Brent Waters

Orcid: 0009-0008-9718-8623

Affiliations:
  • University of Texas at Austin, USA


According to our database1, Brent Waters authored at least 201 papers between 2003 and 2025.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2021, "For contributions to cryptography".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Silent Threshold Cryptography from Pairings: Expressive Policies in the Plain Model.
IACR Cryptol. ePrint Arch., 2025

Succinct Computational Secret Sharing for Monotone Circuits.
IACR Cryptol. ePrint Arch., 2025

Pairing-Based Aggregate Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2025

Reusable Designated Verifier NIZK from Lossy Trapdoor Functions.
IACR Cryptol. ePrint Arch., 2025

Succinct Witness Encryption for Batch Languages and Applications.
IACR Cryptol. ePrint Arch., 2025

Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Adaptively-Secure Big-Key Identity-Based Encryption.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Accountable Multi-signatures with Constant Size Public Keys.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

New Techniques for Preimage Sampling: Improved NIZKs and More from LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Multi-authority Registered Attribute-Based Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for sfNP.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

How to Make Any Computational Secret Sharing Scheme Adaptively Secure.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for NP.
IACR Cryptol. ePrint Arch., 2024

Separating Selective Opening Security From Standard Security, Assuming IO.
IACR Cryptol. ePrint Arch., 2024

A Hidden-Bits Approach to Black-Box Statistical ZAPs from LWE.
IACR Cryptol. ePrint Arch., 2024

Adaptively Secure Attribute-Based Encryption from Witness Encryption.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Batching Adaptively-Sound SNARGs for NP.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Batch Arguments to NIZKs from One-Way Functions.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors.
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024

Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation.
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024

NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Adaptive Security in SNARGs via iO and Lossy Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Reducing the CRS Size in Registered ABE Systems.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Decentralized Multi-authority ABE for sfNC<sup>1</sup> from BDH.
J. Cryptol., April, 2023

Non-Interactive Anonymous Router with Quasi-Linear Router Computation.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Non-Interactive Publicly-Verifiable Delegation of Committed Programs.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Registered Attribute-Based Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

On Non-uniform Security for Black-Box Non-interactive CCA Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Fully Adaptive Decentralized Multi-Authority ABE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Security-Preserving Distributed Samplers: How to Generate Any CRS in One Round Without Random Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Batch Arguments for NP and More from Standard Bilinear Group Assumptions.
IACR Cryptol. ePrint Arch., 2022

Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2022

Multi-authority ABE from Lattices Without Random Oracles.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

How to Sample a Discrete Gaussian (and more) from a Random Oracle.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Adaptive Multiparty NIKE.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Fully Succinct Batch Arguments for sfNP from Indistinguishability Obfuscation.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Batch Arguments for sfNP and More from Standard Bilinear Group Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Decentralized Multi-Authority ABE for NC^1 from Computational-BDH.
IACR Cryptol. ePrint Arch., 2021

On the CCA Compatibility of Public-Key Infrastructure.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Black-Box Non-interactive Non-malleable Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Decentralized Multi-authority ABE for DNFs from LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Targeted Lossy Functions and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Bounded Collusion ABE for TMs from IBE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
On Perfect Correctness in (Lockable) Obfuscation.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

New Techniques in Replica Encodings with Client Setup.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Chosen Ciphertext Security from Injective Trapdoor Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

New Constructions of Hinting PRGs, OWFs with Encryption, and More.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

PPE Circuits: Formal Definition to Software Automation.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

New Methods and Abstractions for RSA-Based Forward Secure Signatures.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2019

New Approaches to Traitor Tracing with Embedded Identities.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Collusion Resistant Broadcast and Trace from Positional Witness Encryption.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Adaptively Secure Constrained Pseudorandom Functions.
Proceedings of the Financial Cryptography and Data Security, 2019

Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Broadcast and Trace with N^ε Ciphertext Size from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Watermarking Public-Key Cryptographic Primitives.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

ABE for DFA from k-Lin.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Output Compression, MPC, and iO for Turing Machines.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Traitor-Tracing from LWE Made Simple and Attribute-Based.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Upgrading to Functional Encryption.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Impossibility of Simulation Secure Functional Encryption Even with Random Oracles.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Collusion resistant traitor tracing from learning with errors.
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018

Synchronized Aggregate Signatures from the RSA Assumption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Risky Traitor Tracing and New Differential Privacy Negative Results.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
A Generic Approach to Constructing and Proving Verifiable Random Functions.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Universal Samplers with Fast Verification.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Separating IND-CPA and Circular Security for Unbounded Length Key Cycles.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Lockable Obfuscation.
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017

Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Signature Schemes with Randomized Verification.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Circular Security Counterexamples for Arbitrary Length Cycles from LWE.
IACR Cryptol. ePrint Arch., 2016

Hiding secrets in software: a cryptographic approach to program obfuscation.
Commun. ACM, 2016

Semi-adaptive Security and Bundling Functionalities Made Generic and Easy.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Time-Lock Puzzles from Randomized Encodings.
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016

Constrained Pseudorandom Functions for Unconstrained Inputs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

New Negative Results on Differing-Inputs Obfuscation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Circular Security Separations for Arbitrary Length Cycles from LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

How to Generate and Use Universal Samplers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Deterministic Public-Key Encryption Under Continual Leakage.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys.
SIAM J. Comput., 2015

Separations in Circular Security for Arbitrary Length Key Cycles.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Indistinguishability Obfuscation for Turing Machines with Unbounded Memory.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption.
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015

Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption.
Proceedings of the Financial Cryptography and Data Security, 2015

Universal Signature Aggregators.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

A Punctured Programming Approach to Adaptively Secure Functional Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

New Circular Security Counterexamples from Decision Linear and Learning with Errors.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
How to Generate and use Universal Parameters.
IACR Cryptol. ePrint Arch., 2014

How to use indistinguishability obfuscation: deniable encryption, and more.
Proceedings of the Symposium on Theory of Computing, 2014

Relaxed Two-to-One Recoding Schemes.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Online/Offline Attribute-Based Encryption.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Why Proving HIBE Systems Secure Is Difficult.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Witness Encryption from Instance Independent Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Low Overhead Broadcast Encryption from Multilinear Maps.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Fully Secure and Fast Signing from Obfuscation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles.
J. Cryptol., 2013

Reconstructing a fragmented face from a cryptographic identification protocol.
Proceedings of the 2013 IEEE Workshop on Applications of Computer Vision, 2013

Witness encryption and its applications.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Anon-Pass: Practical Anonymous Subscriptions.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Functional Encryption: Origins and Recent Developments.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Attribute-Based Encryption with Fast Decryption.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013

The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Attribute-Based Encryption for Circuits from Multilinear Maps.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Practical constructions and new proof methods for large universe attribute-based encryption.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Constrained Pseudorandom Functions and Their Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Attribute-Based Encryption for Circuits from Multilinear Maps.
IACR Cryptol. ePrint Arch., 2012

New Constructions and Proof Methods for Large Universe Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2012

Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits.
IACR Cryptol. ePrint Arch., 2012

Functional encryption: a new vision for public-key cryptography.
Commun. ACM, 2012

Computing on Authenticated Data.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Targeted malleability: homomorphic encryption for restricted computations.
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012

Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Identity-Based (Lossy) Trapdoor Functions and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Standard Security Does Not Imply Security against Selective-Opening.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Functional Encryption for Regular Languages.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Dual Form Signatures: An Approach for Proving Security from Static Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Outsourcing the Decryption of ABE Ciphertexts.
Proceedings of the 20th USENIX Security Symposium, 2011

Cloaking Malware with the Trusted Platform Module.
Proceedings of the 20th USENIX Security Symposium, 2011

Achieving Leakage Resilience through Dual System Encryption.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Functional Encryption: Definitions and Challenges.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Identity-Based Encryption Secure against Selective Opening Attack.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

How to leak on key updates.
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011

Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Storing Secrets on Continually Leaky Devices.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

Decentralizing Attribute-Based Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Unbounded HIBE and Attribute-Based Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

Bi-Deniable Public-Key Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Revocation Systems with Very Small Private Keys.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.
Proceedings of the Network and Distributed System Security Symposium, 2010

On the Insecurity of Parallel Repetition for Leakage Resilience.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Constructing Verifiable Random Functions with Large Input Spaces.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Building efficient fully collusion-resilient traitor tracing and revocation schemes.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Practical leakage-resilient identity-based encryption from simple assumptions.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Attribute-Based Encryption.
Proceedings of the Identity-Based Cryptography, 2009

New Techniques for Private Stream Searching.
ACM Trans. Inf. Syst. Secur., 2009

Predicate Privacy in Encryption Systems.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Signing a Linear Subspace: Signature Schemes for Network Coding.
Proceedings of the Public Key Cryptography, 2009

Realizing Hash-and-Sign Signatures under Standard Assumptions.
Proceedings of the Advances in Cryptology, 2009

Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts).
Proceedings of the Advances in Cryptology, 2009

Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions.
Proceedings of the Advances in Cryptology, 2009

Short and Stateless Signatures from the RSA Assumption.
Proceedings of the Advances in Cryptology, 2009

Efficient pseudorandom functions from the decisional linear assumption and weaker variants.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Adaptive Security in Broadcast Encryption Systems.
IACR Cryptol. ePrint Arch., 2008

Lossy trapdoor functions and their applications.
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008

Analysis-Resistant Malware.
Proceedings of the Network and Distributed System Security Symposium, 2008

Delegating Capabilities in Predicate Encryption Systems.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations.
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008

Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
Proceedings of the Advances in Cryptology, 2008

A Framework for Efficient and Composable Oblivious Transfer.
Proceedings of the Advances in Cryptology, 2008

Black-box accountable authority identity-based encryption.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Compact Proofs of Retrievability.
Proceedings of the Advances in Cryptology, 2008

2007
Conjunctive, Subset, and Range Queries on Encrypted Data.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Efficient Ring Signatures Without Random Oracles.
Proceedings of the Public Key Cryptography, 2007

Full-Domain Subgroup Hiding and Constant-Size Group Signatures.
Proceedings of the Public Key Cryptography, 2007

Cryptographic Methods for Storing Ballots on a Voting Machine.
Proceedings of the Network and Distributed System Security Symposium, 2007

Attribute-based encryption with non-monotonic access structures.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Harvesting verifiable challenges from oblivious online sources.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Fully Collusion Resistant Traitor Tracing.
IACR Cryptol. ePrint Arch., 2006

New Constructions and Practical Applications for Private Stream Searching (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.
Proceedings of the Public Key Cryptography, 2006

Privacy in Encrypted Content Distribution Using Private Broadcast Encryption.
Proceedings of the Financial Cryptography and Data Security, 2006

Sequential Aggregate Signatures and Multisignatures Without Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Compact Group Signatures Without Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles).
Proceedings of the Advances in Cryptology, 2006

Secure attribute-based systems.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Attribute-based encryption for fine-grained access control of encrypted data.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

Forward-secure signatures with untrusted update.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

A fully collusion resistant broadcast, trace, and revoke system.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
A convenient method for securely managing passwords.
Proceedings of the 14th international conference on World Wide Web, 2005

Efficient Identity-Based Encryption Without Random Oracles.
Proceedings of the Advances in Cryptology, 2005

Fuzzy Identity-Based Encryption.
Proceedings of the Advances in Cryptology, 2005

Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys.
Proceedings of the Advances in Cryptology, 2005

Direct chosen ciphertext security from identity-based techniques.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Privacy management for portable recording devices.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Building an Encrypted and Searchable Audit Log.
Proceedings of the Network and Distributed System Security Symposium, 2004

New client puzzle outsourcing techniques for DoS resistance.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

Secure Conjunctive Keyword Search over Encrypted Data.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Receiver anonymity via incomparable public keys.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003


  Loading...