Freitag, Cody; Waters, Brent; Wu, David J. How to use (plain) witness encryption: registered ABE, flexible broadcast, and more. (English) Zbl 07800219 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14084, 498-531 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Freitag} et al., Lect. Notes Comput. Sci. 14084, 498--531 (2023; Zbl 07800219) Full Text: DOI
Waters, Brent; Wichs, Daniel Universal amplification of KDM security: from 1-key circular to multi-key KDM. (English) Zbl 07799237 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14082, 674-693 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Waters} and \textit{D. Wichs}, Lect. Notes Comput. Sci. 14082, 674--693 (2023; Zbl 07799237) Full Text: DOI
Hohenberger, Susan; Lu, George; Waters, Brent; Wu, David J. Registered attribute-based encryption. (English) Zbl 1528.94058 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14006, 511-542 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Hohenberger} et al., Lect. Notes Comput. Sci. 14006, 511--542 (2023; Zbl 1528.94058) Full Text: DOI
Datta, Pratish; Komargodski, Ilan; Waters, Brent Fully adaptive decentralized multi-authority ABE. (English) Zbl 1528.94041 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14006, 447-478 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Datta} et al., Lect. Notes Comput. Sci. 14006, 447--478 (2023; Zbl 1528.94041) Full Text: DOI
Koppula, Venkata; Waters, Brent; Zhandry, Mark Adaptive multiparty NIKE. (English) Zbl 1519.94148 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 244-273 (2023). MSC: 94A60 68P25 68M14 PDFBibTeX XMLCite \textit{V. Koppula} et al., Lect. Notes Comput. Sci. 13748, 244--273 (2023; Zbl 1519.94148) Full Text: DOI
Waters, Brent; Wee, Hoeteck; Wu, David J. Multi-authority ABE from lattices without random oracles. (English) Zbl 1517.94163 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13747, 651-679 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Waters} et al., Lect. Notes Comput. Sci. 13747, 651--679 (2023; Zbl 1517.94163) Full Text: DOI
Datta, Pratish; Komargodski, Ilan; Waters, Brent Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH. (English) Zbl 1511.94084 J. Cryptology 36, No. 2, Paper No. 6, 31 p. (2023). Reviewer: Janaka Alawatugoda (Peradeniya) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{P. Datta} et al., J. Cryptology 36, No. 2, Paper No. 6, 31 p. (2023; Zbl 1511.94084) Full Text: DOI
Garg, Rachit; Goyal, Rishab; Lu, George; Waters, Brent Dynamic collusion bounded functional encryption from identity-based encryption. (English) Zbl 1496.94045 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13276, 736-763 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Garg} et al., Lect. Notes Comput. Sci. 13276, 736--763 (2022; Zbl 1496.94045) Full Text: DOI
Goyal, Rishab; Liu, Jiahui; Waters, Brent Adaptive security via deletion in attribute-based encryption: solutions from search assumptions in bilinear groups. (English) Zbl 1515.94070 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13093, 311-341 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Goyal} et al., Lect. Notes Comput. Sci. 13093, 311--341 (2021; Zbl 1515.94070) Full Text: DOI
Goyal, Rishab; Kim, Sam; Waters, Brent; Wu, David J. Beyond software watermarking: traitor-tracing for pseudorandom functions. (English) Zbl 07684807 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 250-280 (2021). MSC: 68P25 68Nxx 94A60 PDFBibTeX XMLCite \textit{R. Goyal} et al., Lect. Notes Comput. Sci. 13092, 250--280 (2021; Zbl 07684807) Full Text: DOI
Khurana, Dakshita; Waters, Brent On the CCA compatibility of public-key infrastructure. (English) Zbl 1479.94200 Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12711, 235-260 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Khurana} and \textit{B. Waters}, Lect. Notes Comput. Sci. 12711, 235--260 (2021; Zbl 1479.94200) Full Text: DOI
Garg, Rachit; Khurana, Dakshita; Lu, George; Waters, Brent Black-box non-interactive non-malleable commitments. (English) Zbl 07440637 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12698, 159-185 (2021). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{R. Garg} et al., Lect. Notes Comput. Sci. 12698, 159--185 (2021; Zbl 07440637) Full Text: DOI
Datta, Pratish; Komargodski, Ilan; Waters, Brent Decentralized multi-authority ABE for DNFs from LWE. (English) Zbl 1479.94153 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12696, 177-209 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Datta} et al., Lect. Notes Comput. Sci. 12696, 177--209 (2021; Zbl 1479.94153) Full Text: DOI
Hohenberger, Susan; Koppula, Venkata; Waters, Brent Chosen ciphertext security from injective trapdoor functions. (English) Zbl 1504.94146 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 836-866 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Hohenberger} et al., Lect. Notes Comput. Sci. 12170, 836--866 (2020; Zbl 1504.94146) Full Text: DOI
Goyal, Rishab; Vusirikala, Satyanarayana; Waters, Brent New constructions of hinting PRGs, OWFs with encryption, and more. (English) Zbl 1503.94029 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 527-558 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Goyal} et al., Lect. Notes Comput. Sci. 12170, 527--558 (2020; Zbl 1503.94029) Full Text: DOI
Garg, Rachit; Lu, George; Waters, Brent New techniques in replica encodings with client setup. (English) Zbl 1485.94088 Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12552, 550-583 (2020). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{R. Garg} et al., Lect. Notes Comput. Sci. 12552, 550--583 (2020; Zbl 1485.94088) Full Text: DOI
Goyal, Rishab; Koppula, Venkata; Waters, Brent Collusion resistant traitor tracing from learning with errors. (English) Zbl 1490.68068 SIAM J. Comput. 49, No. 5, STOC18-94-STOC18-241 (2020). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{R. Goyal} et al., SIAM J. Comput. 49, No. 5, STOC18--94-STOC18--241 (2020; Zbl 1490.68068) Full Text: DOI
Badrinarayanan, Saikrishna; Fernando, Rex; Koppula, Venkata; Sahai, Amit; Waters, Brent Output compression, MPC, and iO for Turing machines. (English) Zbl 1483.68103 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11921, 342-370 (2019). MSC: 68Q04 68P25 68P30 94A29 94A60 PDFBibTeX XMLCite \textit{S. Badrinarayanan} et al., Lect. Notes Comput. Sci. 11921, 342--370 (2019; Zbl 1483.68103) Full Text: DOI
Gong, Junqing; Waters, Brent; Wee, Hoeteck ABE for DFA from \(k\)-lin. (English) Zbl 1509.94092 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 732-764 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Gong} et al., Lect. Notes Comput. Sci. 11693, 732--764 (2019; Zbl 1509.94092) Full Text: DOI
Koppula, Venkata; Waters, Brent Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. (English) Zbl 1509.94105 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 671-700 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Koppula} and \textit{B. Waters}, Lect. Notes Comput. Sci. 11693, 671--700 (2019; Zbl 1509.94105) Full Text: DOI
Goyal, Rishab; Quach, Willy; Waters, Brent; Wichs, Daniel Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions. (English) Zbl 1509.94093 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11694, 826-855 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Goyal} et al., Lect. Notes Comput. Sci. 11694, 826--855 (2019; Zbl 1509.94093) Full Text: DOI
Goyal, Rishab; Kim, Sam; Manohar, Nathan; Waters, Brent; Wu, David J. Watermarking public-key cryptographic primitives. (English) Zbl 1509.94160 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11694, 367-398 (2019). MSC: 94A62 94A60 68P25 68N99 PDFBibTeX XMLCite \textit{R. Goyal} et al., Lect. Notes Comput. Sci. 11694, 367--398 (2019; Zbl 1509.94160) Full Text: DOI
Goyal, Rishab; Koppula, Venkata; Waters, Brent Collusion resistant traitor tracing from learning with errors. (English) Zbl 1428.68087 Diakonikolas, Ilias (ed.) et al., Proceedings of the 50th annual ACM SIGACT symposium on theory of computing, STOC ’18, Los Angeles, CA, USA, June 25–29, 2018. New York, NY: Association for Computing Machinery (ACM). 660-670 (2018). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{R. Goyal} et al., in: Proceedings of the 50th annual ACM SIGACT symposium on theory of computing, STOC '18, Los Angeles, CA, USA, June 25--29, 2018. New York, NY: Association for Computing Machinery (ACM). 660--670 (2018; Zbl 1428.68087) Full Text: DOI
Chen, Yilei; Vaikuntanathan, Vinod; Waters, Brent; Wee, Hoeteck; Wichs, Daniel Traitor-tracing from LWE made simple and attribute-based. (English) Zbl 1430.94065 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 341-369 (2018). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Chen} et al., Lect. Notes Comput. Sci. 11240, 341--369 (2018; Zbl 1430.94065) Full Text: DOI
Koppula, Venkata; Pandey, Omkant; Rouselakis, Yannis; Waters, Brent Deterministic public-key encryption under continual leakage. (English) Zbl 1348.94063 Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19–22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 304-323 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Koppula} et al., Lect. Notes Comput. Sci. 9696, 304--323 (2016; Zbl 1348.94063) Full Text: DOI
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Raykova, Mariana; Sahai, Amit; Waters, Brent Candidate indistinguishability obfuscation and functional encryption for all circuits. (English) Zbl 1348.94048 SIAM J. Comput. 45, No. 3, 882-929 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Garg} et al., SIAM J. Comput. 45, No. 3, 882--929 (2016; Zbl 1348.94048) Full Text: DOI
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent Encoding functions with constant online rate, or how to compress garbled circuit keys. (English) Zbl 1362.94016 SIAM J. Comput. 44, No. 2, 433-466 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Applebaum} et al., SIAM J. Comput. 44, No. 2, 433--466 (2015; Zbl 1362.94016) Full Text: DOI Link
Rouselakis, Yannis; Waters, Brent Efficient statically-secure large-universe multi-authority attribute-based encryption. (English) Zbl 1415.94458 Böhme, Rainer (ed.) et al., Financial cryptography and data security. 19th international conference, FC 2015, San Juan, Puerto Rico, January 26–30, 2015. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 8975, 315-332 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Rouselakis} and \textit{B. Waters}, Lect. Notes Comput. Sci. 8975, 315--332 (2015; Zbl 1415.94458) Full Text: DOI
Koppula, Venkata; Ramchen, Kim; Waters, Brent Separations in circular security for arbitrary length key cycles. (English) Zbl 1319.94074 Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 378-400 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{V. Koppula} et al., Lect. Notes Comput. Sci. 9015, 378--400 (2015; Zbl 1319.94074) Full Text: DOI
Sahai, Amit; Waters, Brent How to use indistinguishability obfuscation: deniable encryption, and more. (English) Zbl 1315.94102 Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 – June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 475-484 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Sahai} and \textit{B. Waters}, in: Proceedings of the 46th annual ACM symposium on theory of computing, STOC '14, New York, NY, USA, May 31 -- June 3, 2014. New York, NY: Association for Computing Machinery (ACM). 475--484 (2014; Zbl 1315.94102) Full Text: DOI
Pandey, Omkant; Ramchen, Kim; Waters, Brent Relaxed two-to-one recoding schemes. (English) Zbl 1309.94150 Abdalla, Michel (ed.) et al., Security and cryptography for networks. 9th international conference, SCN 2014, Amalfi, Italy, September 3–5, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10878-0/pbk). Lecture Notes in Computer Science 8642, 57-76 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{O. Pandey} et al., Lect. Notes Comput. Sci. 8642, 57--76 (2014; Zbl 1309.94150) Full Text: DOI
Hohenberger, Susan; Sahai, Amit; Waters, Brent Replacing a random oracle: full domain hash from indistinguishability obfuscation. (English) Zbl 1332.94068 Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 201-220 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Hohenberger} et al., Lect. Notes Comput. Sci. 8441, 201--220 (2014; Zbl 1332.94068) Full Text: DOI
Calderon, Theresa; Meiklejohn, Sarah; Shacham, Hovav; Waters, Brent Rethinking verifiably encrypted signatures: a gap in functionality and potential solutions. (English) Zbl 1290.94146 Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 349-366 (2014). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{T. Calderon} et al., Lect. Notes Comput. Sci. 8366, 349--366 (2014; Zbl 1290.94146) Full Text: DOI
Applebaum, Benny; Ishai, Yuval; Kushilevitz, Eyal; Waters, Brent Encoding functions with constant online rate or how to compress garbled circuits keys. (English) Zbl 1298.94076 Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 166-184 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{B. Applebaum} et al., Lect. Notes Comput. Sci. 8043, 166--184 (2013; Zbl 1298.94076) Full Text: DOI
Shacham, Hovav; Waters, Brent Compact proofs of retrievability. (English) Zbl 1323.68258 J. Cryptology 26, No. 3, 442-483 (2013). MSC: 68P20 68P25 94A60 PDFBibTeX XMLCite \textit{H. Shacham} and \textit{B. Waters}, J. Cryptology 26, No. 3, 442--483 (2013; Zbl 1323.68258) Full Text: DOI
Katz, Jonathan; Sahai, Amit; Waters, Brent Predicate encryption supporting disjunctions, polynomial equations, and inner products. (English) Zbl 1279.94091 J. Cryptology 26, No. 2, 191-224 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Katz} et al., J. Cryptology 26, No. 2, 191--224 (2013; Zbl 1279.94091) Full Text: DOI
Boneh, Dan; Segev, Gil; Waters, Brent Targeted malleability: homomorphic encryption for restricted computations. (English) Zbl 1347.68119 Proceedings of the 3rd conference on innovations in theoretical computer science, ITCS’12, Cambridge, MA, USA, January 8–10, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1115-1). 350-366 (2012). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{D. Boneh} et al., in: Proceedings of the 3rd conference on innovations in theoretical computer science, ITCS'12, Cambridge, MA, USA, January 8--10, 2012. New York, NY: Association for Computing Machinery (ACM). 350--366 (2012; Zbl 1347.68119) Full Text: DOI
Peikert, Chris; Waters, Brent Lossy trapdoor functions and their applications. (English) Zbl 1236.94063 SIAM J. Comput. 40, No. 6, 1803-1844 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Peikert} and \textit{B. Waters}, SIAM J. Comput. 40, No. 6, 1803--1844 (2011; Zbl 1236.94063) Full Text: DOI
Sahai, Amit; Waters, Brent; Lu, Steve Attribute-based encryption. (English) Zbl 1159.68448 Joye, Marc (ed.) et al., Identity-based cryptography. Amsterdam: IOP Press (ISBN 978-1-58603-947-9/hbk). Cryptology and Information Security Series 2, 156-168 (2009). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{A. Sahai} et al., in: Identity-based cryptography. Amsterdam: IOP Press. 156--168 (2009; Zbl 1159.68448)
Boneh, Dan; Freeman, David; Katz, Jonathan; Waters, Brent Signing a linear subspace: Signature schemes for network coding. (English) Zbl 1227.68024 Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 68-87 (2009). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 5443, 68--87 (2009; Zbl 1227.68024) Full Text: DOI
Shacham, Hovav; Waters, Brent Compact proofs of retrievability. (English) Zbl 1206.68110 Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 90-107 (2008). MSC: 68P20 68P25 PDFBibTeX XMLCite \textit{H. Shacham} and \textit{B. Waters}, Lect. Notes Comput. Sci. 5350, 90--107 (2008; Zbl 1206.68110) Full Text: DOI
Peikert, Chris; Waters, Brent Lossy trapdoor functions and their applications. (English) Zbl 1228.94027 STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 187-196 (2008). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. Peikert} and \textit{B. Waters}, in: Proceedings of the 40th annual ACM symposium on theory of computing, STOC 2008. Victoria, Canada, May 17--20, 2008. New York, NY: Association for Computing Machinery (ACM). 187--196 (2008; Zbl 1228.94027) Full Text: DOI
Barth, Adam; Boneh, Dan; Waters, Brent Privacy in encrypted content distribution using private broadcast encryption. (English) Zbl 1152.94402 Di Crescenzo, Giovanni (ed.) et al., Financial cryptography and data security. 10th international conference, FC 2006, Anguilla, British West Indies, February 27–March 2, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-46255-2/pbk). Lecture Notes in Computer Science 4107, 52-64 (2006). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Barth} et al., Lect. Notes Comput. Sci. 4107, 52--64 (2006; Zbl 1152.94402) Full Text: DOI
Golle, Philippe; Staddon, Jessica; Waters, Brent Secure conjunctive keyword search over encrypted data. (English) Zbl 1103.68514 Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 31-45 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{P. Golle} et al., Lect. Notes Comput. Sci. 3089, 31--45 (2004; Zbl 1103.68514) Full Text: DOI