Edit Profile (opens in new tab) Waters, Brent Compute Distance To: Compute Author ID: waters.brent Published as: Waters, Brent External Links: MGP Documents Indexed: 113 Publications since 2004 4 Contributions as Editor Co-Authors: 78 Co-Authors with 110 Joint Publications 1,265 Co-Co-Authors all top 5 Co-Authors 6 single-authored 21 Koppula, Venkata 21 Sahai, Amit 16 Hohenberger, Susan 12 Boneh, Dan 12 Goyal, Rishab 8 Lewko, Allison 8 Shacham, Hovav 7 Gentry, Craig 5 Peikert, Chris 5 Wichs, Daniel 4 Bellare, Mihir 4 Boyen, Xavier 4 Khurana, Dakshita 3 Garg, Sanjam 3 Katz, Jonathan N. 3 Lu, Steve 3 Nissim, Kobbi 3 Rouselakis, Yannis 3 Vaikuntanathan, Vinod 2 Ahn, Jaehyun 2 Applebaum, Benny 2 Badrinarayanan, Saikrishna 2 Camenisch, Jan L. 2 Garg, Rachit 2 Halevi, Shai 2 Hofheinz, Dennis 2 Ishai, Yuval 2 Kushilevitz, Eyal 2 Lu, George Jingfeng 2 Okamoto, Tatsuaki 2 O’Neill, Adam 2 Ostrovsky, Rafail 2 Pandey, Omkant 2 Quach, Willy 2 Ramchen, Kim 2 Shelat, Abhi 2 Shen, Emily S. 2 Shi, Elaine 2 Vusirikala, Satyanarayana 2 Wee, Hoeteck 2 Yilek, Scott 2 Zhandry, Mark 1 Agrawal, Shashank 1 Barth, Adam 1 Benson, Karyn 1 Bishop, Allison 1 Bitansky, Nir 1 Calderon, Theresa 1 Chen, Yilei 1 Datta, Pratish 1 Deshpande, Apoorvaa 1 Dodis, Yevgeniy 1 Dowsley, Rafael 1 Fernando, Rex 1 Freeman, David Mandell 1 Gerbush, Michael 1 Goldwasser, Shafi 1 Golle, Philippe 1 Gong, Junqing 1 Jager, Tibor 1 Jain, Abhishek 1 Kamath, Akshay 1 Kiltz, Eike 1 Komargodski, Ilan 1 Lewko, Allison Bishop 1 Lewko, Mark 1 Manohar, Nathan 1 Meiklejohn, Sarah 1 Paneth, Omer 1 Pietrzak, Krzysztof 1 Poelstra, Andrew 1 Raykova, Mariana 1 Segev, Gil 1 Seyalioglu, Hakan Ali-John 1 Staddon, Jessica N. 1 Stepanovs, Igors 1 Takashima, Katsuyuki 1 Wu, David J. Serials 5 SIAM Journal on Computing 4 Journal of Cryptology 4 Lecture Notes in Computer Science Fields 115 Information and communication theory, circuits (94-XX) 30 Computer science (68-XX) 4 General and overarching topics; collections (00-XX) 1 Combinatorics (05-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 101 Publications have been cited 3,210 times in 1,247 Documents Cited by ▼ Year ▼ Efficient identity-based encryption without random oracles. Zbl 1137.94360Waters, Brent 250 2005 Fuzzy identity-based encryption. Zbl 1137.94355Sahai, Amit; Waters, Brent 228 2005 Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent 195 2016 Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. Zbl 1252.94101Waters, Brent 147 2009 Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. Zbl 1310.94148Gentry, Craig; Sahai, Amit; Waters, Brent 139 2013 Functional encryption: definitions and challenges. Zbl 1295.94027Boneh, Dan; Sahai, Amit; Waters, Brent 125 2011 Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. Zbl 1279.94095Lewko, Allison; Okamoto, Tatsuaki; Sahai, Amit; Takashima, Katsuyuki; Waters, Brent 122 2010 How to use indistinguishability obfuscation: deniable encryption, and more. Zbl 1315.94102Sahai, Amit; Waters, Brent 112 2014 Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1149.94323Katz, Jonathan; Sahai, Amit; Waters, Brent 101 2008 Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434Boneh, Dan; Gentry, Craig; Waters, Brent 91 2005 Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Zbl 1291.94165Waters, Brent 89 2011 A framework for efficient and composable oblivious transfer. Zbl 1183.94046Peikert, Chris; Vaikuntanathan, Vinod; Waters, Brent 86 2008 New techniques for dual system encryption and fully secure HIBE with short ciphertexts. Zbl 1274.94092Lewko, Allison; Waters, Brent 78 2010 Lossy trapdoor functions and their applications. Zbl 1228.94027Peikert, Chris; Waters, Brent 77 2008 Conjunctive, subset, and range queries on encrypted data. Zbl 1156.94335Boneh, Dan; Waters, Brent 74 2007 Constrained pseudorandom functions and their applications. Zbl 1314.94057Boneh, Dan; Waters, Brent 62 2013 New proof methods for attribute-based encryption: achieving full security through selective techniques. Zbl 1296.94128Lewko, Allison; Waters, Brent 46 2012 Witness encryption and its applications. Zbl 1293.94066Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent 45 2013 Anonymous hierarchical identity-based encryption (without random oracles). Zbl 1161.94390Boyen, Xavier; Waters, Brent 45 2006 Unbounded HIBE and attribute-based encryption. Zbl 1290.94105Lewko, Allison; Waters, Brent 43 2011 Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent 41 2013 A punctured programming approach to adaptively secure functional encryption. Zbl 1351.94071Waters, Brent 39 2015 Decentralizing attribute-based encryption. Zbl 1290.94106Lewko, Allison; Waters, Brent 36 2011 Compact proofs of retrievability. Zbl 1206.68110Shacham, Hovav; Waters, Brent 34 2008 Adaptive security in broadcast encryption systems (with short ciphertexts). Zbl 1239.94073Gentry, Craig; Waters, Brent 33 2009 Fully collusion resistant traitor tracing with short ciphertexts and private keys. Zbl 1140.94326Boneh, Dan; Sahai, Amit; Waters, Brent 33 2006 Short and stateless signatures from the RSA assumption. Zbl 1252.94074Hohenberger, Susan; Waters, Brent 31 2009 Sequential aggregate signatures and multisignatures without random oracles. Zbl 1140.94358Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent 30 2006 Signing a linear subspace: Signature schemes for network coding. Zbl 1227.68024Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent 30 2009 Predicate privacy in encryption systems. Zbl 1213.94133Shen, Emily; Shi, Elaine; Waters, Brent 28 2009 Compact group signatures without random oracles. Zbl 1140.94327Boyen, Xavier; Waters, Brent 27 2006 Achieving leakage resilience through dual system encryption. Zbl 1291.94118Lewko, Allison; Rouselakis, Yannis; Waters, Brent 26 2011 Functional encryption for regular languages. Zbl 1296.94143Waters, Brent 26 2012 Indistinguishability obfuscation for Turing machines with unbounded memory. Zbl 1321.94069Koppula, Venkata; Lewko, Allison Bishop; Waters, Brent 26 2015 Dynamic credentials and ciphertext delegation for attribute-based encryption. Zbl 1296.94139Sahai, Amit; Seyalioglu, Hakan; Waters, Brent 24 2012 Replacing a random oracle: full domain hash from indistinguishability obfuscation. Zbl 1332.94068Hohenberger, Susan; Sahai, Amit; Waters, Brent 23 2014 Full-domain subgroup hiding and constant-size group signatures. Zbl 1127.94020Boyen, Xavier; Waters, Brent 21 2007 Efficient ring signatures without random oracles. Zbl 1127.94027Shacham, Hovav; Waters, Brent 20 2007 Low overhead broadcast encryption from multilinear maps. Zbl 1317.94087Boneh, Dan; Waters, Brent; Zhandry, Mark 20 2014 Lossy trapdoor functions and their applications. Zbl 1236.94063Peikert, Chris; Waters, Brent 20 2011 Secure conjunctive keyword search over encrypted data. Zbl 1103.68514Golle, Philippe; Staddon, Jessica; Waters, Brent 19 2004 Storing secrets on continually leaky devices. Zbl 1292.94055Dodis, Yevgeniy; Lewko, Allison; Waters, Brent; Wichs, Daniel 18 2011 Standard security does not imply security against selective-opening. Zbl 1297.94046Bellare, Mihir; Dowsley, Rafael; Waters, Brent; Yilek, Scott 18 2012 Realizing hash-and-sign signatures under standard assumptions. Zbl 1239.94075Hohenberger, Susan; Waters, Brent 17 2009 Time-lock puzzles from randomized encodings. Zbl 1334.94062Bitansky, Nir; Goldwasser, Shafi; Jain, Abhishek; Paneth, Omer; Vaikuntanathan, Vinod; Waters, Brent 17 2016 Strongly unforgeable signatures based on computational Diffie-Hellman. Zbl 1151.94485Boneh, Dan; Shen, Emily; Waters, Brent 17 2006 Delegating capabilities in predicate encryption systems. Zbl 1155.94385Shi, Elaine; Waters, Brent 17 2008 Witness encryption from instance independent assumptions. Zbl 1345.94064Gentry, Craig; Lewko, Allison; Waters, Brent 17 2014 Computing on authenticated data. Zbl 1292.94017Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent 17 2012 Bi-deniable public-key encryption. Zbl 1290.94113O’Neill, Adam; Peikert, Chris; Waters, Brent 16 2011 Identity-based encryption secure against selective opening attack. Zbl 1295.94020Bellare, Mihir; Waters, Brent; Yilek, Scott 16 2011 Attribute-based encryption with fast decryption. Zbl 1314.94074Hohenberger, Susan; Waters, Brent 15 2013 Privacy in encrypted content distribution using private broadcast encryption. Zbl 1152.94402Barth, Adam; Boneh, Dan; Waters, Brent 14 2006 How to generate and use universal samplers. Zbl 1407.94121Hofheinz, Dennis; Jager, Tibor; Khurana, Dakshita; Sahai, Amit; Waters, Brent; Zhandry, Mark 14 2016 Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1279.94091Katz, Jonathan; Sahai, Amit; Waters, Brent 14 2013 Targeted malleability: homomorphic encryption for restricted computations. Zbl 1347.68119Boneh, Dan; Segev, Gil; Waters, Brent 12 2012 Identity-based (lossy) trapdoor functions and applications. Zbl 1297.94047Bellare, Mihir; Kiltz, Eike; Peikert, Chris; Waters, Brent 12 2012 How to leak on key updates. Zbl 1288.94074Lewko, Allison; Lewko, Mark; Waters, Brent 12 2011 Constructing verifiable random functions with large input spaces. Zbl 1280.94068Hohenberger, Susan; Waters, Brent 10 2010 Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. Zbl 1310.94151Hohenberger, Susan; Sahai, Amit; Waters, Brent 10 2013 Semi-adaptive security and bundling functionalities made generic and easy. Zbl 1400.94145Goyal, Rishab; Koppula, Venkata; Waters, Brent 9 2016 Dual form signatures: an approach for proving security from static assumptions. Zbl 1290.94149Gerbush, Michael; Lewko, Allison; O’Neill, Adam; Waters, Brent 9 2012 Encoding functions with constant online rate or how to compress garbled circuits keys. Zbl 1298.94076Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent 9 2013 On perfect correctness in (lockable) obfuscation. Zbl 1479.94321Goyal, Rishab; Koppula, Venkata; Vusirikala, Satyanarayana; Waters, Brent 9 2020 Separations in circular security for arbitrary length key cycles. Zbl 1319.94074Koppula, Venkata; Ramchen, Kim; Waters, Brent 9 2015 Detecting dangerous queries: a new approach for chosen ciphertext security. Zbl 1297.94077Hohenberger, Susan; Lewko, Allison; Waters, Brent 8 2012 Collusion resistant traitor tracing from learning with errors. Zbl 1428.68087Goyal, Rishab; Koppula, Venkata; Waters, Brent 8 2018 Efficient statically-secure large-universe multi-authority attribute-based encryption. Zbl 1415.94458Rouselakis, Yannis; Waters, Brent 7 2015 Circular security separations for arbitrary length cycles from LWE. Zbl 1391.94770Koppula, Venkata; Waters, Brent 7 2016 New circular security counterexamples from decision linear and learning with errors. Zbl 1382.94069Bishop, Allison; Hohenberger, Susan; Waters, Brent 7 2015 New realizations of somewhere statistically binding hashing and positional accumulators. Zbl 1396.94093Okamoto, Tatsuaki; Pietrzak, Krzysztof; Waters, Brent; Wichs, Daniel 7 2015 Why proving HIBE systems secure is difficult. Zbl 1326.94109Lewko, Allison; Waters, Brent 7 2014 Adaptively secure puncturable pseudorandom functions in the standard model. Zbl 1396.94084Hohenberger, Susan; Koppula, Venkata; Waters, Brent 6 2015 Online/Offline attribute-based encryption. Zbl 1335.94050Hohenberger, Susan; Waters, Brent 6 2014 Shrinking the keys of discrete-log-type lossy trapdoor functions. Zbl 1315.94062Boyen, Xavier; Waters, Brent 5 2010 A generic approach to constructing and proving verifiable random functions. Zbl 1412.94178Goyal, Rishab; Hohenberger, Susan; Koppula, Venkata; Waters, Brent 5 2017 Constrained pseudorandom functions for unconstrained inputs. Zbl 1400.94140Deshpande, Apoorvaa; Koppula, Venkata; Waters, Brent 5 2016 New negative results on differing-inputs obfuscation. Zbl 1371.94625Bellare, Mihir; Stepanovs, Igors; Waters, Brent 5 2016 Universal signature aggregators. Zbl 1326.94127Hohenberger, Susan; Koppula, Venkata; Waters, Brent 4 2015 Traitor-tracing from LWE made simple and attribute-based. Zbl 1430.94065Chen, Yilei; Vaikuntanathan, Vinod; Waters, Brent; Wee, Hoeteck; Wichs, Daniel 4 2018 The \(k\)-BDH assumption family: bilinear map cryptography from progressively weaker assumptions. Zbl 1312.94033Benson, Karyn; Shacham, Hovav; Waters, Brent 4 2013 Functional encryption: origins and recent developments. Zbl 1314.94096Waters, Brent 4 2013 Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles. Zbl 1279.94098Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent 4 2013 Compact proofs of retrievability. Zbl 1323.68258Shacham, Hovav; Waters, Brent 4 2013 Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption. Zbl 1415.94432Goyal, Rishab; Koppula, Venkata; Waters, Brent 4 2017 Risky traitor tracing and new differential privacy negative results. Zbl 1444.94068Goyal, Rishab; Koppula, Venkata; Russell, Andrew; Waters, Brent 3 2018 Deterministic public-key encryption under continual leakage. Zbl 1348.94063Koppula, Venkata; Pandey, Omkant; Rouselakis, Yannis; Waters, Brent 3 2016 Black-box non-interactive non-malleable commitments. Zbl 07440637Garg, Rachit; Khurana, Dakshita; Lu, George; Waters, Brent 3 2021 Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. Zbl 07178467Koppula, Venkata; Waters, Brent 3 2019 Encoding functions with constant online rate, or how to compress garbled circuit keys. Zbl 1362.94016Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent 2 2015 New approaches to traitor tracing with embedded identities. Zbl 1455.94159Goyal, Rishab; Koppula, Venkata; Waters, Brent 2 2019 Watermarking public-key cryptographic primitives. Zbl 07178321Goyal, Rishab; Kim, Sam; Manohar, Nathan; Waters, Brent; Wu, David J. 2 2019 ABE for DFA from \(k\)-lin. Zbl 07178469Gong, Junqing; Waters, Brent; Wee, Hoeteck 2 2019 Computing on authenticated data. Zbl 1314.94100Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent 2 2015 Impossibility of simulation secure functional encryption even with random oracles. Zbl 1443.94041Agrawal, Shashank; Koppula, Venkata; Waters, Brent 1 2018 Synchronized aggregate signatures from the RSA assumption. Zbl 1423.94074Hohenberger, Susan; Waters, Brent 1 2018 Output compression, MPC, and iO for Turing machines. Zbl 1483.68103Badrinarayanan, Saikrishna; Fernando, Rex; Koppula, Venkata; Sahai, Amit; Waters, Brent 1 2019 Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Zbl 1169.94002 1 2009 Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions. Zbl 07178336Goyal, Rishab; Quach, Willy; Waters, Brent; Wichs, Daniel 1 2019 Rethinking verifiably encrypted signatures: a gap in functionality and potential solutions. Zbl 1290.94146Calderon, Theresa; Meiklejohn, Sarah; Shacham, Hovav; Waters, Brent 1 2014 Black-box non-interactive non-malleable commitments. Zbl 07440637Garg, Rachit; Khurana, Dakshita; Lu, George; Waters, Brent 3 2021 How to use indistinguishability obfuscation: deniable encryption, and more. Zbl 07351517Sahai, Amit; Waters, Brent 1 2021 On perfect correctness in (lockable) obfuscation. Zbl 1479.94321Goyal, Rishab; Koppula, Venkata; Vusirikala, Satyanarayana; Waters, Brent 9 2020 Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. Zbl 07178467Koppula, Venkata; Waters, Brent 3 2019 New approaches to traitor tracing with embedded identities. Zbl 1455.94159Goyal, Rishab; Koppula, Venkata; Waters, Brent 2 2019 Watermarking public-key cryptographic primitives. Zbl 07178321Goyal, Rishab; Kim, Sam; Manohar, Nathan; Waters, Brent; Wu, David J. 2 2019 ABE for DFA from \(k\)-lin. Zbl 07178469Gong, Junqing; Waters, Brent; Wee, Hoeteck 2 2019 Output compression, MPC, and iO for Turing machines. Zbl 1483.68103Badrinarayanan, Saikrishna; Fernando, Rex; Koppula, Venkata; Sahai, Amit; Waters, Brent 1 2019 Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions. Zbl 07178336Goyal, Rishab; Quach, Willy; Waters, Brent; Wichs, Daniel 1 2019 Collusion resistant traitor tracing from learning with errors. Zbl 1428.68087Goyal, Rishab; Koppula, Venkata; Waters, Brent 8 2018 Traitor-tracing from LWE made simple and attribute-based. Zbl 1430.94065Chen, Yilei; Vaikuntanathan, Vinod; Waters, Brent; Wee, Hoeteck; Wichs, Daniel 4 2018 Risky traitor tracing and new differential privacy negative results. Zbl 1444.94068Goyal, Rishab; Koppula, Venkata; Russell, Andrew; Waters, Brent 3 2018 Impossibility of simulation secure functional encryption even with random oracles. Zbl 1443.94041Agrawal, Shashank; Koppula, Venkata; Waters, Brent 1 2018 Synchronized aggregate signatures from the RSA assumption. Zbl 1423.94074Hohenberger, Susan; Waters, Brent 1 2018 A generic approach to constructing and proving verifiable random functions. Zbl 1412.94178Goyal, Rishab; Hohenberger, Susan; Koppula, Venkata; Waters, Brent 5 2017 Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption. Zbl 1415.94432Goyal, Rishab; Koppula, Venkata; Waters, Brent 4 2017 Candidate indistinguishability obfuscation and functional encryption for all circuits. Zbl 1348.94048Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent 195 2016 Time-lock puzzles from randomized encodings. Zbl 1334.94062Bitansky, Nir; Goldwasser, Shafi; Jain, Abhishek; Paneth, Omer; Vaikuntanathan, Vinod; Waters, Brent 17 2016 How to generate and use universal samplers. Zbl 1407.94121Hofheinz, Dennis; Jager, Tibor; Khurana, Dakshita; Sahai, Amit; Waters, Brent; Zhandry, Mark 14 2016 Semi-adaptive security and bundling functionalities made generic and easy. Zbl 1400.94145Goyal, Rishab; Koppula, Venkata; Waters, Brent 9 2016 Circular security separations for arbitrary length cycles from LWE. Zbl 1391.94770Koppula, Venkata; Waters, Brent 7 2016 Constrained pseudorandom functions for unconstrained inputs. Zbl 1400.94140Deshpande, Apoorvaa; Koppula, Venkata; Waters, Brent 5 2016 New negative results on differing-inputs obfuscation. Zbl 1371.94625Bellare, Mihir; Stepanovs, Igors; Waters, Brent 5 2016 Deterministic public-key encryption under continual leakage. Zbl 1348.94063Koppula, Venkata; Pandey, Omkant; Rouselakis, Yannis; Waters, Brent 3 2016 A punctured programming approach to adaptively secure functional encryption. Zbl 1351.94071Waters, Brent 39 2015 Indistinguishability obfuscation for Turing machines with unbounded memory. Zbl 1321.94069Koppula, Venkata; Lewko, Allison Bishop; Waters, Brent 26 2015 Separations in circular security for arbitrary length key cycles. Zbl 1319.94074Koppula, Venkata; Ramchen, Kim; Waters, Brent 9 2015 Efficient statically-secure large-universe multi-authority attribute-based encryption. Zbl 1415.94458Rouselakis, Yannis; Waters, Brent 7 2015 New circular security counterexamples from decision linear and learning with errors. Zbl 1382.94069Bishop, Allison; Hohenberger, Susan; Waters, Brent 7 2015 New realizations of somewhere statistically binding hashing and positional accumulators. Zbl 1396.94093Okamoto, Tatsuaki; Pietrzak, Krzysztof; Waters, Brent; Wichs, Daniel 7 2015 Adaptively secure puncturable pseudorandom functions in the standard model. Zbl 1396.94084Hohenberger, Susan; Koppula, Venkata; Waters, Brent 6 2015 Universal signature aggregators. Zbl 1326.94127Hohenberger, Susan; Koppula, Venkata; Waters, Brent 4 2015 Encoding functions with constant online rate, or how to compress garbled circuit keys. Zbl 1362.94016Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent 2 2015 Computing on authenticated data. Zbl 1314.94100Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent 2 2015 How to use indistinguishability obfuscation: deniable encryption, and more. Zbl 1315.94102Sahai, Amit; Waters, Brent 112 2014 Replacing a random oracle: full domain hash from indistinguishability obfuscation. Zbl 1332.94068Hohenberger, Susan; Sahai, Amit; Waters, Brent 23 2014 Low overhead broadcast encryption from multilinear maps. Zbl 1317.94087Boneh, Dan; Waters, Brent; Zhandry, Mark 20 2014 Witness encryption from instance independent assumptions. Zbl 1345.94064Gentry, Craig; Lewko, Allison; Waters, Brent 17 2014 Why proving HIBE systems secure is difficult. Zbl 1326.94109Lewko, Allison; Waters, Brent 7 2014 Online/Offline attribute-based encryption. Zbl 1335.94050Hohenberger, Susan; Waters, Brent 6 2014 Rethinking verifiably encrypted signatures: a gap in functionality and potential solutions. Zbl 1290.94146Calderon, Theresa; Meiklejohn, Sarah; Shacham, Hovav; Waters, Brent 1 2014 Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. Zbl 1310.94148Gentry, Craig; Sahai, Amit; Waters, Brent 139 2013 Constrained pseudorandom functions and their applications. Zbl 1314.94057Boneh, Dan; Waters, Brent 62 2013 Witness encryption and its applications. Zbl 1293.94066Garg, Sanjam; Gentry, Craig; Sahai, Amit; Waters, Brent 45 2013 Attribute-based encryption for circuits from multilinear maps. Zbl 1311.94080Garg, Sanjam; Gentry, Craig; Halevi, Shai; Sahai, Amit; Waters, Brent 41 2013 Attribute-based encryption with fast decryption. Zbl 1314.94074Hohenberger, Susan; Waters, Brent 15 2013 Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1279.94091Katz, Jonathan; Sahai, Amit; Waters, Brent 14 2013 Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures. Zbl 1310.94151Hohenberger, Susan; Sahai, Amit; Waters, Brent 10 2013 Encoding functions with constant online rate or how to compress garbled circuits keys. Zbl 1298.94076Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent 9 2013 The \(k\)-BDH assumption family: bilinear map cryptography from progressively weaker assumptions. Zbl 1312.94033Benson, Karyn; Shacham, Hovav; Waters, Brent 4 2013 Functional encryption: origins and recent developments. Zbl 1314.94096Waters, Brent 4 2013 Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles. Zbl 1279.94098Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent 4 2013 Compact proofs of retrievability. Zbl 1323.68258Shacham, Hovav; Waters, Brent 4 2013 New proof methods for attribute-based encryption: achieving full security through selective techniques. Zbl 1296.94128Lewko, Allison; Waters, Brent 46 2012 Functional encryption for regular languages. Zbl 1296.94143Waters, Brent 26 2012 Dynamic credentials and ciphertext delegation for attribute-based encryption. Zbl 1296.94139Sahai, Amit; Seyalioglu, Hakan; Waters, Brent 24 2012 Standard security does not imply security against selective-opening. Zbl 1297.94046Bellare, Mihir; Dowsley, Rafael; Waters, Brent; Yilek, Scott 18 2012 Computing on authenticated data. Zbl 1292.94017Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent 17 2012 Targeted malleability: homomorphic encryption for restricted computations. Zbl 1347.68119Boneh, Dan; Segev, Gil; Waters, Brent 12 2012 Identity-based (lossy) trapdoor functions and applications. Zbl 1297.94047Bellare, Mihir; Kiltz, Eike; Peikert, Chris; Waters, Brent 12 2012 Dual form signatures: an approach for proving security from static assumptions. Zbl 1290.94149Gerbush, Michael; Lewko, Allison; O’Neill, Adam; Waters, Brent 9 2012 Detecting dangerous queries: a new approach for chosen ciphertext security. Zbl 1297.94077Hohenberger, Susan; Lewko, Allison; Waters, Brent 8 2012 Functional encryption: definitions and challenges. Zbl 1295.94027Boneh, Dan; Sahai, Amit; Waters, Brent 125 2011 Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Zbl 1291.94165Waters, Brent 89 2011 Unbounded HIBE and attribute-based encryption. Zbl 1290.94105Lewko, Allison; Waters, Brent 43 2011 Decentralizing attribute-based encryption. Zbl 1290.94106Lewko, Allison; Waters, Brent 36 2011 Achieving leakage resilience through dual system encryption. Zbl 1291.94118Lewko, Allison; Rouselakis, Yannis; Waters, Brent 26 2011 Lossy trapdoor functions and their applications. Zbl 1236.94063Peikert, Chris; Waters, Brent 20 2011 Storing secrets on continually leaky devices. Zbl 1292.94055Dodis, Yevgeniy; Lewko, Allison; Waters, Brent; Wichs, Daniel 18 2011 Bi-deniable public-key encryption. Zbl 1290.94113O’Neill, Adam; Peikert, Chris; Waters, Brent 16 2011 Identity-based encryption secure against selective opening attack. Zbl 1295.94020Bellare, Mihir; Waters, Brent; Yilek, Scott 16 2011 How to leak on key updates. Zbl 1288.94074Lewko, Allison; Lewko, Mark; Waters, Brent 12 2011 Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. Zbl 1279.94095Lewko, Allison; Okamoto, Tatsuaki; Sahai, Amit; Takashima, Katsuyuki; Waters, Brent 122 2010 New techniques for dual system encryption and fully secure HIBE with short ciphertexts. Zbl 1274.94092Lewko, Allison; Waters, Brent 78 2010 Constructing verifiable random functions with large input spaces. Zbl 1280.94068Hohenberger, Susan; Waters, Brent 10 2010 Shrinking the keys of discrete-log-type lossy trapdoor functions. Zbl 1315.94062Boyen, Xavier; Waters, Brent 5 2010 Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. Zbl 1252.94101Waters, Brent 147 2009 Adaptive security in broadcast encryption systems (with short ciphertexts). Zbl 1239.94073Gentry, Craig; Waters, Brent 33 2009 Short and stateless signatures from the RSA assumption. Zbl 1252.94074Hohenberger, Susan; Waters, Brent 31 2009 Signing a linear subspace: Signature schemes for network coding. Zbl 1227.68024Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent 30 2009 Predicate privacy in encryption systems. Zbl 1213.94133Shen, Emily; Shi, Elaine; Waters, Brent 28 2009 Realizing hash-and-sign signatures under standard assumptions. Zbl 1239.94075Hohenberger, Susan; Waters, Brent 17 2009 Pairing-based cryptography – Pairing 2009. Third international conference Palo Alto, CA, USA, August 12–14, 2009. Proceedings. Zbl 1169.94002 1 2009 Predicate encryption supporting disjunctions, polynomial equations, and inner products. Zbl 1149.94323Katz, Jonathan; Sahai, Amit; Waters, Brent 101 2008 A framework for efficient and composable oblivious transfer. Zbl 1183.94046Peikert, Chris; Vaikuntanathan, Vinod; Waters, Brent 86 2008 Lossy trapdoor functions and their applications. Zbl 1228.94027Peikert, Chris; Waters, Brent 77 2008 Compact proofs of retrievability. Zbl 1206.68110Shacham, Hovav; Waters, Brent 34 2008 Delegating capabilities in predicate encryption systems. Zbl 1155.94385Shi, Elaine; Waters, Brent 17 2008 Conjunctive, subset, and range queries on encrypted data. Zbl 1156.94335Boneh, Dan; Waters, Brent 74 2007 Full-domain subgroup hiding and constant-size group signatures. Zbl 1127.94020Boyen, Xavier; Waters, Brent 21 2007 Efficient ring signatures without random oracles. Zbl 1127.94027Shacham, Hovav; Waters, Brent 20 2007 Anonymous hierarchical identity-based encryption (without random oracles). Zbl 1161.94390Boyen, Xavier; Waters, Brent 45 2006 Fully collusion resistant traitor tracing with short ciphertexts and private keys. Zbl 1140.94326Boneh, Dan; Sahai, Amit; Waters, Brent 33 2006 Sequential aggregate signatures and multisignatures without random oracles. Zbl 1140.94358Lu, Steve; Ostrovsky, Rafail; Sahai, Amit; Shacham, Hovav; Waters, Brent 30 2006 Compact group signatures without random oracles. Zbl 1140.94327Boyen, Xavier; Waters, Brent 27 2006 Strongly unforgeable signatures based on computational Diffie-Hellman. Zbl 1151.94485Boneh, Dan; Shen, Emily; Waters, Brent 17 2006 Privacy in encrypted content distribution using private broadcast encryption. Zbl 1152.94402Barth, Adam; Boneh, Dan; Waters, Brent 14 2006 Efficient identity-based encryption without random oracles. Zbl 1137.94360Waters, Brent 250 2005 Fuzzy identity-based encryption. Zbl 1137.94355Sahai, Amit; Waters, Brent 228 2005 Collusion resistant broadcast encryption with short ciphertexts and private keys. Zbl 1145.94434Boneh, Dan; Gentry, Craig; Waters, Brent 91 2005 ...and 1 more Documents all cited Publications top 5 cited Publications all top 5 Cited by 1,748 Authors 42 Susilo, Willy 38 Mu, Yi 32 Waters, Brent 26 Libert, Benoît 25 Hanaoka, Goichiro 24 Zhandry, Mark 22 Sahai, Amit 22 Wee, Hoeteck 20 Brakerski, Zvika 20 Segev, Gil 19 Guo, Fuchun 19 Hofheinz, Dennis 19 Wichs, Daniel 18 Vaikuntanathan, Vinod 16 Garg, Sanjam 16 Kiltz, Eike 16 Liu, Shengli 15 Au, Man Ho 15 Weng, Jian 14 Bitansky, Nir 14 Cao, Zhenfu 14 Chen, Jie 14 Emura, Keita 14 Lee, Kwangsu 14 Matsuda, Takahiro 14 Pointcheval, David 14 Tanaka, Keisuke 14 Wang, Huaxiong 14 Yamada, Shota 14 Yung, Moti 13 Abdalla, Michel 13 Ananth, Prabhanjan Vijendra 13 Chen, Kefei 13 Deng, Robert Huijie 13 Ishai, Yuval 13 Komargodski, Ilan 13 Seo, Jae Hong 13 Yang, Bo 12 Canetti, Ran 12 Fiore, Dario 12 Jager, Tibor 12 Li, Jin 12 Nishimaki, Ryo 12 Venturi, Daniele 12 Yang, Guomin 11 Catalano, Dario 11 Herranz, Javier 11 Khurana, Dakshita 11 Lai, Junzuo 11 Li, Jiguo 11 Lin, Huijia 11 Ling, San 11 Nielsen, Jesper Buus 11 Watanabe, Yodai 11 Wu, Qianhong 10 Applebaum, Benny 10 Benhamouda, Fabrice 10 Boneh, Dan 10 Farshim, Pooya 10 Liu, Joseph K. K. 10 Park, Jonghwan 10 Pass, Rafael 10 Qin, Baodong 10 Rosen, Alon 10 Srinivasan, Akshayaram 9 Attrapadung, Nuttapong 9 Bellare, Mihir 9 Dutta, Ratna 9 Fuchsbauer, Georg 9 Hazay, Carmit 9 Hohenberger, Susan 9 Hu, Yupu 9 Pandey, Omkant 9 Wong, Duncan S. 9 Zhang, Fangguo 9 Zhang, Mingwu 8 Chen, Yu 8 Cheon, Jung Hee 8 Gentry, Craig 8 Gong, Junqing 8 Gu, Dawu 8 Halevi, Shai 8 Huang, Qiong 8 Huang, Xinyi 8 Huang, Zhengan 8 Jain, Aayush 8 Jain, Abhishek 8 Koppula, Venkata 8 Liang, Kaitai 8 Long, Yu 8 O’Neill, Adam 8 Peikert, Chris 8 Phan Duong Hieu 8 Yamakawa, Takashi 8 Yu, Jia 7 Cash, David M. 7 Chen, Rongmao 7 Chen, Xiaofeng 7 Damgård, Ivan Bjerre 7 Lai, Jianchang ...and 1,648 more Authors all top 5 Cited in 67 Serials 112 Journal of Cryptology 98 Information Sciences 84 Theoretical Computer Science 73 Designs, Codes and Cryptography 25 Soft Computing 18 SIAM Journal on Computing 13 Information Processing Letters 12 Journal of Computer and System Sciences 12 International Journal of Foundations of Computer Science 12 Journal of Mathematical Cryptology 11 Mathematical Problems in Engineering 8 Algorithmica 8 Journal of Shanghai Jiaotong University (Science) 8 Science China. Information Sciences 7 Frontiers of Computer Science 6 Applicable Algebra in Engineering, Communication and Computing 5 Information and Computation 5 International Journal of Computer Mathematics 5 Advances in Mathematics of Communications 4 Computers & Mathematics with Applications 4 Wuhan University Journal of Natural Sciences (WUJNS) 3 International Journal of Theoretical Physics 3 Journal of Computer Science and Technology 3 Mathematical and Computer Modelling 3 Journal of Applied Mathematics 3 Science in China. Series F 3 Symmetry 3 Computer Science Review 2 IEEE Transactions on Information Theory 2 Mathematics of Computation 2 Applied Mathematics and Computation 2 Computational Complexity 2 Finite Fields and their Applications 2 Journal of Discrete Mathematical Sciences & Cryptography 2 Journal of Systems Science and Complexity 2 RAIRO. Theoretical Informatics and Applications 1 Acta Informatica 1 Chaos, Solitons and Fractals 1 Computing 1 Journal of Computational and Applied Mathematics 1 Journal of Number Theory 1 Moscow University Computational Mathematics and Cybernetics 1 SIAM Journal on Discrete Mathematics 1 Formal Aspects of Computing 1 Japan Journal of Industrial and Applied Mathematics 1 Journal of Statistical Computation and Simulation 1 Bulletin of the American Mathematical Society. New Series 1 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering 1 Cybernetics and Systems Analysis 1 Rad Hrvatske Akademije Znanosti i Umjetnosti. Matematičke Znanosti 1 Journal of Mathematical Sciences (New York) 1 Theory of Computing Systems 1 LMS Journal of Computation and Mathematics 1 International Journal of Applied Mathematics and Computer Science 1 JP Journal of Algebra, Number Theory and Applications 1 Quantum Information Processing 1 ACM Transactions on Information and System Security (TISSEC) 1 Journal of Discrete Algorithms 1 Mediterranean Journal of Mathematics 1 Mathematical Biosciences and Engineering 1 Journal of Zhejiang University. Science A 1 Cryptography and Communications 1 Science China. Mathematics 1 Afrika Matematika 1 Arabian Journal for Science and Engineering 1 Mathematical Foundations of Computing 1 Matematicheskie Voprosy Kriptografii all top 5 Cited in 21 Fields 1,146 Information and communication theory, circuits (94-XX) 430 Computer science (68-XX) 33 Number theory (11-XX) 33 Quantum theory (81-XX) 16 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 15 Algebraic geometry (14-XX) 12 Combinatorics (05-XX) 8 Operations research, mathematical programming (90-XX) 5 Statistics (62-XX) 3 Group theory and generalizations (20-XX) 3 Biology and other natural sciences (92-XX) 2 Probability theory and stochastic processes (60-XX) 2 Systems theory; control (93-XX) 1 General and overarching topics; collections (00-XX) 1 Mathematical logic and foundations (03-XX) 1 Commutative algebra (13-XX) 1 Linear and multilinear algebra; matrix theory (15-XX) 1 Associative rings and algebras (16-XX) 1 Convex and discrete geometry (52-XX) 1 General topology (54-XX) 1 Numerical analysis (65-XX) Citations by Year