×
Compute Distance To:
Author ID: waters.brent Recent zbMATH articles by "Waters, Brent"
Published as: Waters, Brent
External Links: MGP

Publications by Year

Citations contained in zbMATH Open

101 Publications have been cited 3,210 times in 1,247 Documents Cited by Year
Efficient identity-based encryption without random oracles. Zbl 1137.94360
Waters, Brent
250
2005
Fuzzy identity-based encryption. Zbl 1137.94355
Sahai, Amit; Waters, Brent
228
2005
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
195
2016
Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. Zbl 1252.94101
Waters, Brent
147
2009
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. Zbl 1310.94148
Gentry, Craig; Sahai, Amit; Waters, Brent
139
2013
Functional encryption: definitions and challenges. Zbl 1295.94027
Boneh, Dan; Sahai, Amit; Waters, Brent
125
2011
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. Zbl 1279.94095
Lewko, Allison; Okamoto, Tatsuaki; Sahai, Amit; Takashima, Katsuyuki; Waters, Brent
122
2010
How to use indistinguishability obfuscation: deniable encryption, and more. Zbl 1315.94102
Sahai, Amit; Waters, Brent
112
2014
Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1149.94323
Katz, Jonathan; Sahai, Amit; Waters, Brent
101
2008
Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434
Boneh, Dan; Gentry, Craig; Waters, Brent
91
2005
Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Zbl 1291.94165
Waters, Brent
89
2011
A framework for efficient and composable oblivious transfer. Zbl 1183.94046
Peikert, Chris; Vaikuntanathan, Vinod; Waters, Brent
86
2008
New techniques for dual system encryption and fully secure HIBE with short ciphertexts. Zbl 1274.94092
Lewko, Allison; Waters, Brent
78
2010
Lossy trapdoor functions and their applications. Zbl 1228.94027
Peikert, Chris; Waters, Brent
77
2008
Conjunctive, subset, and range queries on encrypted data. Zbl 1156.94335
Boneh, Dan; Waters, Brent
74
2007
Constrained pseudorandom functions and their applications. Zbl 1314.94057
Boneh, Dan; Waters, Brent
62
2013
New proof methods for attribute-based encryption: achieving full security through selective techniques. Zbl 1296.94128
Lewko, Allison; Waters, Brent
46
2012
Witness encryption and its applications. Zbl 1293.94066
Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent
45
2013
Anonymous hierarchical identity-based encryption (without random oracles). Zbl 1161.94390
Boyen, Xavier; Waters, Brent
45
2006
Unbounded HIBE and attribute-based encryption. Zbl 1290.94105
Lewko, Allison; Waters, Brent
43
2011
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
41
2013
A punctured programming approach to adaptively secure functional encryption. Zbl 1351.94071
Waters, Brent
39
2015
Decentralizing attribute-based encryption. Zbl 1290.94106
Lewko, Allison; Waters, Brent
36
2011
Compact proofs of retrievability. Zbl 1206.68110
Shacham, Hovav; Waters, Brent
34
2008
Adaptive security in broadcast encryption systems (with short ciphertexts). Zbl 1239.94073
Gentry, Craig; Waters, Brent
33
2009
Fully collusion resistant traitor tracing with short ciphertexts and private keys. Zbl 1140.94326
Boneh, Dan; Sahai, Amit; Waters, Brent
33
2006
Short and stateless signatures from the RSA assumption. Zbl 1252.94074
Hohenberger, Susan; Waters, Brent
31
2009
Sequential aggregate signatures and multisignatures without random oracles. Zbl 1140.94358
Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent
30
2006
Signing a linear subspace: Signature schemes for network coding. Zbl 1227.68024
Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent
30
2009
Predicate privacy in encryption systems. Zbl 1213.94133
Shen, Emily; Shi, Elaine; Waters, Brent
28
2009
Compact group signatures without random oracles. Zbl 1140.94327
Boyen, Xavier; Waters, Brent
27
2006
Achieving leakage resilience through dual system encryption. Zbl 1291.94118
Lewko, Allison; Rouselakis, Yannis; Waters, Brent
26
2011
Functional encryption for regular languages. Zbl 1296.94143
Waters, Brent
26
2012
Indistinguishability obfuscation for Turing machines with unbounded memory. Zbl 1321.94069
Koppula, Venkata; Lewko, Allison Bishop; Waters, Brent
26
2015
Dynamic credentials and ciphertext delegation for attribute-based encryption. Zbl 1296.94139
Sahai, Amit; Seyalioglu, Hakan; Waters, Brent
24
2012
Replacing a random oracle: full domain hash from indistinguishability obfuscation. Zbl 1332.94068
Hohenberger, Susan; Sahai, Amit; Waters, Brent
23
2014
Full-domain subgroup hiding and constant-size group signatures. Zbl 1127.94020
Boyen, Xavier; Waters, Brent
21
2007
Efficient ring signatures without random oracles. Zbl 1127.94027
Shacham, Hovav; Waters, Brent
20
2007
Low overhead broadcast encryption from multilinear maps. Zbl 1317.94087
Boneh, Dan; Waters, Brent; Zhandry, Mark
20
2014
Lossy trapdoor functions and their applications. Zbl 1236.94063
Peikert, Chris; Waters, Brent
20
2011
Secure conjunctive keyword search over encrypted data. Zbl 1103.68514
Golle, Philippe; Staddon, Jessica; Waters, Brent
19
2004
Storing secrets on continually leaky devices. Zbl 1292.94055
Dodis, Yevgeniy; Lewko, Allison; Waters, Brent; Wichs, Daniel
18
2011
Standard security does not imply security against selective-opening. Zbl 1297.94046
Bellare, Mihir; Dowsley, Rafael; Waters, Brent; Yilek, Scott
18
2012
Realizing hash-and-sign signatures under standard assumptions. Zbl 1239.94075
Hohenberger, Susan; Waters, Brent
17
2009
Time-lock puzzles from randomized encodings. Zbl 1334.94062
Bitansky, Nir; Goldwasser, Shafi; Jain, Abhishek; Paneth, Omer; Vaikuntanathan, Vinod; Waters, Brent
17
2016
Strongly unforgeable signatures based on computational Diffie-Hellman. Zbl 1151.94485
Boneh, Dan; Shen, Emily; Waters, Brent
17
2006
Delegating capabilities in predicate encryption systems. Zbl 1155.94385
Shi, Elaine; Waters, Brent
17
2008
Witness encryption from instance independent assumptions. Zbl 1345.94064
Gentry, Craig; Lewko, Allison; Waters, Brent
17
2014
Computing on authenticated data. Zbl 1292.94017
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
17
2012
Bi-deniable public-key encryption. Zbl 1290.94113
O’Neill, Adam; Peikert, Chris; Waters, Brent
16
2011
Identity-based encryption secure against selective opening attack. Zbl 1295.94020
Bellare, Mihir; Waters, Brent; Yilek, Scott
16
2011
Attribute-based encryption with fast decryption. Zbl 1314.94074
Hohenberger, Susan; Waters, Brent
15
2013
Privacy in encrypted content distribution using private broadcast encryption. Zbl 1152.94402
Barth, Adam; Boneh, Dan; Waters, Brent
14
2006
How to generate and use universal samplers. Zbl 1407.94121
Hofheinz, Dennis; Jager, Tibor; Khurana, Dakshita; Sahai, Amit; Waters, Brent; Zhandry, Mark
14
2016
Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1279.94091
Katz, Jonathan; Sahai, Amit; Waters, Brent
14
2013
Targeted malleability: homomorphic encryption for restricted computations. Zbl 1347.68119
Boneh, Dan; Segev, Gil; Waters, Brent
12
2012
Identity-based (lossy) trapdoor functions and applications. Zbl 1297.94047
Bellare, Mihir; Kiltz, Eike; Peikert, Chris; Waters, Brent
12
2012
How to leak on key updates. Zbl 1288.94074
Lewko, Allison; Lewko, Mark; Waters, Brent
12
2011
Constructing verifiable random functions with large input spaces. Zbl 1280.94068
Hohenberger, Susan; Waters, Brent
10
2010
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. Zbl 1310.94151
Hohenberger, Susan; Sahai, Amit; Waters, Brent
10
2013
Semi-adaptive security and bundling functionalities made generic and easy. Zbl 1400.94145
Goyal, Rishab; Koppula, Venkata; Waters, Brent
9
2016
Dual form signatures: an approach for proving security from static assumptions. Zbl 1290.94149
Gerbush, Michael; Lewko, Allison; O’Neill, Adam; Waters, Brent
9
2012
Encoding functions with constant online rate or how to compress garbled circuits keys. Zbl 1298.94076
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
9
2013
On perfect correctness in (lockable) obfuscation. Zbl 1479.94321
Goyal, Rishab; Koppula, Venkata; Vusirikala, Satyanarayana; Waters, Brent
9
2020
Separations in circular security for arbitrary length key cycles. Zbl 1319.94074
Koppula, Venkata; Ramchen, Kim; Waters, Brent
9
2015
Detecting dangerous queries: a new approach for chosen ciphertext security. Zbl 1297.94077
Hohenberger, Susan; Lewko, Allison; Waters, Brent
8
2012
Collusion resistant traitor tracing from learning with errors. Zbl 1428.68087
Goyal, Rishab; Koppula, Venkata; Waters, Brent
8
2018
Efficient statically-secure large-universe multi-authority attribute-based encryption. Zbl 1415.94458
Rouselakis, Yannis; Waters, Brent
7
2015
Circular security separations for arbitrary length cycles from LWE. Zbl 1391.94770
Koppula, Venkata; Waters, Brent
7
2016
New circular security counterexamples from decision linear and learning with errors. Zbl 1382.94069
Bishop, Allison; Hohenberger, Susan; Waters, Brent
7
2015
New realizations of somewhere statistically binding hashing and positional accumulators. Zbl 1396.94093
Okamoto, Tatsuaki; Pietrzak, Krzysztof; Waters, Brent; Wichs, Daniel
7
2015
Why proving HIBE systems secure is difficult. Zbl 1326.94109
Lewko, Allison; Waters, Brent
7
2014
Adaptively secure puncturable pseudorandom functions in the standard model. Zbl 1396.94084
Hohenberger, Susan; Koppula, Venkata; Waters, Brent
6
2015
Online/Offline attribute-based encryption. Zbl 1335.94050
Hohenberger, Susan; Waters, Brent
6
2014
Shrinking the keys of discrete-log-type lossy trapdoor functions. Zbl 1315.94062
Boyen, Xavier; Waters, Brent
5
2010
A generic approach to constructing and proving verifiable random functions. Zbl 1412.94178
Goyal, Rishab; Hohenberger, Susan; Koppula, Venkata; Waters, Brent
5
2017
Constrained pseudorandom functions for unconstrained inputs. Zbl 1400.94140
Deshpande, Apoorvaa; Koppula, Venkata; Waters, Brent
5
2016
New negative results on differing-inputs obfuscation. Zbl 1371.94625
Bellare, Mihir; Stepanovs, Igors; Waters, Brent
5
2016
Universal signature aggregators. Zbl 1326.94127
Hohenberger, Susan; Koppula, Venkata; Waters, Brent
4
2015
Traitor-tracing from LWE made simple and attribute-based. Zbl 1430.94065
Chen, Yilei; Vaikuntanathan, Vinod; Waters, Brent; Wee, Hoeteck; Wichs, Daniel
4
2018
The \(k\)-BDH assumption family: bilinear map cryptography from progressively weaker assumptions. Zbl 1312.94033
Benson, Karyn; Shacham, Hovav; Waters, Brent
4
2013
Functional encryption: origins and recent developments. Zbl 1314.94096
Waters, Brent
4
2013
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles. Zbl 1279.94098
Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent
4
2013
Compact proofs of retrievability. Zbl 1323.68258
Shacham, Hovav; Waters, Brent
4
2013
Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption. Zbl 1415.94432
Goyal, Rishab; Koppula, Venkata; Waters, Brent
4
2017
Risky traitor tracing and new differential privacy negative results. Zbl 1444.94068
Goyal, Rishab; Koppula, Venkata; Russell, Andrew; Waters, Brent
3
2018
Deterministic public-key encryption under continual leakage. Zbl 1348.94063
Koppula, Venkata; Pandey, Omkant; Rouselakis, Yannis; Waters, Brent
3
2016
Black-box non-interactive non-malleable commitments. Zbl 07440637
Garg, Rachit; Khurana, Dakshita; Lu, George; Waters, Brent
3
2021
Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. Zbl 07178467
Koppula, Venkata; Waters, Brent
3
2019
Encoding functions with constant online rate, or how to compress garbled circuit keys. Zbl 1362.94016
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
2
2015
New approaches to traitor tracing with embedded identities. Zbl 1455.94159
Goyal, Rishab; Koppula, Venkata; Waters, Brent
2
2019
Watermarking public-key cryptographic primitives. Zbl 07178321
Goyal, Rishab; Kim, Sam; Manohar, Nathan; Waters, Brent; Wu, David J.
2
2019
ABE for DFA from \(k\)-lin. Zbl 07178469
Gong, Junqing; Waters, Brent; Wee, Hoeteck
2
2019
Computing on authenticated data. Zbl 1314.94100
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
2
2015
Impossibility of simulation secure functional encryption even with random oracles. Zbl 1443.94041
Agrawal, Shashank; Koppula, Venkata; Waters, Brent
1
2018
Synchronized aggregate signatures from the RSA assumption. Zbl 1423.94074
Hohenberger, Susan; Waters, Brent
1
2018
Output compression, MPC, and iO for Turing machines. Zbl 1483.68103
Badrinarayanan, Saikrishna; Fernando, Rex; Koppula, Venkata; Sahai, Amit; Waters, Brent
1
2019
Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Zbl 1169.94002
1
2009
Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions. Zbl 07178336
Goyal, Rishab; Quach, Willy; Waters, Brent; Wichs, Daniel
1
2019
Rethinking verifiably encrypted signatures: a gap in functionality and potential solutions. Zbl 1290.94146
Calderon, Theresa; Meiklejohn, Sarah; Shacham, Hovav; Waters, Brent
1
2014
Black-box non-interactive non-malleable commitments. Zbl 07440637
Garg, Rachit; Khurana, Dakshita; Lu, George; Waters, Brent
3
2021
How to use indistinguishability obfuscation: deniable encryption, and more. Zbl 07351517
Sahai, Amit; Waters, Brent
1
2021
On perfect correctness in (lockable) obfuscation. Zbl 1479.94321
Goyal, Rishab; Koppula, Venkata; Vusirikala, Satyanarayana; Waters, Brent
9
2020
Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. Zbl 07178467
Koppula, Venkata; Waters, Brent
3
2019
New approaches to traitor tracing with embedded identities. Zbl 1455.94159
Goyal, Rishab; Koppula, Venkata; Waters, Brent
2
2019
Watermarking public-key cryptographic primitives. Zbl 07178321
Goyal, Rishab; Kim, Sam; Manohar, Nathan; Waters, Brent; Wu, David J.
2
2019
ABE for DFA from \(k\)-lin. Zbl 07178469
Gong, Junqing; Waters, Brent; Wee, Hoeteck
2
2019
Output compression, MPC, and iO for Turing machines. Zbl 1483.68103
Badrinarayanan, Saikrishna; Fernando, Rex; Koppula, Venkata; Sahai, Amit; Waters, Brent
1
2019
Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions. Zbl 07178336
Goyal, Rishab; Quach, Willy; Waters, Brent; Wichs, Daniel
1
2019
Collusion resistant traitor tracing from learning with errors. Zbl 1428.68087
Goyal, Rishab; Koppula, Venkata; Waters, Brent
8
2018
Traitor-tracing from LWE made simple and attribute-based. Zbl 1430.94065
Chen, Yilei; Vaikuntanathan, Vinod; Waters, Brent; Wee, Hoeteck; Wichs, Daniel
4
2018
Risky traitor tracing and new differential privacy negative results. Zbl 1444.94068
Goyal, Rishab; Koppula, Venkata; Russell, Andrew; Waters, Brent
3
2018
Impossibility of simulation secure functional encryption even with random oracles. Zbl 1443.94041
Agrawal, Shashank; Koppula, Venkata; Waters, Brent
1
2018
Synchronized aggregate signatures from the RSA assumption. Zbl 1423.94074
Hohenberger, Susan; Waters, Brent
1
2018
A generic approach to constructing and proving verifiable random functions. Zbl 1412.94178
Goyal, Rishab; Hohenberger, Susan; Koppula, Venkata; Waters, Brent
5
2017
Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption. Zbl 1415.94432
Goyal, Rishab; Koppula, Venkata; Waters, Brent
4
2017
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
195
2016
Time-lock puzzles from randomized encodings. Zbl 1334.94062
Bitansky, Nir; Goldwasser, Shafi; Jain, Abhishek; Paneth, Omer; Vaikuntanathan, Vinod; Waters, Brent
17
2016
How to generate and use universal samplers. Zbl 1407.94121
Hofheinz, Dennis; Jager, Tibor; Khurana, Dakshita; Sahai, Amit; Waters, Brent; Zhandry, Mark
14
2016
Semi-adaptive security and bundling functionalities made generic and easy. Zbl 1400.94145
Goyal, Rishab; Koppula, Venkata; Waters, Brent
9
2016
Circular security separations for arbitrary length cycles from LWE. Zbl 1391.94770
Koppula, Venkata; Waters, Brent
7
2016
Constrained pseudorandom functions for unconstrained inputs. Zbl 1400.94140
Deshpande, Apoorvaa; Koppula, Venkata; Waters, Brent
5
2016
New negative results on differing-inputs obfuscation. Zbl 1371.94625
Bellare, Mihir; Stepanovs, Igors; Waters, Brent
5
2016
Deterministic public-key encryption under continual leakage. Zbl 1348.94063
Koppula, Venkata; Pandey, Omkant; Rouselakis, Yannis; Waters, Brent
3
2016
A punctured programming approach to adaptively secure functional encryption. Zbl 1351.94071
Waters, Brent
39
2015
Indistinguishability obfuscation for Turing machines with unbounded memory. Zbl 1321.94069
Koppula, Venkata; Lewko, Allison Bishop; Waters, Brent
26
2015
Separations in circular security for arbitrary length key cycles. Zbl 1319.94074
Koppula, Venkata; Ramchen, Kim; Waters, Brent
9
2015
Efficient statically-secure large-universe multi-authority attribute-based encryption. Zbl 1415.94458
Rouselakis, Yannis; Waters, Brent
7
2015
New circular security counterexamples from decision linear and learning with errors. Zbl 1382.94069
Bishop, Allison; Hohenberger, Susan; Waters, Brent
7
2015
New realizations of somewhere statistically binding hashing and positional accumulators. Zbl 1396.94093
Okamoto, Tatsuaki; Pietrzak, Krzysztof; Waters, Brent; Wichs, Daniel
7
2015
Adaptively secure puncturable pseudorandom functions in the standard model. Zbl 1396.94084
Hohenberger, Susan; Koppula, Venkata; Waters, Brent
6
2015
Universal signature aggregators. Zbl 1326.94127
Hohenberger, Susan; Koppula, Venkata; Waters, Brent
4
2015
Encoding functions with constant online rate, or how to compress garbled circuit keys. Zbl 1362.94016
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
2
2015
Computing on authenticated data. Zbl 1314.94100
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
2
2015
How to use indistinguishability obfuscation: deniable encryption, and more. Zbl 1315.94102
Sahai, Amit; Waters, Brent
112
2014
Replacing a random oracle: full domain hash from indistinguishability obfuscation. Zbl 1332.94068
Hohenberger, Susan; Sahai, Amit; Waters, Brent
23
2014
Low overhead broadcast encryption from multilinear maps. Zbl 1317.94087
Boneh, Dan; Waters, Brent; Zhandry, Mark
20
2014
Witness encryption from instance independent assumptions. Zbl 1345.94064
Gentry, Craig; Lewko, Allison; Waters, Brent
17
2014
Why proving HIBE systems secure is difficult. Zbl 1326.94109
Lewko, Allison; Waters, Brent
7
2014
Online/Offline attribute-based encryption. Zbl 1335.94050
Hohenberger, Susan; Waters, Brent
6
2014
Rethinking verifiably encrypted signatures: a gap in functionality and potential solutions. Zbl 1290.94146
Calderon, Theresa; Meiklejohn, Sarah; Shacham, Hovav; Waters, Brent
1
2014
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. Zbl 1310.94148
Gentry, Craig; Sahai, Amit; Waters, Brent
139
2013
Constrained pseudorandom functions and their applications. Zbl 1314.94057
Boneh, Dan; Waters, Brent
62
2013
Witness encryption and its applications. Zbl 1293.94066
Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent
45
2013
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
41
2013
Attribute-based encryption with fast decryption. Zbl 1314.94074
Hohenberger, Susan; Waters, Brent
15
2013
Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1279.94091
Katz, Jonathan; Sahai, Amit; Waters, Brent
14
2013
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. Zbl 1310.94151
Hohenberger, Susan; Sahai, Amit; Waters, Brent
10
2013
Encoding functions with constant online rate or how to compress garbled circuits keys. Zbl 1298.94076
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
9
2013
The \(k\)-BDH assumption family: bilinear map cryptography from progressively weaker assumptions. Zbl 1312.94033
Benson, Karyn; Shacham, Hovav; Waters, Brent
4
2013
Functional encryption: origins and recent developments. Zbl 1314.94096
Waters, Brent
4
2013
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles. Zbl 1279.94098
Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent
4
2013
Compact proofs of retrievability. Zbl 1323.68258
Shacham, Hovav; Waters, Brent
4
2013
New proof methods for attribute-based encryption: achieving full security through selective techniques. Zbl 1296.94128
Lewko, Allison; Waters, Brent
46
2012
Functional encryption for regular languages. Zbl 1296.94143
Waters, Brent
26
2012
Dynamic credentials and ciphertext delegation for attribute-based encryption. Zbl 1296.94139
Sahai, Amit; Seyalioglu, Hakan; Waters, Brent
24
2012
Standard security does not imply security against selective-opening. Zbl 1297.94046
Bellare, Mihir; Dowsley, Rafael; Waters, Brent; Yilek, Scott
18
2012
Computing on authenticated data. Zbl 1292.94017
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
17
2012
Targeted malleability: homomorphic encryption for restricted computations. Zbl 1347.68119
Boneh, Dan; Segev, Gil; Waters, Brent
12
2012
Identity-based (lossy) trapdoor functions and applications. Zbl 1297.94047
Bellare, Mihir; Kiltz, Eike; Peikert, Chris; Waters, Brent
12
2012
Dual form signatures: an approach for proving security from static assumptions. Zbl 1290.94149
Gerbush, Michael; Lewko, Allison; O’Neill, Adam; Waters, Brent
9
2012
Detecting dangerous queries: a new approach for chosen ciphertext security. Zbl 1297.94077
Hohenberger, Susan; Lewko, Allison; Waters, Brent
8
2012
Functional encryption: definitions and challenges. Zbl 1295.94027
Boneh, Dan; Sahai, Amit; Waters, Brent
125
2011
Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Zbl 1291.94165
Waters, Brent
89
2011
Unbounded HIBE and attribute-based encryption. Zbl 1290.94105
Lewko, Allison; Waters, Brent
43
2011
Decentralizing attribute-based encryption. Zbl 1290.94106
Lewko, Allison; Waters, Brent
36
2011
Achieving leakage resilience through dual system encryption. Zbl 1291.94118
Lewko, Allison; Rouselakis, Yannis; Waters, Brent
26
2011
Lossy trapdoor functions and their applications. Zbl 1236.94063
Peikert, Chris; Waters, Brent
20
2011
Storing secrets on continually leaky devices. Zbl 1292.94055
Dodis, Yevgeniy; Lewko, Allison; Waters, Brent; Wichs, Daniel
18
2011
Bi-deniable public-key encryption. Zbl 1290.94113
O’Neill, Adam; Peikert, Chris; Waters, Brent
16
2011
Identity-based encryption secure against selective opening attack. Zbl 1295.94020
Bellare, Mihir; Waters, Brent; Yilek, Scott
16
2011
How to leak on key updates. Zbl 1288.94074
Lewko, Allison; Lewko, Mark; Waters, Brent
12
2011
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. Zbl 1279.94095
Lewko, Allison; Okamoto, Tatsuaki; Sahai, Amit; Takashima, Katsuyuki; Waters, Brent
122
2010
New techniques for dual system encryption and fully secure HIBE with short ciphertexts. Zbl 1274.94092
Lewko, Allison; Waters, Brent
78
2010
Constructing verifiable random functions with large input spaces. Zbl 1280.94068
Hohenberger, Susan; Waters, Brent
10
2010
Shrinking the keys of discrete-log-type lossy trapdoor functions. Zbl 1315.94062
Boyen, Xavier; Waters, Brent
5
2010
Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. Zbl 1252.94101
Waters, Brent
147
2009
Adaptive security in broadcast encryption systems (with short ciphertexts). Zbl 1239.94073
Gentry, Craig; Waters, Brent
33
2009
Short and stateless signatures from the RSA assumption. Zbl 1252.94074
Hohenberger, Susan; Waters, Brent
31
2009
Signing a linear subspace: Signature schemes for network coding. Zbl 1227.68024
Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent
30
2009
Predicate privacy in encryption systems. Zbl 1213.94133
Shen, Emily; Shi, Elaine; Waters, Brent
28
2009
Realizing hash-and-sign signatures under standard assumptions. Zbl 1239.94075
Hohenberger, Susan; Waters, Brent
17
2009
Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Zbl 1169.94002
1
2009
Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1149.94323
Katz, Jonathan; Sahai, Amit; Waters, Brent
101
2008
A framework for efficient and composable oblivious transfer. Zbl 1183.94046
Peikert, Chris; Vaikuntanathan, Vinod; Waters, Brent
86
2008
Lossy trapdoor functions and their applications. Zbl 1228.94027
Peikert, Chris; Waters, Brent
77
2008
Compact proofs of retrievability. Zbl 1206.68110
Shacham, Hovav; Waters, Brent
34
2008
Delegating capabilities in predicate encryption systems. Zbl 1155.94385
Shi, Elaine; Waters, Brent
17
2008
Conjunctive, subset, and range queries on encrypted data. Zbl 1156.94335
Boneh, Dan; Waters, Brent
74
2007
Full-domain subgroup hiding and constant-size group signatures. Zbl 1127.94020
Boyen, Xavier; Waters, Brent
21
2007
Efficient ring signatures without random oracles. Zbl 1127.94027
Shacham, Hovav; Waters, Brent
20
2007
Anonymous hierarchical identity-based encryption (without random oracles). Zbl 1161.94390
Boyen, Xavier; Waters, Brent
45
2006
Fully collusion resistant traitor tracing with short ciphertexts and private keys. Zbl 1140.94326
Boneh, Dan; Sahai, Amit; Waters, Brent
33
2006
Sequential aggregate signatures and multisignatures without random oracles. Zbl 1140.94358
Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent
30
2006
Compact group signatures without random oracles. Zbl 1140.94327
Boyen, Xavier; Waters, Brent
27
2006
Strongly unforgeable signatures based on computational Diffie-Hellman. Zbl 1151.94485
Boneh, Dan; Shen, Emily; Waters, Brent
17
2006
Privacy in encrypted content distribution using private broadcast encryption. Zbl 1152.94402
Barth, Adam; Boneh, Dan; Waters, Brent
14
2006
Efficient identity-based encryption without random oracles. Zbl 1137.94360
Waters, Brent
250
2005
Fuzzy identity-based encryption. Zbl 1137.94355
Sahai, Amit; Waters, Brent
228
2005
Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434
Boneh, Dan; Gentry, Craig; Waters, Brent
91
2005
...and 1 more Documents
all top 5

Cited by 1,748 Authors

42 Susilo, Willy
38 Mu, Yi
32 Waters, Brent
26 Libert, Benoît
25 Hanaoka, Goichiro
24 Zhandry, Mark
22 Sahai, Amit
22 Wee, Hoeteck
20 Brakerski, Zvika
20 Segev, Gil
19 Guo, Fuchun
19 Hofheinz, Dennis
19 Wichs, Daniel
18 Vaikuntanathan, Vinod
16 Garg, Sanjam
16 Kiltz, Eike
16 Liu, Shengli
15 Au, Man Ho
15 Weng, Jian
14 Bitansky, Nir
14 Cao, Zhenfu
14 Chen, Jie
14 Emura, Keita
14 Lee, Kwangsu
14 Matsuda, Takahiro
14 Pointcheval, David
14 Tanaka, Keisuke
14 Wang, Huaxiong
14 Yamada, Shota
14 Yung, Moti
13 Abdalla, Michel
13 Ananth, Prabhanjan Vijendra
13 Chen, Kefei
13 Deng, Robert Huijie
13 Ishai, Yuval
13 Komargodski, Ilan
13 Seo, Jae Hong
13 Yang, Bo
12 Canetti, Ran
12 Fiore, Dario
12 Jager, Tibor
12 Li, Jin
12 Nishimaki, Ryo
12 Venturi, Daniele
12 Yang, Guomin
11 Catalano, Dario
11 Herranz, Javier
11 Khurana, Dakshita
11 Lai, Junzuo
11 Li, Jiguo
11 Lin, Huijia
11 Ling, San
11 Nielsen, Jesper Buus
11 Watanabe, Yodai
11 Wu, Qianhong
10 Applebaum, Benny
10 Benhamouda, Fabrice
10 Boneh, Dan
10 Farshim, Pooya
10 Liu, Joseph K. K.
10 Park, Jonghwan
10 Pass, Rafael
10 Qin, Baodong
10 Rosen, Alon
10 Srinivasan, Akshayaram
9 Attrapadung, Nuttapong
9 Bellare, Mihir
9 Dutta, Ratna
9 Fuchsbauer, Georg
9 Hazay, Carmit
9 Hohenberger, Susan
9 Hu, Yupu
9 Pandey, Omkant
9 Wong, Duncan S.
9 Zhang, Fangguo
9 Zhang, Mingwu
8 Chen, Yu
8 Cheon, Jung Hee
8 Gentry, Craig
8 Gong, Junqing
8 Gu, Dawu
8 Halevi, Shai
8 Huang, Qiong
8 Huang, Xinyi
8 Huang, Zhengan
8 Jain, Aayush
8 Jain, Abhishek
8 Koppula, Venkata
8 Liang, Kaitai
8 Long, Yu
8 O’Neill, Adam
8 Peikert, Chris
8 Phan Duong Hieu
8 Yamakawa, Takashi
8 Yu, Jia
7 Cash, David M.
7 Chen, Rongmao
7 Chen, Xiaofeng
7 Damgård, Ivan Bjerre
7 Lai, Jianchang
...and 1,648 more Authors
all top 5

Cited in 67 Serials

112 Journal of Cryptology
98 Information Sciences
84 Theoretical Computer Science
73 Designs, Codes and Cryptography
25 Soft Computing
18 SIAM Journal on Computing
13 Information Processing Letters
12 Journal of Computer and System Sciences
12 International Journal of Foundations of Computer Science
12 Journal of Mathematical Cryptology
11 Mathematical Problems in Engineering
8 Algorithmica
8 Journal of Shanghai Jiaotong University (Science)
8 Science China. Information Sciences
7 Frontiers of Computer Science
6 Applicable Algebra in Engineering, Communication and Computing
5 Information and Computation
5 International Journal of Computer Mathematics
5 Advances in Mathematics of Communications
4 Computers & Mathematics with Applications
4 Wuhan University Journal of Natural Sciences (WUJNS)
3 International Journal of Theoretical Physics
3 Journal of Computer Science and Technology
3 Mathematical and Computer Modelling
3 Journal of Applied Mathematics
3 Science in China. Series F
3 Symmetry
3 Computer Science Review
2 IEEE Transactions on Information Theory
2 Mathematics of Computation
2 Applied Mathematics and Computation
2 Computational Complexity
2 Finite Fields and their Applications
2 Journal of Discrete Mathematical Sciences & Cryptography
2 Journal of Systems Science and Complexity
2 RAIRO. Theoretical Informatics and Applications
1 Acta Informatica
1 Chaos, Solitons and Fractals
1 Computing
1 Journal of Computational and Applied Mathematics
1 Journal of Number Theory
1 Moscow University Computational Mathematics and Cybernetics
1 SIAM Journal on Discrete Mathematics
1 Formal Aspects of Computing
1 Japan Journal of Industrial and Applied Mathematics
1 Journal of Statistical Computation and Simulation
1 Bulletin of the American Mathematical Society. New Series
1 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
1 Cybernetics and Systems Analysis
1 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti
1 Journal of Mathematical Sciences (New York)
1 Theory of Computing Systems
1 LMS Journal of Computation and Mathematics
1 International Journal of Applied Mathematics and Computer Science
1 JP Journal of Algebra, Number Theory and Applications
1 Quantum Information Processing
1 ACM Transactions on Information and System Security (TISSEC)
1 Journal of Discrete Algorithms
1 Mediterranean Journal of Mathematics
1 Mathematical Biosciences and Engineering
1 Journal of Zhejiang University. Science A
1 Cryptography and Communications
1 Science China. Mathematics
1 Afrika Matematika
1 Arabian Journal for Science and Engineering
1 Mathematical Foundations of Computing
1 Matematicheskie Voprosy Kriptografii

Citations by Year