Brent R. Waters
List of publications from the
2009 |
41 | EE | Craig Gentry,
Brent Waters:
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts).
EUROCRYPT 2009: 171-188 |
40 | EE | Susan Hohenberger,
Brent Waters:
Realizing Hash-and-Sign Signatures under Standard Assumptions.
EUROCRYPT 2009: 333-350 |
39 | EE | Dan Boneh,
David Freeman,
Jonathan Katz,
Brent Waters:
Signing a Linear Subspace: Signature Schemes for Network Coding.
Public Key Cryptography 2009: 68-87 |
38 | EE | Emily Shen,
Elaine Shi,
Brent Waters:
Predicate Privacy in Encryption Systems.
TCC 2009: 457-473 |
37 | EE | John Bethencourt,
Dawn Xiaodong Song,
Brent Waters:
New Techniques for Private Stream Searching.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
2008 |
36 | EE | Vipul Goyal,
Steve Lu,
Amit Sahai,
Brent Waters:
Black-box accountable authority identity-based encryption.
ACM Conference on Computer and Communications Security 2008: 427-436 |
35 | EE | Hovav Shacham,
Brent Waters:
Compact Proofs of Retrievability.
ASIACRYPT 2008: 90-107 |
34 | EE | Chris Peikert,
Vinod Vaikuntanathan,
Brent Waters:
A Framework for Efficient and Composable Oblivious Transfer.
CRYPTO 2008: 554-571 |
33 | EE | Jonathan Katz,
Amit Sahai,
Brent Waters:
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
EUROCRYPT 2008: 146-162 |
32 | EE | Dan Boneh,
Periklis A. Papakonstantinou,
Charles Rackoff,
Yevgeniy Vahlis,
Brent Waters:
On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations.
FOCS 2008: 283-292 |
31 | EE | Elaine Shi,
Brent Waters:
Delegating Capabilities in Predicate Encryption Systems.
ICALP (2) 2008: 560-578 |
30 | EE | Chris Peikert,
Brent Waters:
Lossy trapdoor functions and their applications.
STOC 2008: 187-196 |
2007 |
29 | EE | Rafail Ostrovsky,
Amit Sahai,
Brent Waters:
Attribute-based encryption with non-monotonic access structures.
ACM Conference on Computer and Communications Security 2007: 195-203 |
28 | EE | J. Alex Halderman,
Brent Waters:
Harvesting verifiable challenges from oblivious online sources.
ACM Conference on Computer and Communications Security 2007: 330-341 |
27 | EE | John Bethencourt,
Amit Sahai,
Brent Waters:
Ciphertext-Policy Attribute-Based Encryption.
IEEE Symposium on Security and Privacy 2007: 321-334 |
26 | EE | John Bethencourt,
Dan Boneh,
Brent Waters:
Cryptographic Methods for Storing Ballots on a Voting Machine.
NDSS 2007 |
25 | EE | Xavier Boyen,
Brent Waters:
Full-Domain Subgroup Hiding and Constant-Size Group Signatures.
Public Key Cryptography 2007: 1-15 |
24 | EE | Hovav Shacham,
Brent Waters:
Efficient Ring Signatures Without Random Oracles.
Public Key Cryptography 2007: 166-180 |
23 | EE | Dan Boneh,
Brent Waters:
Conjunctive, Subset, and Range Queries on Encrypted Data.
TCC 2007: 535-554 |
22 | EE | Chris Peikert,
Brent Waters:
Lossy Trapdoor Functions and Their Applications.
Electronic Colloquium on Computational Complexity (ECCC) 14(080): (2007) |
2006 |
21 | EE | Xavier Boyen,
Hovav Shacham,
Emily Shen,
Brent Waters:
Forward-secure signatures with untrusted update.
ACM Conference on Computer and Communications Security 2006: 191-200 |
20 | EE | Dan Boneh,
Brent Waters:
A fully collusion resistant broadcast, trace, and revoke system.
ACM Conference on Computer and Communications Security 2006: 211-220 |
19 | EE | Vipul Goyal,
Omkant Pandey,
Amit Sahai,
Brent Waters:
Attribute-based encryption for fine-grained access control of encrypted data.
ACM Conference on Computer and Communications Security 2006: 89-98 |
18 | EE | Matthew Pirretti,
Patrick Traynor,
Patrick McDaniel,
Brent Waters:
Secure attribute-based systems.
ACM Conference on Computer and Communications Security 2006: 99-112 |
17 | EE | Xavier Boyen,
Brent Waters:
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles).
CRYPTO 2006: 290-307 |
16 | EE | Xavier Boyen,
Brent Waters:
Compact Group Signatures Without Random Oracles.
EUROCRYPT 2006: 427-444 |
15 | EE | Steve Lu,
Rafail Ostrovsky,
Amit Sahai,
Hovav Shacham,
Brent Waters:
Sequential Aggregate Signatures and Multisignatures Without Random Oracles.
EUROCRYPT 2006: 465-485 |
14 | EE | Dan Boneh,
Amit Sahai,
Brent Waters:
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys.
EUROCRYPT 2006: 573-592 |
13 | EE | Adam Barth,
Dan Boneh,
Brent Waters:
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption.
Financial Cryptography 2006: 52-64 |
12 | EE | John Bethencourt,
Dawn Xiaodong Song,
Brent Waters:
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract).
IEEE Symposium on Security and Privacy 2006: 132-139 |
11 | EE | Dan Boneh,
Emily Shen,
Brent Waters:
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.
Public Key Cryptography 2006: 229-240 |
2005 |
10 | EE | Xavier Boyen,
Qixiang Mei,
Brent Waters:
Direct chosen ciphertext security from identity-based techniques.
ACM Conference on Computer and Communications Security 2005: 320-329 |
9 | EE | Dan Boneh,
Craig Gentry,
Brent Waters:
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys.
CRYPTO 2005: 258-275 |
8 | EE | Brent Waters:
Efficient Identity-Based Encryption Without Random Oracles.
EUROCRYPT 2005: 114-127 |
7 | EE | Amit Sahai,
Brent Waters:
Fuzzy Identity-Based Encryption.
EUROCRYPT 2005: 457-473 |
6 | EE | J. Alex Halderman,
Brent Waters,
Edward W. Felten:
A convenient method for securely managing passwords.
WWW 2005: 471-479 |
2004 |
5 | EE | Brent Waters,
Ari Juels,
J. Alex Halderman,
Edward W. Felten:
New client puzzle outsourcing techniques for DoS resistance.
ACM Conference on Computer and Communications Security 2004: 246-256 |
4 | EE | Philippe Golle,
Jessica Staddon,
Brent R. Waters:
Secure Conjunctive Keyword Search over Encrypted Data.
ACNS 2004: 31-45 |
3 | EE | Brent R. Waters,
Dirk Balfanz,
Glenn Durfee,
Diana K. Smetters:
Building an Encrypted and Searchable Audit Log.
NDSS 2004 |
2 | EE | J. Alex Halderman,
Brent R. Waters,
Edward W. Felten:
Privacy management for portable recording devices.
WPES 2004: 16-24 |
2003 |
1 | EE | Brent R. Waters,
Edward W. Felten,
Amit Sahai:
Receiver anonymity via incomparable public keys.
ACM Conference on Computer and Communications Security 2003: 112-121 |