Brent R. Waters
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
41 | EE | Craig Gentry, Brent Waters: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). EUROCRYPT 2009: 171-188 |
40 | EE | Susan Hohenberger, Brent Waters: Realizing Hash-and-Sign Signatures under Standard Assumptions. EUROCRYPT 2009: 333-350 |
39 | EE | Dan Boneh, David Freeman, Jonathan Katz, Brent Waters: Signing a Linear Subspace: Signature Schemes for Network Coding. Public Key Cryptography 2009: 68-87 |
38 | EE | Emily Shen, Elaine Shi, Brent Waters: Predicate Privacy in Encryption Systems. TCC 2009: 457-473 |
37 | EE | John Bethencourt, Dawn Xiaodong Song, Brent Waters: New Techniques for Private Stream Searching. ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
2008 | ||
36 | EE | Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters: Black-box accountable authority identity-based encryption. ACM Conference on Computer and Communications Security 2008: 427-436 |
35 | EE | Hovav Shacham, Brent Waters: Compact Proofs of Retrievability. ASIACRYPT 2008: 90-107 |
34 | EE | Chris Peikert, Vinod Vaikuntanathan, Brent Waters: A Framework for Efficient and Composable Oblivious Transfer. CRYPTO 2008: 554-571 |
33 | EE | Jonathan Katz, Amit Sahai, Brent Waters: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. EUROCRYPT 2008: 146-162 |
32 | EE | Dan Boneh, Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, Brent Waters: On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. FOCS 2008: 283-292 |
31 | EE | Elaine Shi, Brent Waters: Delegating Capabilities in Predicate Encryption Systems. ICALP (2) 2008: 560-578 |
30 | EE | Chris Peikert, Brent Waters: Lossy trapdoor functions and their applications. STOC 2008: 187-196 |
2007 | ||
29 | EE | Rafail Ostrovsky, Amit Sahai, Brent Waters: Attribute-based encryption with non-monotonic access structures. ACM Conference on Computer and Communications Security 2007: 195-203 |
28 | EE | J. Alex Halderman, Brent Waters: Harvesting verifiable challenges from oblivious online sources. ACM Conference on Computer and Communications Security 2007: 330-341 |
27 | EE | John Bethencourt, Amit Sahai, Brent Waters: Ciphertext-Policy Attribute-Based Encryption. IEEE Symposium on Security and Privacy 2007: 321-334 |
26 | EE | John Bethencourt, Dan Boneh, Brent Waters: Cryptographic Methods for Storing Ballots on a Voting Machine. NDSS 2007 |
25 | EE | Xavier Boyen, Brent Waters: Full-Domain Subgroup Hiding and Constant-Size Group Signatures. Public Key Cryptography 2007: 1-15 |
24 | EE | Hovav Shacham, Brent Waters: Efficient Ring Signatures Without Random Oracles. Public Key Cryptography 2007: 166-180 |
23 | EE | Dan Boneh, Brent Waters: Conjunctive, Subset, and Range Queries on Encrypted Data. TCC 2007: 535-554 |
22 | EE | Chris Peikert, Brent Waters: Lossy Trapdoor Functions and Their Applications. Electronic Colloquium on Computational Complexity (ECCC) 14(080): (2007) |
2006 | ||
21 | EE | Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters: Forward-secure signatures with untrusted update. ACM Conference on Computer and Communications Security 2006: 191-200 |
20 | EE | Dan Boneh, Brent Waters: A fully collusion resistant broadcast, trace, and revoke system. ACM Conference on Computer and Communications Security 2006: 211-220 |
19 | EE | Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters: Attribute-based encryption for fine-grained access control of encrypted data. ACM Conference on Computer and Communications Security 2006: 89-98 |
18 | EE | Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters: Secure attribute-based systems. ACM Conference on Computer and Communications Security 2006: 99-112 |
17 | EE | Xavier Boyen, Brent Waters: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). CRYPTO 2006: 290-307 |
16 | EE | Xavier Boyen, Brent Waters: Compact Group Signatures Without Random Oracles. EUROCRYPT 2006: 427-444 |
15 | EE | Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters: Sequential Aggregate Signatures and Multisignatures Without Random Oracles. EUROCRYPT 2006: 465-485 |
14 | EE | Dan Boneh, Amit Sahai, Brent Waters: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. EUROCRYPT 2006: 573-592 |
13 | EE | Adam Barth, Dan Boneh, Brent Waters: Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. Financial Cryptography 2006: 52-64 |
12 | EE | John Bethencourt, Dawn Xiaodong Song, Brent Waters: New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 132-139 |
11 | EE | Dan Boneh, Emily Shen, Brent Waters: Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. Public Key Cryptography 2006: 229-240 |
2005 | ||
10 | EE | Xavier Boyen, Qixiang Mei, Brent Waters: Direct chosen ciphertext security from identity-based techniques. ACM Conference on Computer and Communications Security 2005: 320-329 |
9 | EE | Dan Boneh, Craig Gentry, Brent Waters: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. CRYPTO 2005: 258-275 |
8 | EE | Brent Waters: Efficient Identity-Based Encryption Without Random Oracles. EUROCRYPT 2005: 114-127 |
7 | EE | Amit Sahai, Brent Waters: Fuzzy Identity-Based Encryption. EUROCRYPT 2005: 457-473 |
6 | EE | J. Alex Halderman, Brent Waters, Edward W. Felten: A convenient method for securely managing passwords. WWW 2005: 471-479 |
2004 | ||
5 | EE | Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten: New client puzzle outsourcing techniques for DoS resistance. ACM Conference on Computer and Communications Security 2004: 246-256 |
4 | EE | Philippe Golle, Jessica Staddon, Brent R. Waters: Secure Conjunctive Keyword Search over Encrypted Data. ACNS 2004: 31-45 |
3 | EE | Brent R. Waters, Dirk Balfanz, Glenn Durfee, Diana K. Smetters: Building an Encrypted and Searchable Audit Log. NDSS 2004 |
2 | EE | J. Alex Halderman, Brent R. Waters, Edward W. Felten: Privacy management for portable recording devices. WPES 2004: 16-24 |
2003 | ||
1 | EE | Brent R. Waters, Edward W. Felten, Amit Sahai: Receiver anonymity via incomparable public keys. ACM Conference on Computer and Communications Security 2003: 112-121 |
1 | Dirk Balfanz | [3] |
2 | Adam Barth | [13] |
3 | John Bethencourt | [12] [26] [27] [37] |
4 | Dan Boneh | [9] [11] [13] [14] [20] [23] [26] [32] [39] |
5 | Xavier Boyen | [10] [16] [17] [21] [25] |
6 | Glenn Durfee | [3] |
7 | Edward W. Felten | [1] [2] [5] [6] |
8 | David Freeman | [39] |
9 | Craig Gentry | [9] [41] |
10 | Philippe Golle | [4] |
11 | Vipul Goyal | [19] [36] |
12 | J. Alex Halderman (John A. Halderman) | [2] [5] [6] [28] |
13 | Susan Hohenberger | [40] |
14 | Ari Juels | [5] |
15 | Jonathan Katz | [33] [39] |
16 | Steve Lu | [15] [36] |
17 | Patrick Drew McDaniel (Patrick McDaniel) | [18] |
18 | Qixiang Mei | [10] |
19 | Rafail Ostrovsky | [15] [29] |
20 | Omkant Pandey | [19] |
21 | Periklis A. Papakonstantinou | [32] |
22 | Chris Peikert | [22] [30] [34] |
23 | Matthew Pirretti | [18] |
24 | Charles Rackoff | [32] |
25 | Amit Sahai | [1] [7] [14] [15] [19] [27] [29] [33] [36] |
26 | Hovav Shacham | [15] [21] [24] [35] |
27 | Emily Shen | [11] [21] [38] |
28 | Elaine Shi | [31] [38] |
29 | Diana K. Smetters | [3] |
30 | Dawn Xiaodong Song | [12] [37] |
31 | Jessica Staddon | [4] |
32 | Patrick Traynor | [18] |
33 | Yevgeniy Vahlis | [32] |
34 | Vinod Vaikuntanathan (V. Vinod) | [34] |