| Decentralizing attribute-based encryption A Lewko, B Waters Annual international conference on the theory and applications of …, 2011 | 1805 | 2011 |
| Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption A Lewko, T Okamoto, A Sahai, K Takashima, B Waters Annual International Conference on the Theory and Applications of …, 2010 | 1732 | 2010 |
| New techniques for dual system encryption and fully secure HIBE with short ciphertexts A Lewko, B Waters Theory of Cryptography, 455-479, 2010 | 709 | 2010 |
| New proof methods for attribute-based encryption: Achieving full security through selective techniques A Lewko, B Waters Annual Cryptology Conference, 180-198, 2012 | 439 | 2012 |
| Unbounded HIBE and attribute-based encryption A Lewko, B Waters Annual International Conference on the Theory and Applications of …, 2011 | 407 | 2011 |
| Revocation systems with very small private keys A Lewko, A Sahai, B Waters 2010 IEEE Symposium on Security and Privacy, 273-285, 2010 | 366 | 2010 |
| Tools for simulating features of composite order bilinear groups in the prime order setting A Lewko Annual International Conference on the Theory and Applications of …, 2012 | 302 | 2012 |
| Achieving leakage resilience through dual system encryption A Lewko, Y Rouselakis, B Waters Theory of Cryptography Conference, 70-88, 2011 | 210 | 2011 |
| Indistinguishability obfuscation for turing machines with unbounded memory V Koppula, AB Lewko, B Waters Proceedings of the forty-seventh annual ACM symposium on Theory of Computing …, 2015 | 200 | 2015 |
| Indistinguishability obfuscation from the multilinear subgroup elimination assumption C Gentry, AB Lewko, A Sahai, B Waters 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, 151-170, 2015 | 188 | 2015 |
| Witness encryption from instance independent assumptions C Gentry, A Lewko, B Waters Annual Cryptology Conference, 426-443, 2014 | 124 | 2014 |
| Storing secrets on continually leaky devices Y Dodis, A Lewko, B Waters, D Wichs Foundations of Computer Science (FOCS), 2011 IEEE 52nd Annual Symposium on …, 2011 | 87 | 2011 |
| How to leak on key updates A Lewko, M Lewko, B Waters Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011 | 86 | 2011 |
| Why proving HIBE systems secure is difficult A Lewko, B Waters Annual International Conference on the Theory and Applications of …, 2014 | 70 | 2014 |
| Efficient pseudorandom functions from the decisional linear assumption and weaker variants AB Lewko, B Waters Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 70 | 2009 |
| Dual form signatures: An approach for proving security from static assumptions M Gerbush, A Lewko, A O’Neill, B Waters International Conference on the Theory and Application of Cryptology and …, 2012 | 65 | 2012 |
| Detecting dangerous queries: a new approach for chosen ciphertext security S Hohenberger, A Lewko, B Waters Advances in Cryptology–EUROCRYPT 2012, 663-681, 2012 | 57 | 2012 |
| Interactive coding for multiparty protocols A Jain, YT Kalai, AB Lewko Proceedings of the 2015 Conference on Innovations in Theoretical Computer …, 2015 | 39 | 2015 |
| Bilinear entropy expansion from the decisional linear assumption L Kowalczyk, AB Lewko Annual Cryptology Conference, 524-541, 2015 | 35 | 2015 |
| Bounded-collusion IBE from key homomorphism S Goldwasser, A Lewko, DA Wilson Theory of Cryptography Conference, 564-581, 2012 | 34 | 2012 |