2024
Adaptively Secure Attribute-Based Encryption from Witness Encryption
Brent Waters and Daniel Wichs
TCC 2024
Batching Adaptively-Sound SNARGs for NP
Lalita Devadas, Brent Waters, and David J. Wu
TCC 2024
Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption
Shafik Nassar, Brent Waters, and David J. Wu
TCC 2024
Batch Arguments to NIZKs from One-Way Functions
Eli Bradley, Brent Waters, and David J. Wu
TCC 2024
Distributed Broadcast Encryption from Lattices
Jeffrey Champion and David J. Wu
TCC 2024
Respire: High-Rate PIR for Databases with Small Records
Alexander Burton, Samir Jordan Menon, and David J. Wu
ACM CCS 2024
Dot-Product Proofs and Their Applications
Nir Bitansky, Prahladh Harsha, Yuval Ishai, Ron D. Rothblum, and David J. Wu
FOCS 2024
NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness
Prabhanjan Ananth, Gilad Asharov, Vipul Goyal, Hadar Kaner, Pratik Soni, and Brent Waters
SCN 2024
Adaptive Security in SNARGs via iO and Lossy Functions
Brent Waters and Mark Zhandry
CRYPTO 2024
Reducing the CRS Size in Registered ABE Systems
Rachit Garg, George Lu, Brent Waters, and David J. Wu
CRYPTO 2024
The One-Wayness of Jacobi Signatures
Henry Corrigan-Gibbs and David J. Wu
CRYPTO 2024
Limits on the Power of Prime-Order Groups: Separating Q-Type from Static Assumptions
George Lu and Mark Zhandry
CRYPTO 2024
YPIR: High-Throughput Single-Server PIR with Silent Preprocessing
Samir Jordan Menon and David J. Wu
USENIX Security Symposium 2024
A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors
Brent Waters
STOC 2024
Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation
Brent Waters and David J. Wu
STOC 2024
Succinct Functional Commitments for Circuits from k-Lin
Hoeteck Wee and David J. Wu
EUROCRYPT 2024
Strong Batching for Non-Interactive Statistical Zero-Knowledge
Changrui Mu, Shafik Nassar, Ron D. Rothblum, and Prashant Nalini Vasudevan
EUROCRYPT 2024
Time-Lock Puzzles with Efficient Batch Solving
Jesko Dujmovic, Rachit Garg, and Giulio Malavolta
EUROCRYPT 2024
Dynamic Collusion Functional Encryption and Multi-Authority Attribute-Based Encryption
Rachit Garg, Rishab Goyal, and George Lu
PKC 2024
2023
Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis
Hoeteck Wee and David J. Wu
ASIACRYPT 2023
Non-Interactive Anonymous Router with Quasi-Linear Router Computation
Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani, and Brent Waters
TCC 2023
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory
Rachit Garg, George Lu, Brent Waters, and David J. Wu
ACM CCS 2023
How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More
Cody Freitag, Brent Waters, and David J. Wu
CRYPTO 2023
Non-Interactive Zero-Knowledge from Non-Interactive Batch Arguments
Jeffrey Champion and David J. Wu
CRYPTO 2023
Security-Preserving Distributed Samplers: How to Generate Any CRS in One Round Without Random Oracles
Damiano Abram, Brent Waters, and Mark Zhandry
CRYPTO 2023
Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM
Brent Waters and Daniel Wichs
CRYPTO 2023
Authenticated Private Information Retrieval
Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, and Bryan Ford
USENIX Security Symposium 2023
Succinct Vector, Polynomial, and Functional Commitments from Lattices
Hoeteck Wee and David J. Wu
EUROCRYPT 2023
Registered Attribute-Based Encryption
Susan Hohenberger, George Lu, Brent Waters, and David J. Wu
EUROCRYPT 2023
On Non-Uniform Security for Black-Box Non-Interactive CCA Commitments
Rachit Garg, Dakshita Khurana, George Lu, and Brent Waters
EUROCRYPT 2023
Fully Adaptive Decentralized Multi-Authority ABE
Pratish Datta, Ilan Komargodski, and Brent Waters
EUROCRYPT 2023
Non-Interactive Publicly-Verifiable Delegation of Committed Programs
Riddhi Ghosal, Amit Sahai, and Brent Waters
PKC 2023
Decentralized Multi-Authority ABE for NC1 from Computational-BDH
Pratish Datta, Ilan Komargodski, and Brent Waters
Journal of Cryptology 2023
2022
Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation
Rachit Garg, Kristin Sheridan, Brent Waters, and David J. Wu
TCC 2022
Multi-Authority ABE from Lattices Without Random Oracles
Brent Waters, Hoeteck Wee, and David J. Wu
TCC 2022
Venkata Koppula, Brent Waters, and Mark Zhandry
TCC 2022
How to Sample a Discrete Gaussian (and more) from a Random Oracle
George Lu and Brent Waters
TCC 2022
Batch Arguments for NP and More from Standard Bilinear Group Assumptions
Brent Waters and David J. Wu
CRYPTO 2022
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems
Arush Chhatrapati, Susan Hohenberger, James Trombo, and Satyanarayana Vusirikala
ACNS 2022
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption
Rachit Garg, Rishab Goyal, George Lu, and Brent Waters
EUROCRYPT 2022
Spiral: Fast, High-Rate Single-Server PIR via FHE Composition
Samir Jordan Menon and David J. Wu
IEEE Symposium on Security and Privacy 2022
Traceable PRFs: Full Collusion Resistance and Active Security
Sarasij Maitra and David J. Wu
PKC 2022
2021
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
Rishab Goyal, Sam Kim, Brent Waters, and David J. Wu
ASIACRYPT 2021
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
Rishab Goyal, Jiahui Liu, and Brent Waters
ASIACRYPT 2021
Bounded Collusion ABE for TMs from IBE
Rishab Goyal, Ridwan Syed, and Brent Waters
ASIACRYPT 2021
Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices
Yuval Ishai, Hang Su, and David J. Wu
ACM CCS 2021
PPE Circuits for Rational Polynomials
Susan Hohenberger and Satyanarayana Vusirikala
ACM CCS 2021
Targeted Lossy Functions and Applications
Willy Quach, Brent Waters, and Daniel Wichs
CRYPTO 2021
Black-Box Non-Interactive Non-Malleable Commitments
Rachit Garg, Dakshita Khurana, George Lu, and Brent Waters
EUROCRYPT 2021
Decentralized Multi-Authority ABE for DNFs from LWE
Pratish Datta, Ilan Komargodski, and Brent Waters
EUROCRYPT 2021
On the CCA Compatibility of Public-Key Infrastructure
Dakshita Khurana and Brent Waters
PKC 2021
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
Amit Sahai and Brent Waters
SIAM Journal of Computing 2021
Secure Multiparty Computation in the Bounded Storage Model
Jiahui Liu and Satyanarayana Vusirikala
IMACC 2021
2020
On Perfect Correctness in (Lockable) Obfuscation
Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, and Brent Waters
TCC 2020
New Techniques in Replica Encodings with Client Setup
Rachit Garg, George Lu, and Brent Waters
TCC 2020
PPE Circuits: Formal Definition to Software Automation
Susan Hohenberger, Satyanarayana Vusirikala, and Brent Waters
ACM CCS 2020
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing
Shweta Agrawal, Rachit Garg, Nishant Kumar, and Manoj Prabhakaran
ESORICS 2020
New Constructions of Hinting PRGs, OWFs with Encryption, and More
Rishab Goyal, Satyanarayana Vusirikala, and Brent Waters
CRYPTO 2020
Chosen Ciphertext Security from Injective Trapdoor Functions
Susan Hohenberger, Venkata Koppula, and Brent Waters
CRYPTO 2020
Verifiable Registration-Based Encryption
Rishab Goyal and Satyanarayana Vusirikala
CRYPTO 2020
New Methods and Abstractions for RSA-Based Forward Secure Signatures
Susan Hohenberger and Brent Waters
ACNS 2020
Collusion Resistant Traitor Tracing from Learning with Errors
Rishab Goyal, Venkata Koppula, and Brent Waters
SIAM Journal of Computing 2020
2019
Output Compression, MPC, and iO for Turing Machines
Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, and Brent Waters
ASIACRYPT 2019
New Approaches to Traitor Tracing with Embedded Identities
Rishab Goyal, Venkata Koppula, and Brent Waters
TCC 2019
Are These Pairing Elements Correct?: Automated Verification and Applications
Susan Hohenberger and Satyanarayana Vusirikala
ACM CCS 2019
Watermarking Public-Key Cryptographic Primitives
Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters, and David J. Wu
CRYPTO 2019
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
Venkata Koppula and Brent Waters
CRYPTO 2019
Junqing Gong, Brent Waters, and Hoeteck Wee
CRYPTO 2019
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions
Rishab Goyal, Willy Quach, Brent Waters, and Daniel Wichs
CRYPTO 2019
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
Rishab Goyal, Satyanarayana Vusirikala, and Brent Waters
PKC 2019
Adaptively Secure Constrained Pseudorandom Functions
Dennis Hofheinz, Akshay Kamath, Venkata Koppula, and Brent Waters
Financial Cryptography 2019
2018
Traitor-Tracing from LWE Made Simple and Attribute-Based
Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, and Daniel Wichs
TCC 2018
Upgrading to Functional Encryption
Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai, and Brent Waters
TCC 2018
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles
Shashank Agrawal, Venkata Koppula, and Brent Waters
TCC 2018
Risky Traitor Tracing and New Differential Privacy Negative Results
Rishab Goyal, Venkata Koppula, Andrew Russell, and Brent Waters
CRYPTO 2018
Collusion Resistant Traitor Tracing from Learning with Errors
Rishab Goyal, Venkata Koppula, and Brent Waters
STOC 2018
Synchronized Aggregate Signatures from the RSA Assumption
Susan Hohenberger and Brent Waters
EUROCRYPT 2018
2017
A Generic Approach to Constructing and Proving Verifiable Random Functions
Rishab Goyal, Susan Hohenberger, Venkata Koppula, and Brent Waters
TCC 2017
Overcoming Cryptographic Impossibility Results Using Blockchains
Rishab Goyal and Vipul Goyal
TCC 2017
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case
Nishanth Chandran, Juan A. Garay, Payman Mohassel, and Satyanarayana Vusirikala
ACM CCS 2017
Rishab Goyal, Venkata Koppula, and Brent Waters
FOCS 2017
Signature Schemes with Randomized Verification
Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran, and Brent Waters
ACNS 2017
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
Rishab Goyal, Venkata Koppula, and Brent Waters
EUROCRYPT 2017
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
Rishab Goyal, Venkata Koppula, and Brent Waters
PKC 2017
Universal Samplers with Fast Verification
Venkata Koppula, Andrew Poelstra, and Brent Waters
PKC 2017
2016
How to Generate and Use Universal Samplers
Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters, and Mark Zhandry
ASIACRYPT 2016
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
Rishab Goyal, Venkata Koppula, and Brent Waters
TCC 2016
Circular Security Separations for Arbitrary Length Cycles from LWE
Venkata Koppula and Brent Waters
CRYPTO 2016
Deterministic Public-Key Encryption Under Continual Leakage
Venkata Koppula, Omkant Pandey, Yannis Rouselakis, and Brent Waters
ACNS 2016
Constrained Pseudorandom Functions for Unconstrained Inputs
Apoorvaa Deshpande, Venkata Koppula, and Brent Waters
EUROCRYPT 2016
New Negative Results on Differing-Inputs Obfuscation
Mihir Bellare, Igors Stepanovs, and Brent Waters
EUROCRYPT 2016
Time-Lock Puzzles from Randomized Encodings
Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, and Brent Waters
ITCS 2016
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters
SIAM Journal of Computing 2016
Hiding Secrets in Software: A Cryptographic Approach to Program Obfuscation
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters
Communications of the ACM 2016
2015
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
Susan Hohenberger, Venkata Koppula, and Brent Waters
ASIACRYPT 2015
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, and Daniel Wichs
ASIACRYPT 2015
New Circular Security Counterexamples from Decision Linear and Learning with Errors
Allison Bishop, Susan Hohenberger, and Brent Waters
ASIACRYPT 2015
Separations in Circular Security for Arbitrary Length Key Cycles
Venkata Koppula, Kim Ramchen, and Brent Waters
TCC 2015
Functional Encryption for Randomized Functionalities
Vipul Goyal, Abhishek Jain, Venkata Koppula, and Amit Sahai
TCC 2015
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
Craig Gentry, Allison Bishop Lewko, Amit Sahai, and Brent Waters
FOCS 2015
A Punctured Programming Approach to Adaptively Secure Functional Encryption
Brent Waters
CRYPTO 2015
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
Venkata Koppula, Allison Bishop Lewko, and Brent Waters
STOC 2015
Universal Signature Aggregators
Susan Hohenberger, Venkata Koppula, and Brent Waters
EUROCRYPT 2015
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
Yannis Rouselakis and Brent Waters
Financial Cryptography 2015
Computing on Authenticated Data
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, and Brent Waters
Journal of Cryptology 2015
Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, and Brent Waters
SIAM Journal of Computing 2015
2014
Fully Secure and Fast Signing from Obfuscation
Kim Ramchen and Brent Waters
ACM CCS 2014
Relaxed Two-to-One Recoding Schemes
Omkant Pandey, Kim Ramchen, and Brent Waters
SCN 2014
Low Overhead Broadcast Encryption from Multilinear Maps
Dan Boneh, Brent Waters, and Mark Zhandry
CRYPTO 2014
Witness Encryption from Instance Independent Assumptions
Craig Gentry, Allison B. Lewko, and Brent Waters
CRYPTO 2014
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
Amit Sahai and Brent Waters
STOC 2014
Why Proving HIBE Systems Secure Is Difficult
Allison B. Lewko and Brent Waters
EUROCRYPT 2014
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
Susan Hohenberger, Amit Sahai, and Brent Waters
EUROCRYPT 2014
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions
Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, and Brent Waters
CT-RSA 2014
Online/Offline Attribute-Based Encryption
Susan Hohenberger and Brent Waters
PKC 2014
2013
Constrained Pseudorandom Functions and Their Applications
Dan Boneh and Brent Waters
ASIACRYPT 2013
Practical Constructions and New Proof Methods for Large Universe Attribute-Based Encryption
Yannis Rouselakis and Brent Waters
ACM CCS 2013
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, and Brent Waters
FOCS 2013
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
Craig Gentry, Amit Sahai, and Brent Waters
CRYPTO 2013
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz, and Brent Waters
CRYPTO 2013
Attribute-Based Encryption for Circuits from Multilinear Maps
Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai, and Brent Waters
CRYPTO 2013
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
Susan Hohenberger, Amit Sahai, and Brent Waters
CRYPTO 2013
Witness Encryption and its Applications
Sanjam Garg, Craig Gentry, Amit Sahai, and Brent Waters
STOC 2013
Anon-Pass: Practical Anonymous Subscriptions
Michael Z. Lee, Alan M. Dunn, Brent Waters, Emmett Witchel, and Jonathan Katz
IEEE Symposium on Security and Privacy 2013
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
Karyn Benson, Hovav Shacham, and Brent Waters
CT-RSA 2013
Attribute-Based Encryption with Fast Decryption
Susan Hohenberger and Brent Waters
PKC 2013
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Jonathan Katz, Amit Sahai, and Brent Waters
Journal of Cryptology 2013
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles
Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, and Brent Waters
Journal of Cryptology 2013
Compact Proofs of Retrievability
Hovav Shacham and Brent Waters
Journal of Cryptology 2013
Reconstructing a fragmented face from a cryptographic identification protocol
Andy Luong, Michael Gerbush, Brent Waters, and Kristen Grauman
WACV 2013
2012
Dual Form Signatures: An Approach for Proving Security from Static Assumptions
Michael Gerbush, Allison B. Lewko, Adam O'Neill, and Brent Waters
ASIACRYPT 2012
Computing on Authenticated Data
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, and Brent Waters
TCC 2012
Bounded-Collusion IBE from Key Homomorphism
Shafi Goldwasser, Allison B. Lewko, and David A. Wilson
TCC 2012
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
Allison B. Lewko and Brent Waters
CRYPTO 2012
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
Amit Sahai, Hakan Seyalioglu, and Brent Waters
CRYPTO 2012
Functional Encryption for Regular Languages
Brent Waters
CRYPTO 2012
Identity-Based (Lossy) Trapdoor Functions and Applications
Mihir Bellare, Eike Kiltz, Chris Peikert, and Brent Waters
EUROCRYPT 2012
Standard Security Does Not Imply Security against Selective-Opening
Mihir Bellare, Rafael Dowsley, Brent Waters, and Scott Yilek
EUROCRYPT 2012
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
Susan Hohenberger, Allison B. Lewko, and Brent Waters
EUROCRYPT 2012
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
Allison B. Lewko
EUROCRYPT 2012
Property Preserving Symmetric Encryption
Omkant Pandey and Yannis Rouselakis
EUROCRYPT 2012
Targeted Malleability: Homomorphic Encryption for Restricted Computations
Dan Boneh, Gil Segev, and Brent Waters
ITCS 2012
Functional Encryption: A New Vision for Public-Key Cryptography
Dan Boneh, Amit Sahai, and Brent Waters
Communications of the ACM 2012
2011
Achieving Leakage Resilience through Dual System Encryption
Allison B. Lewko, Yannis Rouselakis, and Brent Waters
TCC 2011
Identity-Based Encryption Secure against Selective Opening Attack
Mihir Bellare, Brent Waters, and Scott Yilek
TCC 2011
Functional Encryption: Definitions and Challenges
Dan Boneh, Amit Sahai, and Brent Waters
TCC 2011
Storing Secrets on Continually Leaky Devices
Yevgeniy Dodis, Allison B. Lewko, Brent Waters, and Daniel Wichs
FOCS 2011
Bi-Deniable Public-Key Encryption
Adam O'Neill, Chris Peikert, and Brent Waters
CRYPTO 2011
Cloaking Malware with the Trusted Platform Module
Alan M. Dunn, Owen S. Hofmann, Brent Waters, and Emmett Witchel
USENIX Security Symposium 2011
Outsourcing the Decryption of ABE Ciphertexts
Matthew Green, Susan Hohenberger, and Brent Waters
USENIX Security Symposium 2011
How to Leak on Key Updates
Allison B. Lewko, Mark Lewko, and Brent Waters
STOC 2011
Unbounded HIBE and Attribute-Based Encryption
Allison B. Lewko and Brent Waters
EUROCRYPT 2011
Decentralizing Attribute-Based Encryption
Allison B. Lewko and Brent Waters
EUROCRYPT 2011
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
Brent Waters
PKC 2011
Lossy Trapdoor Functions and Their Applications
Chris Peikert and Brent Waters
SIAM Journal of Computing 2011
The Contest between Simplicity and Efficiency in Asynchronous Byzantine Agreement
Allison B. Lewko
DISC 2011
2010
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
Allison B. Lewko and Brent Waters
TCC 2010
Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai, and Brent Waters
ACM CCS 2010
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
Sherman S. M. Chow, Yevgeniy Dodis, Yannis Rouselakis, and Brent Waters
ACM CCS 2010
On the Insecurity of Parallel Repetition for Leakage Resilience
Allison B. Lewko and Brent Waters
FOCS 2010
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
Xavier Boyen and Brent Waters
ACNS 2010
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters
EUROCRYPT 2010
Constructing Verifiable Random Functions with Large Input Spaces
Susan Hohenberger and Brent Waters
EUROCRYPT 2010
Revocation Systems with Very Small Private Keys
Allison B. Lewko, Amit Sahai, and Brent Waters
IEEE Symposium on Security and Privacy 2010
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, and Emmett Witchel
NDSS 2010
2009
Predicate Privacy in Encryption Systems
Emily Shen, Elaine Shi, and Brent Waters
TCC 2009
Efficient Pseudorandom Functions from the Decisional Linear Assumption and Weaker Variants
Allison B. Lewko and Brent Waters
ACM CCS 2009
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
Brent Waters
CRYPTO 2009
Short and Stateless Signatures from the RSA Assumption
Susan Hohenberger and Brent Waters
CRYPTO 2009
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
Craig Gentry and Brent Waters
EUROCRYPT 2009
Realizing Hash-and-Sign Signatures under Standard Assumptions
Susan Hohenberger and Brent Waters
EUROCRYPT 2009
Signing a Linear Subspace: Signature Schemes for Network Coding
Dan Boneh, David Mandell Freeman, Jonathan Katz, and Brent Waters
PKC 2009