dblp.uni-trier.dewww.uni-trier.de

Brent Waters

Brent R. Waters

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
41EECraig Gentry, Brent Waters: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). EUROCRYPT 2009: 171-188
40EESusan Hohenberger, Brent Waters: Realizing Hash-and-Sign Signatures under Standard Assumptions. EUROCRYPT 2009: 333-350
39EEDan Boneh, David Freeman, Jonathan Katz, Brent Waters: Signing a Linear Subspace: Signature Schemes for Network Coding. Public Key Cryptography 2009: 68-87
38EEEmily Shen, Elaine Shi, Brent Waters: Predicate Privacy in Encryption Systems. TCC 2009: 457-473
37EEJohn Bethencourt, Dawn Xiaodong Song, Brent Waters: New Techniques for Private Stream Searching. ACM Trans. Inf. Syst. Secur. 12(3): (2009)
2008
36EEVipul Goyal, Steve Lu, Amit Sahai, Brent Waters: Black-box accountable authority identity-based encryption. ACM Conference on Computer and Communications Security 2008: 427-436
35EEHovav Shacham, Brent Waters: Compact Proofs of Retrievability. ASIACRYPT 2008: 90-107
34EEChris Peikert, Vinod Vaikuntanathan, Brent Waters: A Framework for Efficient and Composable Oblivious Transfer. CRYPTO 2008: 554-571
33EEJonathan Katz, Amit Sahai, Brent Waters: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. EUROCRYPT 2008: 146-162
32EEDan Boneh, Periklis A. Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, Brent Waters: On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. FOCS 2008: 283-292
31EEElaine Shi, Brent Waters: Delegating Capabilities in Predicate Encryption Systems. ICALP (2) 2008: 560-578
30EEChris Peikert, Brent Waters: Lossy trapdoor functions and their applications. STOC 2008: 187-196
2007
29EERafail Ostrovsky, Amit Sahai, Brent Waters: Attribute-based encryption with non-monotonic access structures. ACM Conference on Computer and Communications Security 2007: 195-203
28EEJ. Alex Halderman, Brent Waters: Harvesting verifiable challenges from oblivious online sources. ACM Conference on Computer and Communications Security 2007: 330-341
27EEJohn Bethencourt, Amit Sahai, Brent Waters: Ciphertext-Policy Attribute-Based Encryption. IEEE Symposium on Security and Privacy 2007: 321-334
26EEJohn Bethencourt, Dan Boneh, Brent Waters: Cryptographic Methods for Storing Ballots on a Voting Machine. NDSS 2007
25EEXavier Boyen, Brent Waters: Full-Domain Subgroup Hiding and Constant-Size Group Signatures. Public Key Cryptography 2007: 1-15
24EEHovav Shacham, Brent Waters: Efficient Ring Signatures Without Random Oracles. Public Key Cryptography 2007: 166-180
23EEDan Boneh, Brent Waters: Conjunctive, Subset, and Range Queries on Encrypted Data. TCC 2007: 535-554
22EEChris Peikert, Brent Waters: Lossy Trapdoor Functions and Their Applications. Electronic Colloquium on Computational Complexity (ECCC) 14(080): (2007)
2006
21EEXavier Boyen, Hovav Shacham, Emily Shen, Brent Waters: Forward-secure signatures with untrusted update. ACM Conference on Computer and Communications Security 2006: 191-200
20EEDan Boneh, Brent Waters: A fully collusion resistant broadcast, trace, and revoke system. ACM Conference on Computer and Communications Security 2006: 211-220
19EEVipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters: Attribute-based encryption for fine-grained access control of encrypted data. ACM Conference on Computer and Communications Security 2006: 89-98
18EEMatthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters: Secure attribute-based systems. ACM Conference on Computer and Communications Security 2006: 99-112
17EEXavier Boyen, Brent Waters: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). CRYPTO 2006: 290-307
16EEXavier Boyen, Brent Waters: Compact Group Signatures Without Random Oracles. EUROCRYPT 2006: 427-444
15EESteve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters: Sequential Aggregate Signatures and Multisignatures Without Random Oracles. EUROCRYPT 2006: 465-485
14EEDan Boneh, Amit Sahai, Brent Waters: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. EUROCRYPT 2006: 573-592
13EEAdam Barth, Dan Boneh, Brent Waters: Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. Financial Cryptography 2006: 52-64
12EEJohn Bethencourt, Dawn Xiaodong Song, Brent Waters: New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 132-139
11EEDan Boneh, Emily Shen, Brent Waters: Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. Public Key Cryptography 2006: 229-240
2005
10EEXavier Boyen, Qixiang Mei, Brent Waters: Direct chosen ciphertext security from identity-based techniques. ACM Conference on Computer and Communications Security 2005: 320-329
9EEDan Boneh, Craig Gentry, Brent Waters: Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. CRYPTO 2005: 258-275
8EEBrent Waters: Efficient Identity-Based Encryption Without Random Oracles. EUROCRYPT 2005: 114-127
7EEAmit Sahai, Brent Waters: Fuzzy Identity-Based Encryption. EUROCRYPT 2005: 457-473
6EEJ. Alex Halderman, Brent Waters, Edward W. Felten: A convenient method for securely managing passwords. WWW 2005: 471-479
2004
5EEBrent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten: New client puzzle outsourcing techniques for DoS resistance. ACM Conference on Computer and Communications Security 2004: 246-256
4EEPhilippe Golle, Jessica Staddon, Brent R. Waters: Secure Conjunctive Keyword Search over Encrypted Data. ACNS 2004: 31-45
3EEBrent R. Waters, Dirk Balfanz, Glenn Durfee, Diana K. Smetters: Building an Encrypted and Searchable Audit Log. NDSS 2004
2EEJ. Alex Halderman, Brent R. Waters, Edward W. Felten: Privacy management for portable recording devices. WPES 2004: 16-24
2003
1EEBrent R. Waters, Edward W. Felten, Amit Sahai: Receiver anonymity via incomparable public keys. ACM Conference on Computer and Communications Security 2003: 112-121

Coauthor Index

1Dirk Balfanz [3]
2Adam Barth [13]
3John Bethencourt [12] [26] [27] [37]
4Dan Boneh [9] [11] [13] [14] [20] [23] [26] [32] [39]
5Xavier Boyen [10] [16] [17] [21] [25]
6Glenn Durfee [3]
7Edward W. Felten [1] [2] [5] [6]
8David Freeman [39]
9Craig Gentry [9] [41]
10Philippe Golle [4]
11Vipul Goyal [19] [36]
12J. Alex Halderman (John A. Halderman) [2] [5] [6] [28]
13Susan Hohenberger [40]
14Ari Juels [5]
15Jonathan Katz [33] [39]
16Steve Lu [15] [36]
17Patrick Drew McDaniel (Patrick McDaniel) [18]
18Qixiang Mei [10]
19Rafail Ostrovsky [15] [29]
20Omkant Pandey [19]
21Periklis A. Papakonstantinou [32]
22Chris Peikert [22] [30] [34]
23Matthew Pirretti [18]
24Charles Rackoff [32]
25Amit Sahai [1] [7] [14] [15] [19] [27] [29] [33] [36]
26Hovav Shacham [15] [21] [24] [35]
27Emily Shen [11] [21] [38]
28Elaine Shi [31] [38]
29Diana K. Smetters [3]
30Dawn Xiaodong Song [12] [37]
31Jessica Staddon [4]
32Patrick Traynor [18]
33Yevgeniy Vahlis [32]
34Vinod Vaikuntanathan (V. Vinod) [34]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)