| Registered attribute-based encryption S Hohenberger, G Lu, B Waters, DJ Wu Annual International Conference on the Theory and Applications of …, 2023 | 114 | 2023 |
| Reducing the CRS size in registered ABE systems R Garg, G Lu, B Waters, DJ Wu Annual International Cryptology Conference, 143-177, 2024 | 32 | 2024 |
| Dynamic collusion bounded functional encryption from identity-based encryption R Garg, R Goyal, G Lu, B Waters Annual International Conference on the Theory and Applications of …, 2022 | 24 | 2022 |
| Dynamic collusion functional encryption and multi-authority attribute-based encryption R Garg, R Goyal, G Lu Iacr international conference on public-key cryptography, 69-104, 2024 | 16 | 2024 |
| Realizing flexible broadcast encryption: how to broadcast to a public-key directory R Garg, G Lu, B Waters, DJ Wu Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 14 | 2023 |
| Black-box non-interactive non-malleable commitments R Garg, D Khurana, G Lu, B Waters Annual International Conference on the Theory and Applications of …, 2021 | 12 | 2021 |
| New techniques in replica encodings with client setup R Garg, G Lu, B Waters Theory of Cryptography Conference, 550-583, 2020 | 11 | 2020 |
| Multi-authority registered attribute-based encryption G Lu, B Waters, DJ Wu Annual International Conference on the Theory and Applications of …, 2025 | 10 | 2025 |
| How to Sample a Discrete Gaussian (and more) from a Random Oracle G Lu, B Waters Theory of Cryptography Conference, 653-682, 2022 | 7 | 2022 |
| Limits on the Power of Prime-Order Groups: Separating Q-Type from Static Assumptions G Lu, M Zhandry Annual International Cryptology Conference, 46-74, 2024 | 5 | 2024 |
| Performance evaluation of iterative methods for solving robust convex quadratic problems C Kroer, N Ho-Nguyen, G Lu, F Kılınç-Karzan 10th NIPS Workshop on Optimization for Machine Learning, Dec 8, 2017 | 3 | 2017 |
| Succinct Garbled Circuits with Low-Depth Garbling Algorithms H Li, H Lin, G Lu Cryptology ePrint Archive, 2025 | 2 | 2025 |
| Succinct Computational Secret Sharing for Monotone Circuits G Lu, S Nassar, B Waters International Conference on the Theory and Application of Cryptology and …, 2025 | 1 | 2025 |
| On Non-uniform Security for Black-Box Non-interactive CCA Commitments R Garg, D Khurana, G Lu, B Waters Annual International Conference on the Theory and Applications of …, 2023 | 1 | 2023 |
| A Hidden-Bits Approach to Statistical ZAPs from LWE E Bradley, G Lu, S Nassar, B Waters, DJ Wu Theory of Cryptography Conference, 71-104, 2025 | | 2025 |
| How to make any computational secret sharing scheme adaptively secure G Lu, B Waters Annual International Cryptology Conference, 328-355, 2025 | | 2025 |
| Binary Codes for Computationally Bounded Errors Under Standard Crypto Assumptions G Lu, J Silbak, D Wichs Cryptology ePrint Archive, 2025 | | 2025 |
| A Simple and Generic Approach to Dynamic Collusion Model R Garg, R Goyal, G Lu Cryptology ePrint Archive, 2022 | | 2022 |