Publications
2024
Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption
By Shafik Nassar, Brent Waters, David J. Wu
TCC 2024
Download (pdf)
Batch Arguments to NIZKs from One-Way Functions
By Eli Bradley and Brent Waters
TCC 2024
Download (pdf)
Batching Adaptively-Sound SNARGs for NP
By Lalita Devadas, Brent Waters, David J. Wu
TCC 2024
Download (pdf)
Adaptively Secure Attribute-Based Encryption from Witness Encryption
By Brent Waters and Daniel Wichs
TCC 2024
Download (pdf)
NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness
By Prabhanjan Ananth, Gilad Asharov, Vipul Goyal, Hadar Kaner, Pratik Soni and Brent Waters
SCN 2024
Download (pdf)
Reducing the CRS Size in Registered ABE Systems
By Rachit Garg, George Lu, Brent Waters, David J. Wu
CRYPTO 2024
Download (pdf)
Adaptive Security in SNARGs via iO and Lossy Functions
By Brent Waters and Mark Zhandry
CRYPTO 2024
Download (pdf)
A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors
By Brent Waters
STOC 2024
Download (pdf)
Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation
By Brent Waters and David Wu
STOC 2024
Download (pdf)
2023
Non-Interactive Anonymous Router with Quasi-Linear Router Computation
By Rex Fernando, Elaine Shi, Pratik Soni, Nikhil Vanjani, and Brent Waters
TCC 2023
Download (pdf)
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory
By Rachit Garg, George Lu, Brent Waters and David Wu
CCS 2023
Download (pdf)
Security-Preserving Distributed Samplers: How to Generate Any CRS in One Round Without Random Oracles
By Damiano Abram, Brent Waters and Mark Zhandry
CRYPTO 2023
Download (pdf)
Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM
By Brent Waters and Daniel Wichs
CRYPTO 2023
Download (pdf)
How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More
By Cody Freitag, Brent Waters and David Wu
CRYPTO 2023
Download (pdf)
On Non-uniform Security for Black-box Non-Interactive CCA Commitments
By Rachit Garg, Dakshita Khurana, George Lu and Brent Waters
Eurocrypt 2023
Download (pdf)
Registered Attribute-Based Encryption
By Susan Hohenberger, George Lu, Brent Waters and David Wu
Eurocrypt 2023
Download (pdf)
Fully Adaptive Decentralized Multi-Authority ABE
By Pratish Datta, Ilan Komargodski and Brent Waters
Eurocrypt 2023
Download (pdf)
Decentralized Multi-authority ABE for NC1 from BDH
By Pratish Datta, Ilan Komargodski and Brent Waters
Journal of Cryptology 2023
Download (pdf)
Non-Interactive Publicly-Verifiable Delegation of Committed Programs
By Riddhi Ghosal, Amit Sahai and Brent Waters
PKC 2023
Download (pdf)
2022
How to Sample a Discrete Gaussian (and more) from a Random Oracle
By George Lu and Brent Waters
TCC 2022
Download (pdf)
Multi-authority ABE from Lattices Without Random Oracles
By Brent Waters, Hoeteck Wee and David J. Wu
TCC 2022
Download (pdf)
Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation
By Rachit Garg, Kristin Sheridan, Brent Waters and David J. Wu
TCC 2022
Download (pdf)
Adaptive Multiparty NIKE
By Venkata Koppula, Brent Waters and Mark Zhandry
TCC 2022
Download (pdf)
Batch Arguments for NP and More from Standard Bilinear Group Assumptions
By Brent Waters and David J. Wu
CRYPTO 2022
Download (pdf)
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption
By Rachit Garg, Rishab Goyal, George Lu and Brent Waters
Eurocrypt 2022
Download (pdf)
2021
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
By Rishab Goyal, Sam Kim, Brent Waters and David J. Wu
Asiacrypt 2021
Download (pdf)
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
By Rishab Goyal, Jiahui Liu and Brent Water
Asiacrypt 2021
Download (pdf)
Bounded Collusion ABE for TMs from IBE
By Rishab Goyal, Ridwan Syed and Brent Waters
Asiacrypt 2021
Download (pdf)
Targeted Lossy Functions and Applications
By Willy Quach, Brent Waters and Daniel Wichs
CRYPTO 2021
Download (pdf)
On the CCA Compatibility of Public-Key Infrastructure
By Dakshita Khurana and Brent Waters
PKC 2021
Download (pdf)
Decentralized Multi-Authority ABE for DNFs from LWE
By Pratish Datta, Ilan Komargodski and Brent Waters
EUROCRYPT 2021
Download (pdf)
Black-Box Non-Interactive Non-Malleable Commitments
By Rachit Garg, Dakshita Khurana, George Lu and Brent Waters
EUROCRYPT 2021
Download (pdf)
2020
On Perfect Correctness in (Lockable) Obfuscation
By Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters
TCC 2020
Download (pdf)
New Techniques in Replica Encodings with Client Setup
By Rachit Garg, George Lu and Brent Waters
TCC 2020
Download (pdf)
Chosen Ciphertext Security from Injective Trapdoor Functions
By Susan Hohenberger, Venkata Koppula and Brent Waters
CRYPTO 2020
Download (pdf)
Best Paper Award
New Constructions of Hinting PRGs, OWFs with Encryption, and More
By Rishab Goyal, Satyanarayana Vusirikala and Brent Waters
CRYPTO 2020
Download (pdf)
PPE Circuits: Formal Definition to Software Automation
By Susan Hohenberger, Satyanarayana Vusirikala and Brent Waters
CCS 2020
New Methods and Abstractions for RSA-Based Forward Secure Signatures
By By Susan Hohenberger and Brent Waters
ACNS 2020
Download (pdf)
2019
Output Compression, MPC, and iO for Turing Machines
By Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai and Brent Waters
ASIACRYPT 2019
Download (pdf)
Watermarking Public-Key Cryptographic Primitives
By Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters and David J. Wu
CRYPTO 2019
Download (pdf)
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
By Venkata Koppula and Brent Waters
CRYPTO 2019
Download (pdf)
ABE for DFA from k-Lin
By Junqing Gong, Brent Waters and Hoeteck Wee
CRYPTO 2019
Download (pdf)
Broadcast and Trace with N^e Ciphertext Size from Standard Assumptions
By Rishab Goyal, Willy Quach, Brent Waters and Daniel Wichs
CRYPTO 2019
Download (pdf)
Adaptively Secure Constrained Pseudorandom Functions
By Dennis Hofheinz, Akshay Kamath, Venkata Koppula and Brent Waters
Financial Cryptography 2019
Download (pdf)
Collusion Resistant Broadcast and Trace from Positional Witness Encryption
By Rishab Goyal, Satyanarayana Vusirikala and Brent Waters
PKC 2019
Download (pdf)
New Approaches to Traitor Tracing with Embedded Identities
By Rishab Goyal, Venkata Koppula and Brent Waters
TCC 2019
Download (pdf)
2018
Risky Traitor Tracing and New Differential Privacy Negative Results
By Rishab Goyal, Venkata Koppula, Andrew Russell and Brent Waters
CRYPTO 2018
Download (pdf)
Traitor-Tracing from LWE Made Simple and Attribute-Based
By Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs
TCC 2018
Download (pdf)
Upgrading to Functional Encryption
By Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai and Brent Waters
TCC 2018
Download (pdf)
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles
By Shashank Agrawal, Venkata Koppula and Brent Waters
TCC 2018
Download (pdf)
Collusion Resistant Traitor Tracing from Learning with Errors
By Rishab Goyal, Venkata Koppula and Brent Waters
STOC 2018
Download (pdf)
Synchronized Aggregate Signatures from the RSA Assumption
By Susan Hohenberger and Brent Waters
Eurocrypt 2018
Download (pdf)
2017
Lockable Obfuscation
By Rishab Goyal, Venkata Koppula and Brent Waters
FOCS 2017
Download (pdf)
A Generic Approach to Constructing and Proving Verifiable Random Functions
By Rishab Goyal, Susan Hohenberger, Venkata Koppula and Brent Waters
TCC 2017
Download (pdf)
Signature Schemes with Randomized Verification
By Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran and Brent Waters
ACNS 2017
Download (pdf)
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
By Rishab Goyal, Venkata Koppula and Brent Waters
Eurocrypt 2017
Download (pdf)
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
By Rishab Goyal, Venkata Koppula and Brent Waters
PKC 2017
Download (pdf)
Universal Samplers with Fast Verification
By Venkata Koppula, Andrew Poelstra and Brent Waters
PKC 2017
Download (pdf)
2016
How to Generate and use Universal Samplers
By Dennis Hofheinz, Tibor Jager, Dakshita Khurana,
Amit Sahai, Brent Waters and Mark Zhandry
Asiacrypt 2016
Download (pdf)
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
By Rishab Goyal, Venkata Koppula and Brent Waters
TCC 2016-B
Download (pdf)
Circular Security Separations for Arbitrary Length Cycles from LWE
By Venkata Koppula and Brent Waters
CRYPTO 2016
Download (pdf)
Deterministic Public-Key Encryption Under Continual Leakage
By Venkata Koppula, Omkant Pandey, Yannis Rouselakis and Brent Waters
ACNS 2016
Download (pdf)
Constrained Pseudorandom Functions for Unconstrained Inputs
By Apoorvaa Deshpande, Venkata Koppula and Brent Waters
Eurocrypt 2016
Download (pdf)
New Negative Results on Differing-Inputs Obfuscation
By Mihir Bellare and Igors Stepanovs and Brent Waters
Eurocrypt 2016
Download (pdf)
Time-Lock Puzzles from Randomized Encodings
By Nir Bitansky, Shafi Goldwasser, Abhishek Jain,
Omer Paneth, Vinod Vaikuntanathan and Brent Waters
ITCS 2016
Download (pdf)
2015
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
By Susan Hohenberger and Venkata Koppula and Brent Waters
Asiacrypt 2015
Download (pdf)
New Circular Security Counterexamples from Decision Linear and Learning with Errors
By Allison Bishop and Susan Hohenberger and Brent Waters
Asiacrypt 2015
Download (pdf)
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
By Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs
Asiacrypt 2015
Download (pdf)
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
By Craig Gentry, Allison Lewko, Amit Sahai and Brent Waters
FOCS 2015
Download (pdf)
A Punctured Programming Approach to Adaptively Secure
Functional Encryption
By Brent Waters
CRYPTO 2015
Download (pdf)
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
By Venkata Koppula, Allison Lewko and Brent Waters
STOC 2015
Download (pdf)
Universal Signature Aggregators
By Susan Hohenberger, Venkata Koppula and Brent Waters
Eurocrypt 2015
Download (pdf)
Separations in Circular Security for Arbitrary Length Key Cycles.
By Venkata Koppula, Kim Ramchen and Brent Waters
TCC 2015
Download (pdf)
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
By Yannis Rouselakis and Brent Waters
Financial Cryptography 2015
Download (pdf)
2014
Fully Secure and Fast Signing from Obfuscation
By Kim Ramchen and Brent Waters
CCS 2014
Download (pdf)
Low Overhead Broadcast Encryption from Multilinear Maps
By Dan Boneh, Brent Waters and Mark Zhandry
Crypto 2014
Download (pdf)
Witness Encryption from Instance Independent Assumptions
By Craig Gentry, Allison Bishop Lewko and Brent Waters
Crypto 2014
Download (pdf)
Rethinking Verifiably Encrypted Signatures: A
Gap in Functionality and Potential Solutions
By Theresa Calderon and Sarah Meiklejohn and Hovav Shacham and Brent Waters
CT-RSA 2014
Download (pdf)
Why Proving HIBE Systems Secure is Difficult
By Allison Bishop Lewko and Brent Waters
Eurocrypt 2014
Download (pdf)
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
By Susan Hohenberger, Amit Sahai and Brent Waters
Eurocrypt 2014
Download (pdf)
Online/Offline Attribute-based Encryption
By Susan Hohenberger and Brent Waters
PKC 2014
Download (pdf)
Relaxed Two-to-One Recoding Schemes
By Omkant Pandey and Kim Ramchen and Brent Waters
SCN 2014
Download (pdf)
How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
By Amit Sahai and Brent Waters
STOC 2014
Download (pdf)
2013
Constrained Pseudorandom Functions and Their Applications
By Dan Boneh and Brent Waters
Asiacrypt 2013
Download (pdf)
New Constructions and Proof Methods for Large Universe Attribute-Based Encryption
By Yannis Rouselakis and Brent Waters
CCS 2013
Download (pdf)
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai and Brent Waters
FOCS 2013
Download (pdf)
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Identity-Based
By Craig Gentry, Amit Sahai Brent Waters
CRYPTO 2013
Download (pdf)
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
By Susan Hohenberger, Amit Sahai and Brent Waters
CRYPTO 2013
Download (pdf)
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz and Brent Waters
CRYPTO 2013
Download (pdf)
Attribute-Based Encryption for Circuits from Multilinear Maps
By Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai and Brent Waters
CRYPTO 2013
Download (pdf)
Witness Encryption and its Applications
By Sanjam Garg, Craig Gentry, Amit Sahai and Brent Waters
STOC 2013
Download (pdf)
Anon-Pass: Practical Anonymous Subscriptions
By Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, and Emmett Witchel
Proceedings of 2013 IEEE Symposium on Security and Privacy
Download (pdf)
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
By Karyn Benson, Hovav Shacham and Brent Waters
CT-RSA 2013
Download (pdf)
Attribute-Based Encryption with Fast Decryption
By Susan Hohenberger and Brent Waters
PKC 2013
Download (pdf)
Reconstructing a Fragmented Face from a Cryptographic Identification Protocol
By Andy Luong, Michael Gerbush, Brent Waters and Kristen Grauman
WACV 2013
Download (pdf)
2012
Dual Form Signatures: An Approach for Proving Security from Static Assumptions
By Michael Gerbush, Allison Lewko, Adam O'Neill and Brent Waters
Asiacrypt 2012
Download (pdf)
Functional Encryption for Regular Languages
By Brent Waters
CRYPTO 2012
Download (pdf)
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
By Amit Sahai, Hakan Seyalioglu and Brent Waters
CRYPTO 2012
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
By Allison Lewko and Brent Waters
CRYPTO 2012
Download (pdf)
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
By Susan Hohenberger, Allison Lewko and Brent Waters
Eurocrypt 2012
Download (pdf)
Identity-Based (Lossy) Trapdoor Functions and Applications
By Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters
Eurocrypt 2012
Download (pdf)
Standard Security Does Not Imply Security Against Selective-Opening
By Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek
Eurocrypt 2012
Download (pdf)
Computing on Authenticated Data
By Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters
TCC 2012
Download (pdf)
Targeted Malleability: Homomorphic Encryption for Restricted Computations
By Dan Boneh and Gil Segev and Brent Waters
Innovations in Theoretical Computer Science (ITCS) 2012
Download (pdf)
2011
Storing Secrets on Continually Leaky Devices
By Yevgeniy Dodis, Allison Lewko, Brent Waters and Daniel Wichs
FOCS 2011
Download (pdf)
Outsourcing the Decryption of ABE Ciphertexts
By Matthew Green, Susan Hohenberger and Brent Waters
USENIX Security 2011
Download (pdf)
Cloaking Malware with the Trusted Platform Module
By Alan Dunn, Owen Hofmann, Brent Waters and Emmett Witchel
USENIX Security 2011
Download (pdf)
How to Leak on Key Updates
By Allison Lewko, Mark Lewko and Brent Waters
STOC 2011
Download (pdf)
Unbounded HIBE and Attribute-Based Encryption
By Allison Lewko and Brent Waters
Eurocrypt 2011
Download (pdf)
Decentralizing Attribute-Based Encryption
By Allison Lewko and Brent Waters
Eurocrypt 2011
Download (pdf)
Achieving Leakage Resilience Through Dual System Encryption
By Allison Lewko, Yannis Rouselakis, and Brent Waters
TCC 2011
Download (pdf)
Functional Encryption: Definitions and Challenges
By Dan Boneh, Amit Sahai, and Brent Waters
TCC 2011
Download (pdf)
Identity-Based Encryption Secure Against Selective Opening Attack
By Mihir Bellare, Brent Waters, and Scott Yilek
TCC 2011
Download (pdf)
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
By Brent Waters
PKC 2011
Download (pdf)
2010
On the Insecurity of Parallel Repetition for Leakage Resilience
By Allison Lewko and Brent Waters
FOCS 2010
Download (pdf)
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
By Sherman S.M. Chow, Yevgeniy Dodis, Yannis Rouselakis and Brent Waters
CCS 2010
Download (pdf)
Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
By Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai and Brent Waters
CCS 2010
Download (pdf)
Shrinking the Keys of Discrete-Log-Type Lossy
Trapdoor Functions
By Xavier Boyen
and Brent Waters
ACNS 2010
Download (pdf)
Fully Secure Functional Encryption: Attribute-Based Encryption and
(Hierarchical) Inner Product Encryption
By Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima,
and Brent Waters
Eurocrypt 2010
Download (pdf)
Constructing Verifiable Random Functions with Large Input Spaces
By Susan Hohenberger and Brent Waters
Eurocrypt 2010
Download (pdf)
Revocation Systems with Very Small Private Keys
By Allison, Lewko, Amit Sahai and Brent Waters
Proceedings of 2010 IEEE Symposium on Security and Privacy
Download (pdf)
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
By Scott Wolchok, Owen S. Hofmann, Nadia Heninger,
J. Alex Halderman, Christopher J. Rossbach, Edward W. Felten, Brent Waters, and Emmett Witchel
NDSS 2010
Download (pdf)
Fully Secure HIBE with Short Ciphertexts
By Allison Lewko and Brent Waters
TCC 2010
Download (pdf)
2009
Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants
By Allison Lewko and Brent Waters
CCS 2009
Download (pdf)
Dual System Encryption: Realizing Fully Secure IBE and HIBE under
Simple Assumptions
By Brent Waters
Crypto 2009
Download (pdf)
Short and Stateless Signatures from the RSA Assumption
By Susan Hohenberger and Brent Waters
Crypto 2009
Download (pdf)
Realizing Hash-and-Sign Signatures under Standard Assumptions
By Susan Hohenberger and Brent Waters
Eurocrypt 2009
Download (pdf)
Adaptive Security in Broadcast Encryption Systems
By Craig Gentry and Brent Waters
Eurocrypt 2009
Download (pdf)
Predicate Privacy in Encryption Systems
By Emily Shen, Elaine Shi, and Brent Waters
TCC 2009
Download (pdf)
Signing a Linear Subspace: Signature Schemes for Network Coding
By Dan Boneh, David Freeman, Jonathan Katz, and Brent Waters
PKC 2009
Download (pdf)
2008
Compact Proofs of Retrievability
By Hovav Shacham and Brent Waters
Asiacrypt 2008
Download (pdf)
Accountable Authority Identity-Based Encryption
By Vipul Goyal, Steve Lu, Amit Sahai, and Brent Waters
CCS 2008
On The Impossibility of Basing Identity Based Encryption on
Trapdoor Permutations
By Dan Boneh, Periklis Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, and Brent Waters
FOCS 2008
Download (pdf)
Delegating Capabilities in Predicate Encryption Systems
By Elaine Shi and Brent Waters
ICALP (Cryptographer's Track) 2008
Download (pdf)
A Framework for Efficient and Composable Oblivious Transfer
By Chris Peikert and Vinod Vaikuntanathan and Brent Waters
Crypto 2008
Download (pdf)
Lossy Trapdoor Functions and their Applications
By Chris Peikert and Brent Waters
STOC 2008
Download (pdf)
Predicate Encryption Supporting Disjunctions,
Polynomial Equations, and Inner Products
By Jonathan Katz and Amit Sahai and Brent Waters
Eurocrypt 2008
Download (pdf)
Analysis-Resistant Malware
By John Bethencourt, Dawn Song and Brent Waters
The 15th Annual Network & Distributed System Security Conference (NDSS 2008)
Download
(pdf)
2007
Harvesting Verifiable Challenges from Oblivious Online Sources
By Alex Halderman and Brent Waters
Proceedings of 14th ACM Conference on Computer and Communications Security (CCS 2007)
Download (pdf)
Attribute-Based Encryption with Non-Monotonic Access Structures
By Rafail Ostrovsky, Amit Sahai, and Brent Waters
Proceedings of 14th ACM Conference on Computer and Communications Security (CCS 2007)
Download (pdf)
Ciphertext-Policy Attribute-Based Encryption
By John Bethencourt, Amit Sahai, and Brent Waters
Proceedings of 2007 IEEE Symposium on Security and Privacy
Download (pdf)
Full-Domain Subgroup Hiding and Constant-Size Group Signatures
By Xavier Boyen and Brent Waters
Proceedings of 10th Workshop in Practice and Theory of
Public Key Cryptography (PKC 2007)
Awarded Best Paper
Download (pdf)
Efficient Ring Signatures without Random Oracles
By Hovav Shacham and Brent Waters
Proceedings of 10th Workshop in Practice and Theory of
Public Key Cryptography (PKC 2007)
Download (pdf)
Cryptographic Methods for Storing Ballots on a Voting Machine
By John Bethencourt, Dan Boneh and Brent Waters
The 14th Annual Network & Distributed System Security Conference (NDSS 2007)
Download (pdf)
Conjunctive, Subset, and Range Queries on Encrypted Data
By Dan Boneh and Brent Waters
The Fourth Theory of Cryptography Conference (TCC 2007)
Download (pdf)
2006
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
By Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters
Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
Download (pdf)
Forward Secure Signatures with Untrusted Update
By Xavier Boyen, Hovav Shacham, Emily Shen, and Brent Waters
Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
Download (pdf)
Secure Attribute-Based Systems
By Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters
Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
Download (pdf)
A Fully Collusion Resistant Broadcast, Trace and Revoke System
By Dan Boneh and Brent Waters
Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
Download (pdf)
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
By Xavier Boyen and Brent Waters
Proceeding of Crypto 2006
Download (pdf)
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
By Dan Boneh, Amit Sahai, and Brent Waters
Proceeding of Eurocrypt 2006
Download (pdf)
Sequential Aggregate Signatures and Multisignatures Without Random Oracles
By Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
Proceeding of Eurocrypt 2006
Download (pdf)
Compact Group Signatures Without Random Oracles
By Xavier Boyen and Brent Waters
Proceeding of Eurocrypt 2006
Download (pdf)
New Constructions and Practical
Applications for Private Stream Searching (Extended Abstract)
By John Bethencourt, Dawn Song, and Brent Waters
Proceeding of 2006 IEEE Symposium on Security and Privacy
Download (pdf)
Strongly Unforgeable Signatures Based on Computational Difie-Hellman
By Dan Boneh, Emily Shen, and Brent Waters
Proceedings of 9th Workshop in Practice and Theory of
Public Key Cryptography (PKC 2006)
Download (pdf)
Private encrypted content distribution using private broadcast encryptions
By Adam Barth, Dan Boneh, and Brent Waters
10th Financial Cryptography and Data Security Conference (FC 06)
Download (pdf)
2005
Direct Chosen Ciphertext Security from Identity-Based Techniques
By Xavier Boyen, Qixiang Mei, and Brent Waters
Proceedings of 12th ACM Conference on Computer and Communications Security (CCS 2005)
Download (pdf)
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
By Dan Boneh, Craig Gentry, and Brent Waters
Proceedings of Crypto 2005
Download (pdf)
Fuzzy Identity Based Encryption
By Amit Sahai and Brent Waters
Proceedings of Eurocrypt 2005
Download (pdf)
Efficient Identity-Based Encryption Without Random Oracles
By Brent Waters
Proceedings of Eurocrypt 2005
Download (pdf)
A Convenient Method for Securely Managing Passwords
By By J. Alex Halderman, Brent Waters, and Edward W. Felten
Proceedings of The 14th International World Wide Web Conference 2005
Download (pdf)
2004
New Client Puzzle Outsourcing Techniques for DoS Resistance
By Brent Waters, Ari Juels, J. Alex Halderman, and Edward W. Felten
The 11th ACM Conference on Computer and Communications Security (CCS 2004)
Download (pdf)
Privacy Management for Portable Recording Devices
By J. Alex Halderman, Brent Waters, and Edward W. Felten
The 3rd Workshop on Privacy in Electronic Society (WPES 2004)
Download (pdf)
Secure Conjunctive Keyword Search over Encrypted Data
By Philippe Golle, Jessica Staddon, and Brent Waters
Applied Cryptography and Network Security (ACNS 2004)
Download (pdf)
Building an Encrypted and Searchable Audit Log
By Brent R. Waters, Dirk Balfanz, Glenn Durfee, and D.K. Smetters
The 11th Annual Network and Distributed System Security Symposium
(NDSS 2004)
Download (pdf)
Talk (ppt)
2003
Receiver Anonymity via Incomparable Public Keys
By Brent R. Waters, Edward W. Felten and Amit Sahai
10th ACM Conference on Computer and Communications Security (CCS 2003)
Download (pdf)
Talk (ppt)
Secure, Private Proofs of Location
By Brent R. Waters and Edward W. Felten
Princeton Computer Science TR-667-03
Download (pdf)
Link to
Technical Report