Follow
Brent Waters
Brent Waters
Verified email at cs.utexas.edu - Homepage
Title
Cited by
Cited by
Year
Attribute-based encryption for fine-grained access control of encrypted data
V Goyal, O Pandey, A Sahai, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
71942006
Ciphertext-policy attribute-based encryption
J Bethencourt, A Sahai, B Waters
2007 IEEE symposium on security and privacy (SP'07), 321-334, 2007
69702007
Fuzzy identity-based encryption
A Sahai, B Waters
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
62472005
Efficient identity-based encryption without random oracles
B Waters
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
26882005
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
B Waters
International workshop on public key cryptography, 53-70, 2011
26862011
Compact proofs of retrievability
H Shacham, B Waters
Journal of cryptology 26 (3), 442-483, 2013
26222013
Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
C Gentry, A Sahai, B Waters
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
19842013
Conjunctive, subset, and range queries on encrypted data
D Boneh, B Waters
Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007 …, 2007
19162007
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
A Lewko, T Okamoto, A Sahai, K Takashima, B Waters
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
16892010
Decentralizing attribute-based encryption
A Lewko, B Waters
Annual international conference on the theory and applications of …, 2011
16872011
Candidate indistinguishability obfuscation and functional encryption for all circuits
S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters
SIAM Journal on Computing 45 (3), 882-929, 2016
16252016
Attribute-based encryption with non-monotonic access structures
R Ostrovsky, A Sahai, B Waters
Proceedings of the 14th ACM conference on Computer and communications …, 2007
15552007
Collusion resistant broadcast encryption with short ciphertexts and private keys
D Boneh, C Gentry, B Waters
Annual international cryptology conference, 258-275, 2005
14692005
Predicate encryption supporting disjunctions, polynomial equations, and inner products
J Katz, A Sahai, B Waters
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
14482008
Functional encryption: Definitions and challenges
D Boneh, A Sahai, B Waters
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
13192011
Secure conjunctive keyword search over encrypted data
P Golle, J Staddon, B Waters
Applied Cryptography and Network Security: Second International Conference …, 2004
11322004
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
B Waters
Annual international cryptology conference, 619-636, 2009
11022009
Outsourcing the decryption of {ABE} ciphertexts
M Green, S Hohenberger, B Waters
20th USENIX security symposium (USENIX Security 11), 2011
10552011
A framework for efficient and composable oblivious transfer
C Peikert, V Vaikuntanathan, B Waters
Annual international cryptology conference, 554-571, 2008
8942008
Secure attribute-based systems
M Pirretti, P Traynor, P McDaniel, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
8292006
The system can't perform the operation now. Try again later.
Articles 1–20