sources}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {330--341}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315287}, doi = {10.1145/1315245.1315287}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HaldermanW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/BethencourtBW07, author = {John Bethencourt and Dan Boneh and Brent Waters}, title = {Cryptographic Methods for Storing Ballots on a Voting Machine}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March 2007}, publisher = {The Internet Society}, year = {2007}, url = {https://www.ndss-symposium.org/ndss2007/cryptographic-methods-storing-ballots-voting-machine/}, timestamp = {Mon, 01 Feb 2021 08:42:16 +0100}, biburl = {https://dblp.org/rec/conf/ndss/BethencourtBW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BoyenW07, author = {Xavier Boyen and Brent Waters}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Full-Domain Subgroup Hiding and Constant-Size Group Signatures}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {1--15}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_1}, doi = {10.1007/978-3-540-71677-8\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BoyenW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ShachamW07, author = {Hovav Shacham and Brent Waters}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Efficient Ring Signatures Without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {166--180}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_12}, doi = {10.1007/978-3-540-71677-8\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ShachamW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BethencourtSW07, author = {John Bethencourt and Amit Sahai and Brent Waters}, title = {Ciphertext-Policy Attribute-Based Encryption}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {321--334}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.11}, doi = {10.1109/SP.2007.11}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/BethencourtSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BonehW07, author = {Dan Boneh and Brent Waters}, editor = {Salil P. Vadhan}, title = {Conjunctive, Subset, and Range Queries on Encrypted Data}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {535--554}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_29}, doi = {10.1007/978-3-540-70936-7\_29}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BonehW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/PeikertW07, author = {Chris Peikert and Brent Waters}, title = {Lossy Trapdoor Functions and Their Applications}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR07-080}}, year = {2007}, url = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-080/index.html}, eprinttype = {ECCC}, eprint = {TR07-080}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/PeikertW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeikertW07, author = {Chris Peikert and Brent Waters}, title = {Lossy Trapdoor Functions and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {279}, year = {2007}, url = {http://eprint.iacr.org/2007/279}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeikertW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskySW07, author = {Rafail Ostrovsky and Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption with Non-Monotonic Access Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2007}, url = {http://eprint.iacr.org/2007/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskySW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PeikertVW07, author = {Chris Peikert and Vinod Vaikuntanathan and Brent Waters}, title = {A Framework for Efficient and Composable Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {348}, year = {2007}, url = {http://eprint.iacr.org/2007/348}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PeikertVW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzSW07, author = {Jonathan Katz and Amit Sahai and Brent Waters}, title = {Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2007}, url = {http://eprint.iacr.org/2007/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GoyalPSW06, author = {Vipul Goyal and Omkant Pandey and Amit Sahai and Brent Waters}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Attribute-based encryption for fine-grained access control of encrypted data}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {89--98}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180418}, doi = {10.1145/1180405.1180418}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GoyalPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PirrettiTMW06, author = {Matthew Pirretti and Patrick Traynor and Patrick D. McDaniel and Brent Waters}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Secure attribute-based systems}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {99--112}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180419}, doi = {10.1145/1180405.1180419}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PirrettiTMW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyenSSW06, author = {Xavier Boyen and Hovav Shacham and Emily Shen and Brent Waters}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Forward-secure signatures with untrusted update}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {191--200}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180430}, doi = {10.1145/1180405.1180430}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoyenSSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BonehW06, author = {Dan Boneh and Brent Waters}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {A fully collusion resistant broadcast, trace, and revoke system}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {211--220}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180432}, doi = {10.1145/1180405.1180432}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BonehW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyenW06, author = {Xavier Boyen and Brent Waters}, editor = {Cynthia Dwork}, title = {Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {290--307}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_17}, doi = {10.1007/11818175\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyenW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyenW06, author = {Xavier Boyen and Brent Waters}, editor = {Serge Vaudenay}, title = {Compact Group Signatures Without Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {427--444}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_26}, doi = {10.1007/11761679\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyenW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LuOSSW06, author = {Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav Shacham and Brent Waters}, editor = {Serge Vaudenay}, title = {Sequential Aggregate Signatures and Multisignatures Without Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {465--485}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_28}, doi = {10.1007/11761679\_28}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LuOSSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehSW06, author = {Dan Boneh and Amit Sahai and Brent Waters}, editor = {Serge Vaudenay}, title = {Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {573--592}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_34}, doi = {10.1007/11761679\_34}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BarthBW06, author = {Adam Barth and Dan Boneh and Brent Waters}, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {Privacy in Encrypted Content Distribution Using Private Broadcast Encryption}, booktitle = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, pages = {52--64}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663\_4}, doi = {10.1007/11889663\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/BarthBW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BonehSW06, author = {Dan Boneh and Emily Shen and Brent Waters}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {Strongly Unforgeable Signatures Based on Computational Diffie-Hellman}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {229--240}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_15}, doi = {10.1007/11745853\_15}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BonehSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BethencourtSW06, author = {John Bethencourt and Dawn Xiaodong Song and Brent Waters}, title = {New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {132--139}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.27}, doi = {10.1109/SP.2006.27}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/BethencourtSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehSW06, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Fully Collusion Resistant Traitor Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2006}, url = {http://eprint.iacr.org/2006/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenW06, author = {Xavier Boyen and Brent Waters}, title = {Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2006}, url = {http://eprint.iacr.org/2006/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuOSSW06, author = {Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav Shacham and Brent Waters}, title = {Sequential Aggregate Signatures and Multisignatures without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2006}, url = {http://eprint.iacr.org/2006/096}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LuOSSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehW06, author = {Dan Boneh and Brent Waters}, title = {Conjunctive, Subset, and Range Queries on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2006}, url = {http://eprint.iacr.org/2006/287}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShachamW06, author = {Hovav Shacham and Brent Waters}, title = {Efficient Ring Signatures without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2006}, url = {http://eprint.iacr.org/2006/289}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShachamW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenSSW06, author = {Xavier Boyen and Hovav Shacham and Emily Shen and Brent Waters}, title = {Forward-Secure Signatures with Untrusted Update}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2006}, url = {http://eprint.iacr.org/2006/297}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenSSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehW06a, author = {Dan Boneh and Brent Waters}, title = {A Fully Collusion Resistant Broadcast, Trace, and Revoke System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {298}, year = {2006}, url = {http://eprint.iacr.org/2006/298}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehW06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalPSW06, author = {Vipul Goyal and Omkant Pandey and Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {309}, year = {2006}, url = {http://eprint.iacr.org/2006/309}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyenMW05, author = {Xavier Boyen and Qixiang Mei and Brent Waters}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Direct chosen ciphertext security from identity-based techniques}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {320--329}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102162}, doi = {10.1145/1102120.1102162}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BoyenMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehGW05, author = {Dan Boneh and Craig Gentry and Brent Waters}, editor = {Victor Shoup}, title = {Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {258--275}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_16}, doi = {10.1007/11535218\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehGW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Waters05, author = {Brent Waters}, editor = {Ronald Cramer}, title = {Efficient Identity-Based Encryption Without Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {114--127}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_7}, doi = {10.1007/11426639\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Waters05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SahaiW05, author = {Amit Sahai and Brent Waters}, editor = {Ronald Cramer}, title = {Fuzzy Identity-Based Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {457--473}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_27}, doi = {10.1007/11426639\_27}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SahaiW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/HaldermanWF05, author = {J. Alex Halderman and Brent Waters and Edward W. Felten}, editor = {Allan Ellis and Tatsuya Hagino}, title = {A convenient method for securely managing passwords}, booktitle = {Proceedings of the 14th international conference on World Wide Web, {WWW} 2005, Chiba, Japan, May 10-14, 2005}, pages = {471--479}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1060745.1060815}, doi = {10.1145/1060745.1060815}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/HaldermanWF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehGW05, author = {Dan Boneh and Craig Gentry and Brent Waters}, title = {Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2005}, url = {http://eprint.iacr.org/2005/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehGW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenMW05, author = {Xavier Boyen and Qixiang Mei and Brent Waters}, title = {Direct Chosen Ciphertext Security from Identity-Based Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2005}, url = {http://eprint.iacr.org/2005/288}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenW05, author = {Xavier Boyen and Brent Waters}, title = {Compact Group Signatures Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2005}, url = {http://eprint.iacr.org/2005/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GolleSW04, author = {Philippe Golle and Jessica Staddon and Brent R. Waters}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Secure Conjunctive Keyword Search over Encrypted Data}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {31--45}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_3}, doi = {10.1007/978-3-540-24852-1\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/GolleSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WatersJHF04, author = {Brent Waters and Ari Juels and J. Alex Halderman and Edward W. Felten}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {New client puzzle outsourcing techniques for DoS resistance}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {246--256}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030117}, doi = {10.1145/1030083.1030117}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WatersJHF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/WatersBDS04, author = {Brent R. Waters and Dirk Balfanz and Glenn Durfee and Diana K. Smetters}, title = {Building an Encrypted and Searchable Audit Log}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2004, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2004}, url = {https://www.ndss-symposium.org/ndss2004/building-encrypted-and-searchable-audit-log/}, timestamp = {Mon, 01 Feb 2021 08:42:17 +0100}, biburl = {https://dblp.org/rec/conf/ndss/WatersBDS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/HaldermanWF04, author = {J. Alex Halderman and Brent R. Waters and Edward W. Felten}, editor = {Vijay Atluri and Paul F. Syverson and Sabrina De Capitani di Vimercati}, title = {Privacy management for portable recording devices}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2004, Washington, DC, USA, October 28, 2004}, pages = {16--24}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029179.1029183}, doi = {10.1145/1029179.1029183}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/HaldermanWF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaiW04, author = {Amit Sahai and Brent Waters}, title = {Fuzzy Identity Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2004}, url = {http://eprint.iacr.org/2004/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaiW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Waters04, author = {Brent R. Waters}, title = {Efficient Identity-Based Encryption Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2004}, url = {http://eprint.iacr.org/2004/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Waters04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WatersFS03, author = {Brent R. Waters and Edward W. Felten and Amit Sahai}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Receiver anonymity via incomparable public keys}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {112--121}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948127}, doi = {10.1145/948109.948127}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WatersFS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.