Brent Waters

From MaRDI portal
Person:1629440

Available identifiers

zbMath Open waters.brentMaRDI QIDQ1629440

List of research outcomes

PublicationDate of PublicationType
How to use (plain) witness encryption: registered ABE, flexible broadcast, and more2024-02-06Paper
Universal amplification of KDM security: from 1-key circular to multi-key KDM2024-02-02Paper
Security-preserving distributed samplers: how to generate any CRS in one round without random oracles2024-02-02Paper
On non-uniform security for black-box non-interactive CCA commitments2024-01-16Paper
Fully adaptive decentralized multi-authority \textsf{ABE}2023-12-12Paper
Registered attribute-based encryption2023-12-12Paper
Non-interactive publicly-verifiable delegation of committed programs2023-11-16Paper
Multi-authority ABE from lattices without random oracles2023-08-14Paper
Adaptive multiparty NIKE2023-08-14Paper
Fully succinct batch arguments for \textsf{NP} from indistinguishability obfuscation2023-08-14Paper
How to sample a discrete Gaussian (and more) from a random oracle2023-08-14Paper
Batch arguments for \textsf{NP} and more from standard bilinear group assumptions2023-06-28Paper
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups2023-05-26Paper
Bounded Collusion ABE for TMs from IBE2023-05-26Paper
Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH2023-04-13Paper
New constructions of hinting PRGs, OWFs with encryption, and more2022-11-09Paper
Chosen ciphertext security from injective trapdoor functions2022-11-09Paper
Dynamic collusion bounded functional encryption from identity-based encryption2022-08-30Paper
Targeted lossy functions and applications2022-05-18Paper
New techniques in replica encodings with client setup2022-03-23Paper
On the CCA compatibility of public-key infrastructure2021-12-21Paper
Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}2021-12-08Paper
Black-box non-interactive non-malleable commitments2021-12-08Paper
On perfect correctness in (lockable) obfuscation2021-12-01Paper
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More2021-05-27Paper
Adaptively secure constrained pseudorandom functions2021-03-17Paper
New methods and abstractions for RSA-based forward secure signatures2021-02-23Paper
Collusion Resistant Traitor Tracing from Learning with Errors2020-10-29Paper
Output compression, MPC, and iO for Turing machines2020-05-20Paper
New approaches to traitor tracing with embedded identities2020-04-30Paper
Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions2020-03-09Paper
Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption2020-03-09Paper
ABE for DFA from \(k\)-lin2020-03-09Paper
Collusion resistant broadcast and trace from positional witness encryption2020-01-28Paper
Collusion resistant traitor tracing from learning with errors2019-08-22Paper
Upgrading to functional encryption2018-12-11Paper
Impossibility of simulation secure functional encryption even with random oracles2018-12-11Paper
Traitor-tracing from LWE made simple and attribute-based2018-12-06Paper
Synchronized aggregate signatures from the RSA assumption2018-07-09Paper
A generic approach to constructing and proving verifiable random functions2018-01-19Paper
Universal Samplers with Fast Verification2017-06-13Paper
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles2017-06-13Paper
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption2017-06-13Paper
Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys2017-01-13Paper
How to Generate and Use Universal Samplers2017-01-06Paper
Semi-adaptive Security and Bundling Functionalities Made Generic and Easy2016-12-22Paper
Circular Security Separations for Arbitrary Length Cycles from LWE2016-10-27Paper
Targeted malleability2016-10-07Paper
Deterministic Public-Key Encryption Under Continual Leakage2016-10-04Paper
Constrained Pseudorandom Functions for Unconstrained Inputs2016-07-15Paper
New Negative Results on Differing-Inputs Obfuscation2016-07-15Paper
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits2016-07-04Paper
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model2016-06-10Paper
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators2016-06-10Paper
Time-Lock Puzzles from Randomized Encodings2016-04-15Paper
New Circular Security Counterexamples from Decision Linear and Learning with Errors2016-03-23Paper
A Punctured Programming Approach to Adaptively Secure Functional Encryption2015-12-10Paper
Universal Signature Aggregators2015-09-30Paper
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption2015-09-29Paper
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory2015-08-21Paper
Separations in Circular Security for Arbitrary Length Key Cycles2015-07-06Paper
How to use indistinguishability obfuscation2015-06-26Paper
Computing on authenticated data2015-05-12Paper
Relaxed Two-to-One Recoding Schemes2014-10-14Paper
Witness encryption and its applications2014-08-07Paper
Low Overhead Broadcast Encryption from Multilinear Maps2014-08-07Paper
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation2014-05-27Paper
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions2014-03-28Paper
Online/Offline Attribute-Based Encryption2014-03-25Paper
Constrained Pseudorandom Functions and Their Applications2013-12-10Paper
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys2013-09-17Paper
Attribute-Based Encryption for Circuits from Multilinear Maps2013-09-17Paper
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based2013-09-02Paper
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures2013-09-02Paper
Compact proofs of retrievability2013-08-01Paper
Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles2013-06-27Paper
Predicate encryption supporting disjunctions, polynomial equations, and inner products2013-06-27Paper
Functional Encryption: Origins and Recent Developments2013-04-19Paper
Attribute-Based Encryption with Fast Decryption2013-04-19Paper
Dual Form Signatures: An Approach for Proving Security from Static Assumptions2013-03-19Paper
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions2013-03-18Paper
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques2012-09-25Paper
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption2012-09-25Paper
Functional Encryption for Regular Languages2012-09-25Paper
Identity-Based (Lossy) Trapdoor Functions and Applications2012-06-29Paper
Standard Security Does Not Imply Security against Selective-Opening2012-06-29Paper
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security2012-06-29Paper
Computing on Authenticated Data2012-06-15Paper
Lossy Trapdoor Functions and Their Applications2012-03-15Paper
Bi-Deniable Public-Key Encryption2011-08-12Paper
Unbounded HIBE and Attribute-Based Encryption2011-05-27Paper
Decentralizing Attribute-Based Encryption2011-05-27Paper
Achieving Leakage Resilience through Dual System Encryption2011-05-19Paper
Identity-Based Encryption Secure against Selective Opening Attack2011-05-19Paper
Functional Encryption: Definitions and Challenges2011-05-19Paper
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization2011-03-15Paper
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions2010-07-06Paper
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption2010-06-01Paper
Constructing Verifiable Random Functions with Large Input Spaces2010-06-01Paper
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts2010-02-24Paper
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions2009-10-20Paper
Short and Stateless Signatures from the RSA Assumption2009-10-20Paper
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)2009-05-12Paper
Realizing Hash-and-Sign Signatures under Standard Assumptions2009-05-12Paper
https://portal.mardi4nfdi.de/entity/Q36158852009-03-24Paper
Signing a Linear Subspace: Signature Schemes for Network Coding2009-03-24Paper
Predicate Privacy in Encryption Systems2009-03-03Paper
A Framework for Efficient and Composable Oblivious Transfer2009-02-10Paper
Compact Proofs of Retrievability2009-02-10Paper
Lossy trapdoor functions and their applications2009-01-05Paper
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption2008-09-09Paper
Delegating Capabilities in Predicate Encryption Systems2008-08-19Paper
Efficient Identity-Based Encryption Without Random Oracles2008-05-06Paper
Fuzzy Identity-Based Encryption2008-05-06Paper
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products2008-04-15Paper
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys2008-03-17Paper
Compact Group Signatures Without Random Oracles2007-09-24Paper
Sequential Aggregate Signatures and Multisignatures Without Random Oracles2007-09-24Paper
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys2007-09-24Paper
Full-Domain Subgroup Hiding and Constant-Size Group Signatures2007-09-04Paper
Efficient Ring Signatures Without Random Oracles2007-09-04Paper
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)2007-09-04Paper
Conjunctive, Subset, and Range Queries on Encrypted Data2007-08-30Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Applied Cryptography and Network Security2005-06-13Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Brent Waters