[go: up one dir, main page]

Follow
Brent Waters
Brent Waters
Verified email at cs.utexas.edu - Homepage
Title
Cited by
Cited by
Year
Attribute-based encryption for fine-grained access control of encrypted data
V Goyal, O Pandey, A Sahai, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
74662006
Ciphertext-policy attribute-based encryption
J Bethencourt, A Sahai, B Waters
2007 IEEE symposium on security and privacy (SP'07), 321-334, 2007
73932007
Fuzzy identity-based encryption
A Sahai, B Waters
Annual international conference on the theory and applications of …, 2005
66822005
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
B Waters
International workshop on public key cryptography, 53-70, 2011
28092011
Efficient identity-based encryption without random oracles
B Waters
Annual international conference on the theory and applications of …, 2005
27742005
Compact proofs of retrievability
H Shacham, B Waters
Journal of cryptology 26 (3), 442-483, 2013
26512013
Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
C Gentry, A Sahai, B Waters
Annual cryptology conference, 75-92, 2013
24052013
Conjunctive, subset, and range queries on encrypted data
D Boneh, B Waters
Theory of cryptography conference, 535-554, 2007
19922007
Decentralizing attribute-based encryption
A Lewko, B Waters
Annual international conference on the theory and applications of …, 2011
18052011
Candidate indistinguishability obfuscation and functional encryption for all circuits
S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters
SIAM Journal on Computing 45 (3), 882-929, 2016
17892016
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
A Lewko, T Okamoto, A Sahai, K Takashima, B Waters
Annual International Conference on the Theory and Applications of …, 2010
17322010
Attribute-based encryption with non-monotonic access structures
R Ostrovsky, A Sahai, B Waters
Proceedings of the 14th ACM conference on Computer and communications …, 2007
15942007
Functional encryption: Definitions and challenges
D Boneh, A Sahai, B Waters
Theory of Cryptography Conference, 253-273, 2011
15422011
Collusion resistant broadcast encryption with short ciphertexts and private keys
D Boneh, C Gentry, B Waters
Annual international cryptology conference, 258-275, 2005
15072005
Predicate encryption supporting disjunctions, polynomial equations, and inner products
J Katz, A Sahai, B Waters
annual international conference on the theory and applications of …, 2008
14892008
Secure conjunctive keyword search over encrypted data
P Golle, J Staddon, B Waters
International conference on applied cryptography and network security, 31-45, 2004
11472004
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
B Waters
Annual international cryptology conference, 619-636, 2009
11452009
Outsourcing the decryption of {ABE} ciphertexts
M Green, S Hohenberger, B Waters
20th USENIX security symposium (USENIX Security 11), 2011
10982011
A framework for efficient and composable oblivious transfer
C Peikert, V Vaikuntanathan, B Waters
Annual international cryptology conference, 554-571, 2008
9642008
How to use indistinguishability obfuscation: deniable encryption, and more
A Sahai, B Waters
Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014
9042014
The system can't perform the operation now. Try again later.
Articles 1–20