The following pages link to Shweta Agrawal (Q1631343):
Displaying 33 items.
- FE and iO for Turing machines from minimal assumptions (Q1631345) (← links)
- Stronger security for reusable garbled circuits, general definitions and attacks (Q1675713) (← links)
- Functional encryption for bounded collusions, revisited (Q1690192) (← links)
- Optimal broadcast encryption from pairings and LWE (Q2055600) (← links)
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE (Q2055603) (← links)
- CP-ABE for circuits (and More) in the symmetric key setting (Q2055716) (← links)
- Optimal broadcast encryption from LWE and pairings in the standard model (Q2055717) (← links)
- Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration (Q2128558) (← links)
- Deniable fully homomorphic encryption from learning with errors (Q2128579) (← links)
- Multi-input quadratic functional encryption from pairings (Q2139634) (← links)
- Functional encryption for Turing machines with dynamic bounded collusion from LWE (Q2139636) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation (Q2292644) (← links)
- Attribute-based encryption (and more) for nondeterministic finite automata from LWE (Q2305001) (← links)
- Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 (Q2673979) (← links)
- Cryptography from one-way communication: on completeness of finite channels (Q2691601) (← links)
- Multi-party functional encryption (Q2697858) (← links)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952) (← links)
- Functional Encryption: New Perspectives and Lower Bounds (Q2849414) (← links)
- On Continual Leakage of Discrete Log Representations (Q2867167) (← links)
- Discrete Gaussian Leftover Hash Lemma over Infinite Domains (Q2867213) (← links)
- Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices (Q2900223) (← links)
- New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation (Q2914275) (← links)
- On the Practical Security of Inner Product Functional Encryption (Q2941220) (← links)
- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data (Q2948394) (← links)
- Functional Encryption for Inner Product Predicates from Learning with Errors (Q3102174) (← links)
- Statistical Randomized Encodings: A Complexity Theoretic View (Q3448769) (← links)
- Preventing Pollution Attacks in Multi-source Network Coding (Q3562894) (← links)
- Efficient Lattice (H)IBE in the Standard Model (Q3563855) (← links)
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE (Q3582750) (← links)
- Adaptive Simulation Security for Inner Product Functional Encryption (Q5041151) (← links)
- Reusable Garbled Deterministic Finite Automata from Learning With Errors (Q5111367) (← links)
- Ad Hoc Multi-Input Functional Encryption. (Q5875740) (← links)