Brent Waters

From MaRDI portal
Person:1629440

Available identifiers

zbMath Open waters.brentMaRDI QIDQ1629440

List of research outcomes





PublicationDate of PublicationType
Adaptive security in SNARGs via iO and lossy functions2025-01-10Paper
NIZKs with maliciously chosen CRS: subversion advice-ZK and accountable soundness2025-01-10Paper
Reducing the CRS size in registered ABE systems2024-12-13Paper
Non-interactive anonymous router with quasi-linear router computation2024-08-02Paper
How to use (plain) witness encryption: registered ABE, flexible broadcast, and more2024-02-06Paper
Universal amplification of KDM security: from 1-key circular to multi-key KDM2024-02-02Paper
Security-preserving distributed samplers: how to generate any CRS in one round without random oracles2024-02-02Paper
On non-uniform security for black-box non-interactive CCA commitments2024-01-16Paper
Registered attribute-based encryption2023-12-12Paper
Fully adaptive decentralized multi-authority \textsf{ABE}2023-12-12Paper
Non-interactive publicly-verifiable delegation of committed programs2023-11-16Paper
Adaptive multiparty NIKE2023-08-14Paper
Fully succinct batch arguments for \textsf{NP} from indistinguishability obfuscation2023-08-14Paper
How to sample a discrete Gaussian (and more) from a random oracle2023-08-14Paper
Multi-authority ABE from lattices without random oracles2023-08-14Paper
Batch arguments for \textsf{NP} and more from standard bilinear group assumptions2023-06-28Paper
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups2023-05-26Paper
Bounded Collusion ABE for TMs from IBE2023-05-26Paper
Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH2023-04-13Paper
New constructions of hinting PRGs, OWFs with encryption, and more2022-11-09Paper
Chosen ciphertext security from injective trapdoor functions2022-11-09Paper
Dynamic collusion bounded functional encryption from identity-based encryption2022-08-30Paper
Signature Schemes with Randomized Verification2022-07-01Paper
Targeted lossy functions and applications2022-05-18Paper
New techniques in replica encodings with client setup2022-03-23Paper
On the CCA compatibility of public-key infrastructure2021-12-21Paper
Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}2021-12-08Paper
Black-box non-interactive non-malleable commitments2021-12-08Paper
On perfect correctness in (lockable) obfuscation2021-12-01Paper
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More2021-05-27Paper
Adaptively secure constrained pseudorandom functions2021-03-17Paper
New methods and abstractions for RSA-based forward secure signatures2021-02-23Paper
Collusion Resistant Traitor Tracing from Learning with Errors2020-10-29Paper
Output compression, MPC, and iO for Turing machines2020-05-20Paper
New approaches to traitor tracing with embedded identities2020-04-30Paper
ABE for DFA from \(k\)-lin2020-03-09Paper
Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions2020-03-09Paper
Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption2020-03-09Paper
Collusion resistant broadcast and trace from positional witness encryption2020-01-28Paper
Collusion resistant traitor tracing from learning with errors2019-08-22Paper
Upgrading to functional encryption2018-12-11Paper
Impossibility of simulation secure functional encryption even with random oracles2018-12-11Paper
Traitor-tracing from LWE made simple and attribute-based2018-12-06Paper
Synchronized aggregate signatures from the RSA assumption2018-07-09Paper
A generic approach to constructing and proving verifiable random functions2018-01-19Paper
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles2017-06-13Paper
Universal Samplers with Fast Verification2017-06-13Paper
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption2017-06-13Paper
Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys2017-01-13Paper
How to Generate and Use Universal Samplers2017-01-06Paper
Semi-adaptive Security and Bundling Functionalities Made Generic and Easy2016-12-22Paper
Circular Security Separations for Arbitrary Length Cycles from LWE2016-10-27Paper
Targeted malleability: homomorphic encryption for restricted computations2016-10-07Paper
Deterministic Public-Key Encryption Under Continual Leakage2016-10-04Paper
Constrained Pseudorandom Functions for Unconstrained Inputs2016-07-15Paper
New Negative Results on Differing-Inputs Obfuscation2016-07-15Paper
Candidate indistinguishability obfuscation and functional encryption for all circuits2016-07-04Paper
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators2016-06-10Paper
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model2016-06-10Paper
Time-lock puzzles from randomized encodings2016-04-15Paper
New Circular Security Counterexamples from Decision Linear and Learning with Errors2016-03-23Paper
A Punctured Programming Approach to Adaptively Secure Functional Encryption2015-12-10Paper
Universal Signature Aggregators2015-09-30Paper
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption2015-09-29Paper
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory2015-08-21Paper
Separations in Circular Security for Arbitrary Length Key Cycles2015-07-06Paper
How to use indistinguishability obfuscation2015-06-26Paper
Computing on authenticated data2015-05-12Paper
Relaxed Two-to-One Recoding Schemes2014-10-14Paper
Low Overhead Broadcast Encryption from Multilinear Maps2014-08-07Paper
Witness encryption and its applications2014-08-07Paper
Witness Encryption from Instance Independent Assumptions2014-08-07Paper
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation2014-05-27Paper
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions2014-03-28Paper
Online/Offline Attribute-Based Encryption2014-03-25Paper
Constrained Pseudorandom Functions and Their Applications2013-12-10Paper
Attribute-Based Encryption for Circuits from Multilinear Maps2013-09-17Paper
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys2013-09-17Paper
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based2013-09-02Paper
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures2013-09-02Paper
Compact proofs of retrievability2013-08-01Paper
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles2013-06-27Paper
Predicate encryption supporting disjunctions, polynomial equations, and inner products2013-06-27Paper
Attribute-based encryption with fast decryption2013-04-19Paper
Functional encryption: origins and recent developments2013-04-19Paper
Dual form signatures: an approach for proving security from static assumptions2013-03-19Paper
The \(k\)-BDH assumption family: bilinear map cryptography from progressively weaker assumptions2013-03-18Paper
Dynamic credentials and ciphertext delegation for attribute-based encryption2012-09-25Paper
Functional encryption for regular languages2012-09-25Paper
New proof methods for attribute-based encryption: achieving full security through selective techniques2012-09-25Paper
Standard security does not imply security against selective-opening2012-06-29Paper
Identity-based (lossy) trapdoor functions and applications2012-06-29Paper
Detecting dangerous queries: a new approach for chosen ciphertext security2012-06-29Paper
Computing on Authenticated Data2012-06-15Paper
Lossy Trapdoor Functions and Their Applications2012-03-15Paper
Bi-deniable public-key encryption2011-08-12Paper
Decentralizing attribute-based encryption2011-05-27Paper
Unbounded HIBE and Attribute-Based Encryption2011-05-27Paper
Functional encryption: definitions and challenges2011-05-19Paper
Achieving leakage resilience through dual system encryption2011-05-19Paper
Identity-based encryption secure against selective opening attack2011-05-19Paper
Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization2011-03-15Paper
Shrinking the keys of discrete-log-type lossy trapdoor functions2010-07-06Paper
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption2010-06-01Paper
Constructing verifiable random functions with large input spaces2010-06-01Paper
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts2010-02-24Paper
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions2009-10-20Paper
Short and Stateless Signatures from the RSA Assumption2009-10-20Paper
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)2009-05-12Paper
Realizing Hash-and-Sign Signatures under Standard Assumptions2009-05-12Paper
Signing a Linear Subspace: Signature Schemes for Network Coding2009-03-24Paper
Attribute-based encryption2009-03-24Paper
Predicate Privacy in Encryption Systems2009-03-03Paper
A Framework for Efficient and Composable Oblivious Transfer2009-02-10Paper
Compact Proofs of Retrievability2009-02-10Paper
Lossy trapdoor functions and their applications2009-01-05Paper
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption2008-09-09Paper
Delegating Capabilities in Predicate Encryption Systems2008-08-19Paper
Efficient Identity-Based Encryption Without Random Oracles2008-05-06Paper
Fuzzy Identity-Based Encryption2008-05-06Paper
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products2008-04-15Paper
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys2008-03-17Paper
Compact Group Signatures Without Random Oracles2007-09-24Paper
Sequential Aggregate Signatures and Multisignatures Without Random Oracles2007-09-24Paper
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys2007-09-24Paper
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)2007-09-04Paper
Full-Domain Subgroup Hiding and Constant-Size Group Signatures2007-09-04Paper
Efficient Ring Signatures Without Random Oracles2007-09-04Paper
Conjunctive, Subset, and Range Queries on Encrypted Data2007-08-30Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Applied Cryptography and Network Security2005-06-13Paper

Research outcomes over time

This page was built for person: Brent Waters