DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Brent Waters
Brent Waters
A Decade of Lattice Cryptography
Multi-Input Functional Encryption with Unbounded-Message Security
Algorithms and Complexity Results for Learning and Big Data
Cryptanalysis of Boyen's Attribute-Based Encryption Scheme
Access Control Encryption for General Policies from Standard Assumptions
Witness Encryption Instructor: Sanjam Garg Scribe: Fotis Iliopoulos
Ciphertext-Policy Attribute-Based Encryption: an Expressive, Efficient
Functional Encryption As Mediated Obfuscation
Obfuscating Compute-And-Compare Programs Under LWE
Fully Secure and Fast Signing from Obfuscation
Functional Encryption: New Proof Techniques and Advancing Capabilities
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
40Th ACM Symposium on Theory of Computing (STOC 2008) Saturday
Indistinguishability Obfuscation from Well-Founded Assumptions
Lattice-Based DAPS and Generalizations: Self-Enforcement in Signature Schemes
Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security
How to Run Turing Machines on Encrypted Data
Constructing Verifiable Random Functions with Large Input Spaces
Top View
Usable Human Authentication: a Quantitative Treatment Jeremiah Blocki CMU-CS-14-108 June 30, 2014
Computing on Authenticated Data
K-Anonymously Private Search Over Encrypted Data
Outsourcing the Decryption of ABE Ciphertexts
Contents U U U
UCLA Electronic Theses and Dissertations
High-Precision Arithmetic in Homomorphic Encryption
Efficient Statically-Secure Large-Universe Multi-Authority
Caltech/Mit Voting Technology Project
Functional Encryption: Definitions and Challenges
Visions of Cryptography
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
Parameter Selection in Lattice-Based Cryptography
Low-Complexity Cryptographic Hash Functions∗
Association for Computing Machinery 2 Penn Plaza, Suite 701, New York
Encrypted Messages from the Heights of Cryptomania
Brent Waters
Multiparty Non-Interactive Key Exchange and More From
How to Run Turing Machines on Encrypted Data
New Privacy-Preserving Architectures for Identity-/Attribute-Based Encryption
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
Low-Complexity Cryptographic Hash Functions∗