[go: up one dir, main page]

Follow
Shweta Agrawal
Shweta Agrawal
Verified email at iitm.ac.in - Homepage
Title
Cited by
Cited by
Year
Efficient lattice (H) IBE in the standard model
S Agrawal, D Boneh, X Boyen
Annual International Conference on the Theory and Applications of …, 2010
13822010
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE
S Agrawal, D Boneh, X Boyen
Annual cryptology conference, 98-115, 2010
5682010
Fully secure functional encryption for inner products, from standard assumptions
S Agrawal, B Libert, D Stehlé
Annual International Cryptology Conference, 333-362, 2016
4082016
Homomorphic MACs: MAC-based integrity for network coding
S Agrawal, D Boneh
International conference on applied cryptography and network security, 292-305, 2009
3802009
Functional encryption for inner product predicates from learning with errors
S Agrawal, DM Freeman, V Vaikuntanathan
International Conference on the Theory and Application of Cryptology and …, 2011
3082011
Functional encryption: New perspectives and lower bounds
S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee
Annual Cryptology Conference, 500-518, 2013
2202013
Functional encryption for threshold functions (or fuzzy IBE) from lattices
S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee
International Workshop on Public Key Cryptography, 280-297, 2012
1962012
Optimal broadcast encryption from pairings and LWE
S Agrawal, S Yamada
Annual International Conference on the Theory and Applications of …, 2020
1012020
Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
S Agrawal
Annual International Conference on the Theory and Applications of …, 2019
982019
Stronger security for reusable garbled circuits, general definitions and attacks
S Agrawal
Annual international cryptology conference, 3-35, 2017
922017
Practical, round-optimal lattice-based blind signatures
S Agrawal, E Kirshanova, D Stehlé, A Yadav
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
752022
Adaptive simulation security for inner product functional encryption
S Agrawal, B Libert, M Maitra, R Titiu
IACR International Conference on Public-Key Cryptography, 34-64, 2020
752020
Discrete gaussian leftover hash lemma over infinite domains
S Agrawal, C Gentry, S Halevi, A Sahai
International Conference on the Theory and Application of Cryptology and …, 2013
742013
Privacy and security of Aadhaar: a computer science perspective
S Agrawal, S Banerjee, S Sharma
Economic and Political Weekly, 93-102, 2017
682017
Indistinguishability obfuscation without maps: Attacks and fixes for noisy linear FE
S Agrawal, A Pellet-Mary
Annual International Conference on the Theory and Applications of …, 2020
662020
Preventing pollution attacks in multi-source network coding
S Agrawal, D Boneh, X Boyen, DM Freeman
International Workshop on Public Key Cryptography, 161-176, 2010
652010
Functional encryption for bounded collusions, revisited
S Agrawal, A Rosen
Theory of Cryptography Conference, 173-205, 2017
632017
Round-optimal lattice-based threshold signatures, revisited
S Agrawal, D Stehlé, A Yadav
Cryptology ePrint Archive, 2022
612022
Efficient public trace and revoke from standard assumptions
S Agrawal, S Bhattacherjee, DH Phan, D Stehlé, S Yamada
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
602017
Secrecy using compressive sensing
S Agrawal, S Vishwanath
2011 IEEE Information Theory Workshop, 563-567, 2011
602011
The system can't perform the operation now. Try again later.
Articles 1–20