Shweta Agrawal

Affiliations:
  • Indian Institute of Technology Madras, India


According to our database1, Shweta Agrawal authored at least 70 papers between 2009 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Evasive LWE: Attacks, Variants & Obfustopia.
IACR Cryptol. ePrint Arch., 2025

2024
Pseudorandom Multi-Input Functional Encryption and Applications.
IACR Cryptol. ePrint Arch., 2024

Compact Pseudorandom Functional Encryption from Evasive LWE.
IACR Cryptol. ePrint Arch., 2024

Pre-Constrained Cryptography: Broad Definitions, New Constructions, Unbounded Security.
IACR Cryptol. ePrint Arch., 2024

Time-Lock Puzzles from Lattices.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

k-SUM in the Sparse Regime: Complexity and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Attribute Based Encryption for Turing Machines from Lattices.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
k-SUM in the Sparse Regime.
Electron. Colloquium Comput. Complex., 2023

CASE: A New Frontier in Public-Key Authenticated Encryption.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Quadratic Functional Encryption for Secure Training in Vertical Federated Learning.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Public Key Encryption with Secure Key Leasing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Attribute-Based Multi-input FE (and More) for Attribute-Weighted Sums.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Trace and Revoke with Optimal Parameters from Polynomial Hardness.
IACR Cryptol. ePrint Arch., 2022

Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Round-Optimal Lattice-Based Threshold Signatures, Revisited.
Proceedings of the 49th International Colloquium on Automata, Languages, and Programming, 2022

Multi-input Attribute Based Encryption and Predicate Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Practical, Round-Optimal Lattice-Based Blind Signatures.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Can Round-Optimal Lattice-Based Blind Signatures be Practical?
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in TCC 2013.
IACR Cryptol. ePrint Arch., 2021

Multi-Party Functional Encryption.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Multi-input Quadratic Functional Encryption from Pairings.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Deniable Fully Homomorphic Encryption from Learning with Errors.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Deniable Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2020

Multi-Party Functional Encryption.
IACR Cryptol. ePrint Arch., 2020

Optimal Broadcast Encryption from LWE and Pairings in the Standard Model.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

CP-ABE for Circuits (and More) in the Symmetric Key Setting.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Adaptive Simulation Security for Inner Product Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Ad Hoc Multi-Input Functional Encryption.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Optimal Broadcast Encryption from Pairings and LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing.
Proceedings of the Computer Security - ESORICS 2020, 2020

Cryptography from One-Way Communication: On Completeness of Finite Channels.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Attribute Based Encryption for Deterministic Finite Automata from DLIN.
IACR Cryptol. ePrint Arch., 2019

Attribute Based Encryption for Deterministic Finite Automata from \mathsfDLIN.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
FE and iO for Turing Machines from Minimal Assumptions.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Wiretap Polar Codes in Encryption Schemes Based on Learning with Errors Problem.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Efficient Public Trace and Revoke from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2017

Functional Encryption for Bounded Collusions, Revisited.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Online-Offline Functional Encryption for Bounded Collusions.
IACR Cryptol. ePrint Arch., 2016

Adaptive protocols for interactive communication.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Fully Secure Functional Encryption for Inner Products, from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
On the Practical Security of Inner Product Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Statistical Randomized Encodings: A Complexity Theoretic View.
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015

Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Towards a Unified Theory of Cryptographic Agents.
IACR Cryptol. ePrint Arch., 2014

2013
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results.
IACR Cryptol. ePrint Arch., 2013

Functional Encryption: New Perspectives and Lower Bounds.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Discrete Gaussian Leftover Hash Lemma over Infinite Domains.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

On Continual Leakage of Discrete Log Representations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Sampling Discrete Gaussians Efficiently and Obliviously.
IACR Cryptol. ePrint Arch., 2012

Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

2011
Fuzzy Identity Based Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2011

Secrecy using compressive sensing.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Functional Encryption for Inner Product Predicates from Learning with Errors.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Preventing Pollution Attacks in Multi-source Network Coding.
Proceedings of the Public Key Cryptography, 2010

On algebraic traceback in dynamic networks.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Efficient Lattice (H)IBE in the Standard Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.
Proceedings of the Advances in Cryptology, 2010

2009
On the secrecy rate of interference networks using structured codes.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Homomorphic MACs: MAC-Based Integrity for Network Coding.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009


  Loading...