Brent Waters

From MaRDI portal
Person:1629440


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Adaptive security in SNARGs via iO and lossy functions
 
2025-01-10Paper
NIZKs with maliciously chosen CRS: subversion advice-ZK and accountable soundness
 
2025-01-10Paper
Reducing the CRS size in registered ABE systems
 
2024-12-13Paper
Non-interactive anonymous router with quasi-linear router computation
 
2024-08-02Paper
How to use (plain) witness encryption: registered ABE, flexible broadcast, and more
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Universal amplification of KDM security: from 1-key circular to multi-key KDM
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Security-preserving distributed samplers: how to generate any CRS in one round without random oracles
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
On non-uniform security for black-box non-interactive CCA commitments
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Registered attribute-based encryption
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Fully adaptive decentralized multi-authority \textsf{ABE}
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Non-interactive publicly-verifiable delegation of committed programs
Lecture Notes in Computer Science
2023-11-16Paper
Adaptive multiparty NIKE
Theory of Cryptography
2023-08-14Paper
Fully succinct batch arguments for \textsf{NP} from indistinguishability obfuscation
Theory of Cryptography
2023-08-14Paper
How to sample a discrete Gaussian (and more) from a random oracle
Theory of Cryptography
2023-08-14Paper
Multi-authority ABE from lattices without random oracles
Theory of Cryptography
2023-08-14Paper
Batch arguments for \textsf{NP} and more from standard bilinear group assumptions
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
Lecture Notes in Computer Science
2023-05-26Paper
Bounded Collusion ABE for TMs from IBE
Lecture Notes in Computer Science
2023-05-26Paper
Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
Journal of Cryptology
2023-04-13Paper
New constructions of hinting PRGs, OWFs with encryption, and more
 
2022-11-09Paper
Chosen ciphertext security from injective trapdoor functions
 
2022-11-09Paper
Dynamic collusion bounded functional encryption from identity-based encryption
 
2022-08-30Paper
Signature schemes with randomized verification
 
2022-07-01Paper
Targeted lossy functions and applications
 
2022-05-18Paper
New techniques in replica encodings with client setup
 
2022-03-23Paper
On the CCA compatibility of public-key infrastructure
 
2021-12-21Paper
Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
 
2021-12-08Paper
Black-box non-interactive non-malleable commitments
 
2021-12-08Paper
On perfect correctness in (lockable) obfuscation
 
2021-12-01Paper
How to use indistinguishability obfuscation: deniable encryption, and more
SIAM Journal on Computing
2021-05-27Paper
Adaptively secure constrained pseudorandom functions
 
2021-03-17Paper
New methods and abstractions for RSA-based forward secure signatures
 
2021-02-23Paper
Collusion resistant traitor tracing from learning with errors
SIAM Journal on Computing
2020-10-29Paper
Output compression, MPC, and iO for Turing machines
 
2020-05-20Paper
New approaches to traitor tracing with embedded identities
 
2020-04-30Paper
ABE for DFA from \(k\)-lin
 
2020-03-09Paper
Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions
 
2020-03-09Paper
Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption
 
2020-03-09Paper
Collusion resistant broadcast and trace from positional witness encryption
 
2020-01-28Paper
Collusion resistant traitor tracing from learning with errors
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
Upgrading to functional encryption
 
2018-12-11Paper
Impossibility of simulation secure functional encryption even with random oracles
 
2018-12-11Paper
Traitor-tracing from LWE made simple and attribute-based
 
2018-12-06Paper
Synchronized aggregate signatures from the RSA assumption
 
2018-07-09Paper
A generic approach to constructing and proving verifiable random functions
 
2018-01-19Paper
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
Lecture Notes in Computer Science
2017-06-13Paper
Universal samplers with fast verification
Lecture Notes in Computer Science
2017-06-13Paper
Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption
Lecture Notes in Computer Science
2017-06-13Paper
Encoding functions with constant online rate, or how to compress garbled circuit keys
SIAM Journal on Computing
2017-01-13Paper
How to Generate and Use Universal Samplers
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Semi-adaptive security and bundling functionalities made generic and easy
Theory of Cryptography
2016-12-22Paper
Circular Security Separations for Arbitrary Length Cycles from LWE
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Targeted malleability: homomorphic encryption for restricted computations
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
2016-10-07Paper
Deterministic Public-Key Encryption Under Continual Leakage
Applied Cryptography and Network Security
2016-10-04Paper
Constrained Pseudorandom Functions for Unconstrained Inputs
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
New negative results on differing-inputs obfuscation
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Candidate indistinguishability obfuscation and functional encryption for all circuits
SIAM Journal on Computing
2016-07-04Paper
New realizations of somewhere statistically binding hashing and positional accumulators
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Adaptively secure puncturable pseudorandom functions in the standard model
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Time-lock puzzles from randomized encodings
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science
2016-04-15Paper
New circular security counterexamples from decision linear and learning with errors
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
A punctured programming approach to adaptively secure functional encryption
Lecture Notes in Computer Science
2015-12-10Paper
Universal signature aggregators
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Efficient statically-secure large-universe multi-authority attribute-based encryption
Financial Cryptography and Data Security
2015-09-29Paper
Indistinguishability obfuscation for Turing machines with unbounded memory
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
2015-08-21Paper
Separations in circular security for arbitrary length key cycles
Theory of Cryptography
2015-07-06Paper
How to use indistinguishability obfuscation
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
Computing on authenticated data
Journal of Cryptology
2015-05-12Paper
Relaxed two-to-one recoding schemes
Lecture Notes in Computer Science
2014-10-14Paper
Low overhead broadcast encryption from multilinear maps
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Witness encryption and its applications
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2014-08-07Paper
Witness encryption from instance independent assumptions
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Replacing a random oracle: full domain hash from indistinguishability obfuscation
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Rethinking verifiably encrypted signatures: a gap in functionality and potential solutions
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Online/Offline Attribute-Based Encryption
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Constrained pseudorandom functions and their applications
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Attribute-based encryption for circuits from multilinear maps
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Encoding functions with constant online rate or how to compress garbled circuits keys
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Full domain hash from (leveled) multilinear maps and identity-based aggregate signatures
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Compact proofs of retrievability
Journal of Cryptology
2013-08-01Paper
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles
Journal of Cryptology
2013-06-27Paper
Predicate encryption supporting disjunctions, polynomial equations, and inner products
Journal of Cryptology
2013-06-27Paper
Attribute-based encryption with fast decryption
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Functional encryption: origins and recent developments
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Dual form signatures: an approach for proving security from static assumptions
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
The \(k\)-BDH assumption family: bilinear map cryptography from progressively weaker assumptions
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Dynamic credentials and ciphertext delegation for attribute-based encryption
Lecture Notes in Computer Science
2012-09-25Paper
Functional encryption for regular languages
Lecture Notes in Computer Science
2012-09-25Paper
New proof methods for attribute-based encryption: achieving full security through selective techniques
Lecture Notes in Computer Science
2012-09-25Paper
Standard security does not imply security against selective-opening
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Identity-based (lossy) trapdoor functions and applications
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Detecting dangerous queries: a new approach for chosen ciphertext security
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Computing on Authenticated Data
Theory of Cryptography
2012-06-15Paper
Lossy Trapdoor Functions and Their Applications
SIAM Journal on Computing
2012-03-15Paper
Bi-deniable public-key encryption
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Decentralizing attribute-based encryption
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Unbounded HIBE and Attribute-Based Encryption
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Functional encryption: definitions and challenges
Theory of Cryptography
2011-05-19Paper
Achieving leakage resilience through dual system encryption
Theory of Cryptography
2011-05-19Paper
Identity-based encryption secure against selective opening attack
Theory of Cryptography
2011-05-19Paper
Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
Public Key Cryptography – PKC 2011
2011-03-15Paper
Shrinking the keys of discrete-log-type lossy trapdoor functions
Applied Cryptography and Network Security
2010-07-06Paper
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Constructing verifiable random functions with large input spaces
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
Theory of Cryptography
2010-02-24Paper
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Short and Stateless Signatures from the RSA Assumption
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Realizing Hash-and-Sign Signatures under Standard Assumptions
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Signing a Linear Subspace: Signature Schemes for Network Coding
Public Key Cryptography – PKC 2009
2009-03-24Paper
Attribute-based encryption
 
2009-03-24Paper
Predicate Privacy in Encryption Systems
Theory of Cryptography
2009-03-03Paper
A Framework for Efficient and Composable Oblivious Transfer
Lecture Notes in Computer Science
2009-02-10Paper
Compact Proofs of Retrievability
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Lossy trapdoor functions and their applications
Proceedings of the fortieth annual ACM symposium on Theory of computing
2009-01-05Paper
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption
Financial Cryptography and Data Security
2008-09-09Paper
Delegating Capabilities in Predicate Encryption Systems
Automata, Languages and Programming
2008-08-19Paper
Efficient Identity-Based Encryption Without Random Oracles
Lecture Notes in Computer Science
2008-05-06Paper
Fuzzy Identity-Based Encryption
Lecture Notes in Computer Science
2008-05-06Paper
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Compact Group Signatures Without Random Oracles
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Sequential Aggregate Signatures and Multisignatures Without Random Oracles
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
Lecture Notes in Computer Science
2007-09-04Paper
Full-Domain Subgroup Hiding and Constant-Size Group Signatures
Public Key Cryptography – PKC 2007
2007-09-04Paper
Efficient Ring Signatures Without Random Oracles
Public Key Cryptography – PKC 2007
2007-09-04Paper
Conjunctive, Subset, and Range Queries on Encrypted Data
Theory of Cryptography
2007-08-30Paper
Public Key Cryptography - PKC 2006
Lecture Notes in Computer Science
2007-05-02Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper


Research outcomes over time


This page was built for person: Brent Waters