×

zbMATH — the first resource for mathematics

Waters, Brent

Compute Distance To:
Author ID: waters.brent Recent zbMATH articles by "Waters, Brent"
Published as: Waters, Brent
External Links: MGP
Documents Indexed: 106 Publications since 2004, including 1 Book

Publications by Year

Citations contained in zbMATH

89 Publications have been cited 2,486 times in 968 Documents Cited by Year
Efficient identity-based encryption without random oracles. Zbl 1137.94360
Waters, Brent
219
2005
Fuzzy identity-based encryption. Zbl 1137.94355
Sahai, Amit; Waters, Brent
175
2005
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
139
2016
Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. Zbl 1252.94101
Waters, Brent
117
2009
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. Zbl 1279.94095
Lewko, Allison; Okamoto, Tatsuaki; Sahai, Amit; Takashima, Katsuyuki; Waters, Brent
105
2010
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. Zbl 1310.94148
Gentry, Craig; Sahai, Amit; Waters, Brent
101
2013
Functional encryption: definitions and challenges. Zbl 1295.94027
Boneh, Dan; Sahai, Amit; Waters, Brent
87
2011
How to use indistinguishability obfuscation: deniable encryption, and more. Zbl 1315.94102
Sahai, Amit; Waters, Brent
81
2014
Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434
Boneh, Dan; Gentry, Craig; Waters, Brent
81
2005
Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1149.94323
Katz, Jonathan; Sahai, Amit; Waters, Brent
77
2008
Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Zbl 1291.94165
Waters, Brent
73
2011
New techniques for dual system encryption and fully secure HIBE with short ciphertexts. Zbl 1274.94092
Lewko, Allison; Waters, Brent
64
2010
Conjunctive, subset, and range queries on encrypted data. Zbl 1156.94335
Boneh, Dan; Waters, Brent
64
2007
Lossy trapdoor functions and their applications. Zbl 1228.94027
Peikert, Chris; Waters, Brent
58
2008
A framework for efficient and composable oblivious transfer. Zbl 1183.94046
Peikert, Chris; Vaikuntanathan, Vinod; Waters, Brent
56
2008
Constrained pseudorandom functions and their applications. Zbl 1314.94057
Boneh, Dan; Waters, Brent
47
2013
Anonymous hierarchical identity-based encryption (without random oracles). Zbl 1161.94390
Boyen, Xavier; Waters, Brent
41
2006
New proof methods for attribute-based encryption: achieving full security through selective techniques. Zbl 1296.94128
Lewko, Allison; Waters, Brent
37
2012
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
35
2013
Unbounded HIBE and attribute-based encryption. Zbl 1290.94105
Lewko, Allison; Waters, Brent
33
2011
A punctured programming approach to adaptively secure functional encryption. Zbl 1351.94071
Waters, Brent
32
2015
Compact proofs of retrievability. Zbl 1206.68110
Shacham, Hovav; Waters, Brent
30
2008
Adaptive security in broadcast encryption systems (with short ciphertexts). Zbl 1239.94073
Gentry, Craig; Waters, Brent
29
2009
Witness encryption and its applications. Zbl 1293.94066
Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent
28
2013
Decentralizing attribute-based encryption. Zbl 1290.94106
Lewko, Allison; Waters, Brent
28
2011
Predicate privacy in encryption systems. Zbl 1213.94133
Shen, Emily; Shi, Elaine; Waters, Brent
25
2009
Fully collusion resistant traitor tracing with short ciphertexts and private keys. Zbl 1140.94326
Boneh, Dan; Sahai, Amit; Waters, Brent
25
2006
Compact group signatures without random oracles. Zbl 1140.94327
Boyen, Xavier; Waters, Brent
25
2006
Achieving leakage resilience through dual system encryption. Zbl 1291.94118
Lewko, Allison; Rouselakis, Yannis; Waters, Brent
24
2011
Short and stateless signatures from the RSA assumption. Zbl 1252.94074
Hohenberger, Susan; Waters, Brent
24
2009
Signing a linear subspace: Signature schemes for network coding. Zbl 1227.68024
Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent
24
2009
Sequential aggregate signatures and multisignatures without random oracles. Zbl 1140.94358
Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent
22
2006
Functional encryption for regular languages. Zbl 1296.94143
Waters, Brent
21
2012
Full-domain subgroup hiding and constant-size group signatures. Zbl 1127.94020
Boyen, Xavier; Waters, Brent
21
2007
Dynamic credentials and ciphertext delegation for attribute-based encryption. Zbl 1296.94139
Sahai, Amit; Seyalioglu, Hakan; Waters, Brent
19
2012
Secure conjunctive keyword search over encrypted data. Zbl 1103.68514
Golle, Philippe; Staddon, Jessica; Waters, Brent
18
2004
Replacing a random oracle: full domain hash from indistinguishability obfuscation. Zbl 1332.94068
Hohenberger, Susan; Sahai, Amit; Waters, Brent
17
2014
Storing secrets on continually leaky devices. Zbl 1292.94055
Dodis, Yevgeniy; Lewko, Allison; Waters, Brent; Wichs, Daniel
17
2011
Efficient ring signatures without random oracles. Zbl 1127.94027
Shacham, Hovav; Waters, Brent
17
2007
Indistinguishability obfuscation for Turing machines with unbounded memory. Zbl 1321.94069
Koppula, Venkata; Lewko, Allison Bishop; Waters, Brent
16
2015
Lossy trapdoor functions and their applications. Zbl 1236.94063
Peikert, Chris; Waters, Brent
16
2011
Strongly unforgeable signatures based on computational Diffie-Hellman. Zbl 1151.94485
Boneh, Dan; Shen, Emily; Waters, Brent
16
2006
Low overhead broadcast encryption from multilinear maps. Zbl 1317.94087
Boneh, Dan; Waters, Brent; Zhandry, Mark
15
2014
Attribute-based encryption with fast decryption. Zbl 1314.94074
Hohenberger, Susan; Waters, Brent
15
2013
Realizing hash-and-sign signatures under standard assumptions. Zbl 1239.94075
Hohenberger, Susan; Waters, Brent
15
2009
Delegating capabilities in predicate encryption systems. Zbl 1155.94385
Shi, Elaine; Waters, Brent
15
2008
Computing on authenticated data. Zbl 1292.94017
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
14
2012
Identity-based encryption secure against selective opening attack. Zbl 1295.94020
Bellare, Mihir; Waters, Brent; Yilek, Scott
13
2011
Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1279.94091
Katz, Jonathan; Sahai, Amit; Waters, Brent
12
2013
Standard security does not imply security against selective-opening. Zbl 1297.94046
Bellare, Mihir; Dowsley, Rafael; Waters, Brent; Yilek, Scott
12
2012
Privacy in encrypted content distribution using private broadcast encryption. Zbl 1152.94402
Barth, Adam; Boneh, Dan; Waters, Brent
12
2006
How to generate and use universal samplers. Zbl 1407.94121
Hofheinz, Dennis; Jager, Tibor; Khurana, Dakshita; Sahai, Amit; Waters, Brent; Zhandry, Mark
11
2016
Witness encryption from instance independent assumptions. Zbl 1345.94064
Gentry, Craig; Lewko, Allison; Waters, Brent
11
2014
Bi-deniable public-key encryption. Zbl 1290.94113
O’Neill, Adam; Peikert, Chris; Waters, Brent
10
2011
Time-lock puzzles from randomized encodings. Zbl 1334.94062
Bitansky, Nir; Goldwasser, Shafi; Jain, Abhishek; Paneth, Omer; Vaikuntanathan, Vinod; Waters, Brent
9
2016
Targeted malleability: homomorphic encryption for restricted computations. Zbl 1347.68119
Boneh, Dan; Segev, Gil; Waters, Brent
9
2012
How to leak on key updates. Zbl 1288.94074
Lewko, Allison; Lewko, Mark; Waters, Brent
9
2011
Separations in circular security for arbitrary length key cycles. Zbl 1319.94074
Koppula, Venkata; Ramchen, Kim; Waters, Brent
8
2015
Encoding functions with constant online rate or how to compress garbled circuits keys. Zbl 1298.94076
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
7
2013
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. Zbl 1310.94151
Hohenberger, Susan; Sahai, Amit; Waters, Brent
7
2013
Identity-based (lossy) trapdoor functions and applications. Zbl 1297.94047
Bellare, Mihir; Kiltz, Eike; Peikert, Chris; Waters, Brent
7
2012
Circular security separations for arbitrary length cycles from LWE. Zbl 1391.94770
Koppula, Venkata; Waters, Brent
6
2016
Adaptively secure puncturable pseudorandom functions in the standard model. Zbl 1396.94084
Hohenberger, Susan; Koppula, Venkata; Waters, Brent
6
2015
New circular security counterexamples from decision linear and learning with errors. Zbl 1382.94069
Bishop, Allison; Hohenberger, Susan; Waters, Brent
6
2015
Online/Offline attribute-based encryption. Zbl 1335.94050
Hohenberger, Susan; Waters, Brent
6
2014
Detecting dangerous queries: a new approach for chosen ciphertext security. Zbl 1297.94077
Hohenberger, Susan; Lewko, Allison; Waters, Brent
6
2012
Constructing verifiable random functions with large input spaces. Zbl 1280.94068
Hohenberger, Susan; Waters, Brent
6
2010
Constrained pseudorandom functions for unconstrained inputs. Zbl 1400.94140
Deshpande, Apoorvaa; Koppula, Venkata; Waters, Brent
4
2016
Compact proofs of retrievability. Zbl 1323.68258
Shacham, Hovav; Waters, Brent
4
2013
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles. Zbl 1279.94098
Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent
4
2013
The \(k\)-BDH assumption family: bilinear map cryptography from progressively weaker assumptions. Zbl 1312.94033
Benson, Karyn; Shacham, Hovav; Waters, Brent
4
2013
Dual form signatures: an approach for proving security from static assumptions. Zbl 1290.94149
Gerbush, Michael; Lewko, Allison; O’Neill, Adam; Waters, Brent
4
2012
Shrinking the keys of discrete-log-type lossy trapdoor functions. Zbl 1315.94062
Boyen, Xavier; Waters, Brent
4
2010
Deterministic public-key encryption under continual leakage. Zbl 1348.94063
Koppula, Venkata; Pandey, Omkant; Rouselakis, Yannis; Waters, Brent
3
2016
New negative results on differing-inputs obfuscation. Zbl 1371.94625
Bellare, Mihir; Stepanovs, Igors; Waters, Brent
3
2016
New realizations of somewhere statistically binding hashing and positional accumulators. Zbl 1396.94093
Okamoto, Tatsuaki; Pietrzak, Krzysztof; Waters, Brent; Wichs, Daniel
3
2015
Efficient statically-secure large-universe multi-authority attribute-based encryption. Zbl 1415.94458
Rouselakis, Yannis; Waters, Brent
3
2015
Functional encryption: origins and recent developments. Zbl 1314.94096
Waters, Brent
3
2013
Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption. Zbl 1415.94432
Goyal, Rishab; Koppula, Venkata; Waters, Brent
2
2017
Semi-adaptive security and bundling functionalities made generic and easy. Zbl 1400.94145
Goyal, Rishab; Koppula, Venkata; Waters, Brent
2
2016
Encoding functions with constant online rate, or how to compress garbled circuit keys. Zbl 1362.94016
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
2
2015
Universal signature aggregators. Zbl 1326.94127
Hohenberger, Susan; Koppula, Venkata; Waters, Brent
2
2015
Why proving HIBE systems secure is difficult. Zbl 1326.94109
Lewko, Allison; Waters, Brent
2
2014
Collusion resistant traitor tracing from learning with errors. Zbl 1428.68087
Goyal, Rishab; Koppula, Venkata; Waters, Brent
1
2018
Traitor-tracing from LWE made simple and attribute-based. Zbl 1430.94065
Chen, Yilei; Vaikuntanathan, Vinod; Waters, Brent; Wee, Hoeteck; Wichs, Daniel
1
2018
Risky traitor tracing and new differential privacy negative results. Zbl 1444.94068
Goyal, Rishab; Koppula, Venkata; Russell, Andrew; Waters, Brent
1
2018
A generic approach to constructing and proving verifiable random functions. Zbl 1412.94178
Goyal, Rishab; Hohenberger, Susan; Koppula, Venkata; Waters, Brent
1
2017
Computing on authenticated data. Zbl 1314.94100
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
1
2015
Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Zbl 1169.94002
Shacham, Hovav (ed.); Waters, Brent (ed.)
1
2009
Collusion resistant traitor tracing from learning with errors. Zbl 1428.68087
Goyal, Rishab; Koppula, Venkata; Waters, Brent
1
2018
Traitor-tracing from LWE made simple and attribute-based. Zbl 1430.94065
Chen, Yilei; Vaikuntanathan, Vinod; Waters, Brent; Wee, Hoeteck; Wichs, Daniel
1
2018
Risky traitor tracing and new differential privacy negative results. Zbl 1444.94068
Goyal, Rishab; Koppula, Venkata; Russell, Andrew; Waters, Brent
1
2018
Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption. Zbl 1415.94432
Goyal, Rishab; Koppula, Venkata; Waters, Brent
2
2017
A generic approach to constructing and proving verifiable random functions. Zbl 1412.94178
Goyal, Rishab; Hohenberger, Susan; Koppula, Venkata; Waters, Brent
1
2017
Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent
139
2016
How to generate and use universal samplers. Zbl 1407.94121
Hofheinz, Dennis; Jager, Tibor; Khurana, Dakshita; Sahai, Amit; Waters, Brent; Zhandry, Mark
11
2016
Time-lock puzzles from randomized encodings. Zbl 1334.94062
Bitansky, Nir; Goldwasser, Shafi; Jain, Abhishek; Paneth, Omer; Vaikuntanathan, Vinod; Waters, Brent
9
2016
Circular security separations for arbitrary length cycles from LWE. Zbl 1391.94770
Koppula, Venkata; Waters, Brent
6
2016
Constrained pseudorandom functions for unconstrained inputs. Zbl 1400.94140
Deshpande, Apoorvaa; Koppula, Venkata; Waters, Brent
4
2016
Deterministic public-key encryption under continual leakage. Zbl 1348.94063
Koppula, Venkata; Pandey, Omkant; Rouselakis, Yannis; Waters, Brent
3
2016
New negative results on differing-inputs obfuscation. Zbl 1371.94625
Bellare, Mihir; Stepanovs, Igors; Waters, Brent
3
2016
Semi-adaptive security and bundling functionalities made generic and easy. Zbl 1400.94145
Goyal, Rishab; Koppula, Venkata; Waters, Brent
2
2016
A punctured programming approach to adaptively secure functional encryption. Zbl 1351.94071
Waters, Brent
32
2015
Indistinguishability obfuscation for Turing machines with unbounded memory. Zbl 1321.94069
Koppula, Venkata; Lewko, Allison Bishop; Waters, Brent
16
2015
Separations in circular security for arbitrary length key cycles. Zbl 1319.94074
Koppula, Venkata; Ramchen, Kim; Waters, Brent
8
2015
Adaptively secure puncturable pseudorandom functions in the standard model. Zbl 1396.94084
Hohenberger, Susan; Koppula, Venkata; Waters, Brent
6
2015
New circular security counterexamples from decision linear and learning with errors. Zbl 1382.94069
Bishop, Allison; Hohenberger, Susan; Waters, Brent
6
2015
New realizations of somewhere statistically binding hashing and positional accumulators. Zbl 1396.94093
Okamoto, Tatsuaki; Pietrzak, Krzysztof; Waters, Brent; Wichs, Daniel
3
2015
Efficient statically-secure large-universe multi-authority attribute-based encryption. Zbl 1415.94458
Rouselakis, Yannis; Waters, Brent
3
2015
Encoding functions with constant online rate, or how to compress garbled circuit keys. Zbl 1362.94016
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
2
2015
Universal signature aggregators. Zbl 1326.94127
Hohenberger, Susan; Koppula, Venkata; Waters, Brent
2
2015
Computing on authenticated data. Zbl 1314.94100
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
1
2015
How to use indistinguishability obfuscation: deniable encryption, and more. Zbl 1315.94102
Sahai, Amit; Waters, Brent
81
2014
Replacing a random oracle: full domain hash from indistinguishability obfuscation. Zbl 1332.94068
Hohenberger, Susan; Sahai, Amit; Waters, Brent
17
2014
Low overhead broadcast encryption from multilinear maps. Zbl 1317.94087
Boneh, Dan; Waters, Brent; Zhandry, Mark
15
2014
Witness encryption from instance independent assumptions. Zbl 1345.94064
Gentry, Craig; Lewko, Allison; Waters, Brent
11
2014
Online/Offline attribute-based encryption. Zbl 1335.94050
Hohenberger, Susan; Waters, Brent
6
2014
Why proving HIBE systems secure is difficult. Zbl 1326.94109
Lewko, Allison; Waters, Brent
2
2014
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. Zbl 1310.94148
Gentry, Craig; Sahai, Amit; Waters, Brent
101
2013
Constrained pseudorandom functions and their applications. Zbl 1314.94057
Boneh, Dan; Waters, Brent
47
2013
Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent
35
2013
Witness encryption and its applications. Zbl 1293.94066
Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent
28
2013
Attribute-based encryption with fast decryption. Zbl 1314.94074
Hohenberger, Susan; Waters, Brent
15
2013
Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1279.94091
Katz, Jonathan; Sahai, Amit; Waters, Brent
12
2013
Encoding functions with constant online rate or how to compress garbled circuits keys. Zbl 1298.94076
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent
7
2013
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. Zbl 1310.94151
Hohenberger, Susan; Sahai, Amit; Waters, Brent
7
2013
Compact proofs of retrievability. Zbl 1323.68258
Shacham, Hovav; Waters, Brent
4
2013
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles. Zbl 1279.94098
Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent
4
2013
The \(k\)-BDH assumption family: bilinear map cryptography from progressively weaker assumptions. Zbl 1312.94033
Benson, Karyn; Shacham, Hovav; Waters, Brent
4
2013
Functional encryption: origins and recent developments. Zbl 1314.94096
Waters, Brent
3
2013
New proof methods for attribute-based encryption: achieving full security through selective techniques. Zbl 1296.94128
Lewko, Allison; Waters, Brent
37
2012
Functional encryption for regular languages. Zbl 1296.94143
Waters, Brent
21
2012
Dynamic credentials and ciphertext delegation for attribute-based encryption. Zbl 1296.94139
Sahai, Amit; Seyalioglu, Hakan; Waters, Brent
19
2012
Computing on authenticated data. Zbl 1292.94017
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent
14
2012
Standard security does not imply security against selective-opening. Zbl 1297.94046
Bellare, Mihir; Dowsley, Rafael; Waters, Brent; Yilek, Scott
12
2012
Targeted malleability: homomorphic encryption for restricted computations. Zbl 1347.68119
Boneh, Dan; Segev, Gil; Waters, Brent
9
2012
Identity-based (lossy) trapdoor functions and applications. Zbl 1297.94047
Bellare, Mihir; Kiltz, Eike; Peikert, Chris; Waters, Brent
7
2012
Detecting dangerous queries: a new approach for chosen ciphertext security. Zbl 1297.94077
Hohenberger, Susan; Lewko, Allison; Waters, Brent
6
2012
Dual form signatures: an approach for proving security from static assumptions. Zbl 1290.94149
Gerbush, Michael; Lewko, Allison; O’Neill, Adam; Waters, Brent
4
2012
Functional encryption: definitions and challenges. Zbl 1295.94027
Boneh, Dan; Sahai, Amit; Waters, Brent
87
2011
Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Zbl 1291.94165
Waters, Brent
73
2011
Unbounded HIBE and attribute-based encryption. Zbl 1290.94105
Lewko, Allison; Waters, Brent
33
2011
Decentralizing attribute-based encryption. Zbl 1290.94106
Lewko, Allison; Waters, Brent
28
2011
Achieving leakage resilience through dual system encryption. Zbl 1291.94118
Lewko, Allison; Rouselakis, Yannis; Waters, Brent
24
2011
Storing secrets on continually leaky devices. Zbl 1292.94055
Dodis, Yevgeniy; Lewko, Allison; Waters, Brent; Wichs, Daniel
17
2011
Lossy trapdoor functions and their applications. Zbl 1236.94063
Peikert, Chris; Waters, Brent
16
2011
Identity-based encryption secure against selective opening attack. Zbl 1295.94020
Bellare, Mihir; Waters, Brent; Yilek, Scott
13
2011
Bi-deniable public-key encryption. Zbl 1290.94113
O’Neill, Adam; Peikert, Chris; Waters, Brent
10
2011
How to leak on key updates. Zbl 1288.94074
Lewko, Allison; Lewko, Mark; Waters, Brent
9
2011
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. Zbl 1279.94095
Lewko, Allison; Okamoto, Tatsuaki; Sahai, Amit; Takashima, Katsuyuki; Waters, Brent
105
2010
New techniques for dual system encryption and fully secure HIBE with short ciphertexts. Zbl 1274.94092
Lewko, Allison; Waters, Brent
64
2010
Constructing verifiable random functions with large input spaces. Zbl 1280.94068
Hohenberger, Susan; Waters, Brent
6
2010
Shrinking the keys of discrete-log-type lossy trapdoor functions. Zbl 1315.94062
Boyen, Xavier; Waters, Brent
4
2010
Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. Zbl 1252.94101
Waters, Brent
117
2009
Adaptive security in broadcast encryption systems (with short ciphertexts). Zbl 1239.94073
Gentry, Craig; Waters, Brent
29
2009
Predicate privacy in encryption systems. Zbl 1213.94133
Shen, Emily; Shi, Elaine; Waters, Brent
25
2009
Short and stateless signatures from the RSA assumption. Zbl 1252.94074
Hohenberger, Susan; Waters, Brent
24
2009
Signing a linear subspace: Signature schemes for network coding. Zbl 1227.68024
Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent
24
2009
Realizing hash-and-sign signatures under standard assumptions. Zbl 1239.94075
Hohenberger, Susan; Waters, Brent
15
2009
Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Zbl 1169.94002
Shacham, Hovav (ed.); Waters, Brent (ed.)
1
2009
Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1149.94323
Katz, Jonathan; Sahai, Amit; Waters, Brent
77
2008
Lossy trapdoor functions and their applications. Zbl 1228.94027
Peikert, Chris; Waters, Brent
58
2008
A framework for efficient and composable oblivious transfer. Zbl 1183.94046
Peikert, Chris; Vaikuntanathan, Vinod; Waters, Brent
56
2008
Compact proofs of retrievability. Zbl 1206.68110
Shacham, Hovav; Waters, Brent
30
2008
Delegating capabilities in predicate encryption systems. Zbl 1155.94385
Shi, Elaine; Waters, Brent
15
2008
Conjunctive, subset, and range queries on encrypted data. Zbl 1156.94335
Boneh, Dan; Waters, Brent
64
2007
Full-domain subgroup hiding and constant-size group signatures. Zbl 1127.94020
Boyen, Xavier; Waters, Brent
21
2007
Efficient ring signatures without random oracles. Zbl 1127.94027
Shacham, Hovav; Waters, Brent
17
2007
Anonymous hierarchical identity-based encryption (without random oracles). Zbl 1161.94390
Boyen, Xavier; Waters, Brent
41
2006
Fully collusion resistant traitor tracing with short ciphertexts and private keys. Zbl 1140.94326
Boneh, Dan; Sahai, Amit; Waters, Brent
25
2006
Compact group signatures without random oracles. Zbl 1140.94327
Boyen, Xavier; Waters, Brent
25
2006
Sequential aggregate signatures and multisignatures without random oracles. Zbl 1140.94358
Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent
22
2006
Strongly unforgeable signatures based on computational Diffie-Hellman. Zbl 1151.94485
Boneh, Dan; Shen, Emily; Waters, Brent
16
2006
Privacy in encrypted content distribution using private broadcast encryption. Zbl 1152.94402
Barth, Adam; Boneh, Dan; Waters, Brent
12
2006
Efficient identity-based encryption without random oracles. Zbl 1137.94360
Waters, Brent
219
2005
Fuzzy identity-based encryption. Zbl 1137.94355
Sahai, Amit; Waters, Brent
175
2005
Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434
Boneh, Dan; Gentry, Craig; Waters, Brent
81
2005
Secure conjunctive keyword search over encrypted data. Zbl 1103.68514
Golle, Philippe; Staddon, Jessica; Waters, Brent
18
2004
all top 5

Cited by 1,500 Authors

36 Mu, Yi
36 Susilo, Willy
21 Waters, Brent
19 Hanaoka, Goichiro
18 Guo, Fuchun
18 Libert, Benoît
18 Sahai, Amit
17 Hofheinz, Dennis
17 Segev, Gil
15 Au, Man Ho
15 Brakerski, Zvika
15 Kiltz, Eike
15 Vaikuntanathan, Vinod
15 Wee, Hoeteck
15 Zhandry, Mark
14 Weng, Jian
13 Cao, Zhenfu
13 Liu, Shengli
13 Wichs, Daniel
12 Abdalla, Michel
12 Bitansky, Nir
12 Deng, Robert Huijie
12 Yang, Bo
11 Chen, Jie
11 Chen, Kefei
11 Garg, Sanjam
11 Herranz, Javier
11 Lee, Kwangsu
11 Seo, Jae Hong
11 Wu, Qianhong
11 Yang, Guomin
11 Yung, Moti
10 Boneh, Dan
10 Canetti, Ran
10 Catalano, Dario
10 Lai, Junzuo
10 Li, Jiguo
10 Li, Jin
10 Park, Jonghwan
10 Wang, Huaxiong
10 Yamada, Shota
9 Ananth, Prabhanjan Vijendra
9 Bellare, Mihir
9 Fuchsbauer, Georg
9 Komargodski, Ilan
9 Lee, Donghoon
9 Liu, Joseph K. K.
9 Nielsen, Jesper Buus
9 Pointcheval, David
9 Venturi, Daniele
8 Attrapadung, Nuttapong
8 Dutta, Ratna
8 Emura, Keita
8 Farshim, Pooya
8 Fiore, Dario
8 Hazay, Carmit
8 Hu, Yupu
8 Huang, Qiong
8 Ishai, Yuval
8 Ling, San
8 Long, Yu
8 Pass, Rafael
8 Peikert, Chris
8 Qin, Baodong
8 Wong, Duncan S.
8 Zhang, Fangguo
8 Zhang, Mingwu
7 Chen, Xiaofeng
7 Chen, Yu
7 Gentry, Craig
7 Huang, Xinyi
7 Jager, Tibor
7 Koppula, Venkata
7 Li, Bao
7 Liang, Kaitai
7 Lu, Xianhui
7 Matsuda, Takahiro
7 Pandey, Omkant
7 Watanabe, Yodai
7 Yu, Jia
6 Abe, Masayuki
6 Applebaum, Benny
6 Benhamouda, Fabrice
6 Cheon, Jung Hee
6 Cui, Hui
6 Faonio, Antonio
6 Gu, Dawu
6 Halevi, Shai
6 Hohenberger, Susan
6 Lai, Jianchang
6 Lin, Huijia
6 Liu, JianWei
6 Lu, Yang
6 O’Neill, Adam
6 Ostrovsky, Rafail
6 Qin, Bo
6 Ràfols, Carla
6 Rosen, Alon
6 Rothblum, Guy N.
6 Shao, Jun
...and 1,400 more Authors
all top 5

Cited in 60 Serials

95 Journal of Cryptology
89 Information Sciences
68 Theoretical Computer Science
58 Designs, Codes and Cryptography
25 Soft Computing
15 SIAM Journal on Computing
13 Information Processing Letters
11 Journal of Computer and System Sciences
10 International Journal of Foundations of Computer Science
10 Mathematical Problems in Engineering
8 Algorithmica
8 Journal of Shanghai Jiaotong University (Science)
8 Journal of Mathematical Cryptology
7 Science China. Information Sciences
7 Frontiers of Computer Science
6 Applicable Algebra in Engineering, Communication and Computing
5 International Journal of Computer Mathematics
4 Computers & Mathematics with Applications
4 Wuhan University Journal of Natural Sciences (WUJNS)
3 Journal of Computer Science and Technology
3 Information and Computation
3 Mathematical and Computer Modelling
3 Journal of Applied Mathematics
3 Advances in Mathematics of Communications
3 Symmetry
2 International Journal of Theoretical Physics
2 Mathematics of Computation
2 Applied Mathematics and Computation
2 Computational Complexity
2 Finite Fields and their Applications
2 Journal of Systems Science and Complexity
2 Science in China. Series F
2 RAIRO. Theoretical Informatics and Applications
2 Computer Science Review
1 Acta Informatica
1 Discrete Applied Mathematics
1 Chaos, Solitons and Fractals
1 Journal of Computational and Applied Mathematics
1 Journal of Number Theory
1 Moscow University Computational Mathematics and Cybernetics
1 SIAM Journal on Discrete Mathematics
1 Formal Aspects of Computing
1 Japan Journal of Industrial and Applied Mathematics
1 Journal of Statistical Computation and Simulation
1 Bulletin of the American Mathematical Society. New Series
1 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
1 Cybernetics and Systems Analysis
1 Journal of Mathematical Sciences (New York)
1 Theory of Computing Systems
1 Journal of Discrete Mathematical Sciences & Cryptography
1 LMS Journal of Computation and Mathematics
1 International Journal of Applied Mathematics and Computer Science
1 JP Journal of Algebra, Number Theory and Applications
1 Quantum Information Processing
1 Journal of Discrete Algorithms
1 Journal of Zhejiang University. Science A
1 Cryptography and Communications
1 Science China. Mathematics
1 Afrika Matematika
1 Arabian Journal for Science and Engineering

Citations by Year