Brent Waters
Orcid: 0009-0008-9718-8623Affiliations:
- University of Texas at Austin, USA
According to our database1,
Brent Waters
authored at least 201 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2021, "For contributions to cryptography".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for sfNP.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
J. Cryptol., April, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Security-Preserving Distributed Samplers: How to Generate Any CRS in One Round Without Random Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Commun. ACM, 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys.
SIAM J. Comput., 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption.
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption.
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
Proceedings of the Symposium on Theory of Computing, 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles.
J. Cryptol., 2013
Proceedings of the 2013 IEEE Workshop on Applications of Computer Vision, 2013
Proceedings of the Symposium on Theory of Computing Conference, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Practical constructions and new proof methods for large universe attribute-based encryption.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization.
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
Proceedings of the Network and Distributed System Security Symposium, 2010
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions.
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Efficient pseudorandom functions from the decisional linear assumption and weaker variants.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Network and Distributed System Security Symposium, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Proceedings of the 14th international conference on World Wide Web, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the Network and Distributed System Security Symposium, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003