BibTeX records: Brent Waters

download as .bib file

@article{DBLP:journals/iacr/WatersW24,
  author       = {Brent Waters and
                  David J. Wu},
  title        = {Adaptively-Sound Succinct Arguments for {NP} from Indistinguishability
                  Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/165},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WatersW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthAGKSW24,
  author       = {Prabhanjan Ananth and
                  Gilad Asharov and
                  Vipul Goyal and
                  Hadar Kaner and
                  Pratik Soni and
                  Brent Waters},
  title        = {NIZKs with Maliciously Chosen {CRS:} Subversion Advice-ZK and Accountable
                  Soundness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/207},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthAGKSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatersZ24,
  author       = {Brent Waters and
                  Mark Zhandry},
  title        = {Adaptive Security in SNARGs via iO and Lossy Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {254},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/254},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WatersZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Waters24,
  author       = {Brent Waters},
  title        = {A New Approach for Non-Interactive Zero-Knowledge from Learning with
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/340},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Waters24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DattaKW23,
  author       = {Pratish Datta and
                  Ilan Komargodski and
                  Brent Waters},
  title        = {Decentralized Multi-authority {ABE} for sfNC\({}^{\mbox{1}}\) from
                  {BDH}},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {2},
  pages        = {6},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09445-7},
  doi          = {10.1007/S00145-023-09445-7},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/DattaKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001LW023,
  author       = {Rachit Garg and
                  George Lu and
                  Brent Waters and
                  David J. Wu},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key
                  Directory},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1093--1107},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623168},
  doi          = {10.1145/3576915.3623168},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001LW023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbramWZ23,
  author       = {Damiano Abram and
                  Brent Waters and
                  Mark Zhandry},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Security-Preserving Distributed Samplers: How to Generate Any {CRS}
                  in One Round Without Random Oracles},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {489--514},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_16},
  doi          = {10.1007/978-3-031-38557-5\_16},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbramWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/FreitagWW23,
  author       = {Cody Freitag and
                  Brent Waters and
                  David J. Wu},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast,
                  and More},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {498--531},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_16},
  doi          = {10.1007/978-3-031-38551-3\_16},
  timestamp    = {Mon, 14 Aug 2023 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/FreitagWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WatersW23,
  author       = {Brent Waters and
                  Daniel Wichs},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Universal Amplification of {KDM} Security: From 1-Key Circular to
                  Multi-Key {KDM}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {674--693},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_22},
  doi          = {10.1007/978-3-031-38545-2\_22},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WatersW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GargKLW23,
  author       = {Rachit Garg and
                  Dakshita Khurana and
                  George Lu and
                  Brent Waters},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {On Non-uniform Security for Black-Box Non-interactive {CCA} Commitments},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14004},
  pages        = {173--204},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30545-0\_7},
  doi          = {10.1007/978-3-031-30545-0\_7},
  timestamp    = {Thu, 20 Apr 2023 11:35:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GargKLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DattaKW23,
  author       = {Pratish Datta and
                  Ilan Komargodski and
                  Brent Waters},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Fully Adaptive Decentralized Multi-Authority {ABE}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14006},
  pages        = {447--478},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30620-4\_15},
  doi          = {10.1007/978-3-031-30620-4\_15},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DattaKW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HohenbergerLWW23,
  author       = {Susan Hohenberger and
                  George Lu and
                  Brent Waters and
                  David J. Wu},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Registered Attribute-Based Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14006},
  pages        = {511--542},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30620-4\_17},
  doi          = {10.1007/978-3-031-30620-4\_17},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HohenbergerLWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GhosalSW23,
  author       = {Riddhi Ghosal and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Non-Interactive Publicly-Verifiable Delegation of Committed Programs},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {575--605},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_20},
  doi          = {10.1007/978-3-031-31371-4\_20},
  timestamp    = {Fri, 05 May 2023 22:44:30 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GhosalSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FernandoSSVW23,
  author       = {Rex Fernando and
                  Elaine Shi and
                  Pratik Soni and
                  Nikhil Vanjani and
                  Brent Waters},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Non-Interactive Anonymous Router with Quasi-Linear Router Computation},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14371},
  pages        = {62--92},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48621-0\_3},
  doi          = {10.1007/978-3-031-48621-0\_3},
  timestamp    = {Wed, 06 Dec 2023 13:56:15 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/FernandoSSVW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FreitagWW23,
  author       = {Cody Freitag and
                  Brent Waters and
                  David J. Wu},
  title        = {How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast,
                  and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {812},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/812},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FreitagWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbramWZ23,
  author       = {Damiano Abram and
                  Brent Waters and
                  Mark Zhandry},
  title        = {Security-Preserving Distributed Samplers: How to Generate any {CRS}
                  in One Round without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {860},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/860},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbramWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatersW23,
  author       = {Brent Waters and
                  Daniel Wichs},
  title        = {Universal Amplification of {KDM} Security: From 1-Key Circular to
                  Multi-Key {KDM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1058},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1058},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatersW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargLWW23,
  author       = {Rachit Garg and
                  George Lu and
                  Brent Waters and
                  David J. Wu},
  title        = {Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key
                  Directory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1583},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1583},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GargLWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehPW23,
  author       = {Dan Boneh and
                  Aditi Partap and
                  Brent Waters},
  title        = {Accountable Multi-Signatures with Constant Size Public Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1793},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1793},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BradleyWW23,
  author       = {Eli Bradley and
                  Brent Waters and
                  David J. Wu},
  title        = {Batch Arguments to NIZKs from One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1938},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1938},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BradleyWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NassarWW23,
  author       = {Shafik Nassar and
                  Brent Waters and
                  David J. Wu},
  title        = {Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1967},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1967},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NassarWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WatersW22,
  author       = {Brent Waters and
                  David J. Wu},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Batch Arguments for sfNP and More from Standard Bilinear Group Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13508},
  pages        = {433--463},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15979-4\_15},
  doi          = {10.1007/978-3-031-15979-4\_15},
  timestamp    = {Wed, 19 Oct 2022 17:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WatersW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GargGLW22,
  author       = {Rachit Garg and
                  Rishab Goyal and
                  George Lu and
                  Brent Waters},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Dynamic Collusion Bounded Functional Encryption from Identity-Based
                  Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {736--763},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_25},
  doi          = {10.1007/978-3-031-07085-3\_25},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GargGLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KoppulaWZ22,
  author       = {Venkata Koppula and
                  Brent Waters and
                  Mark Zhandry},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Adaptive Multiparty {NIKE}},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {244--273},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_9},
  doi          = {10.1007/978-3-031-22365-5\_9},
  timestamp    = {Fri, 23 Dec 2022 17:47:38 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/KoppulaWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargSWW22,
  author       = {Rachit Garg and
                  Kristin Sheridan and
                  Brent Waters and
                  David J. Wu},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Fully Succinct Batch Arguments for sfNP from Indistinguishability
                  Obfuscation},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13747},
  pages        = {526--555},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22318-1\_19},
  doi          = {10.1007/978-3-031-22318-1\_19},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GargSWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/WatersWW22,
  author       = {Brent Waters and
                  Hoeteck Wee and
                  David J. Wu},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Multi-authority {ABE} from Lattices Without Random Oracles},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13747},
  pages        = {651--679},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22318-1\_23},
  doi          = {10.1007/978-3-031-22318-1\_23},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/WatersWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LuW22,
  author       = {George Lu and
                  Brent Waters},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {How to Sample a Discrete Gaussian (and more) from a Random Oracle},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {653--682},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_23},
  doi          = {10.1007/978-3-031-22365-5\_23},
  timestamp    = {Fri, 23 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/LuW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatersW22,
  author       = {Brent Waters and
                  David J. Wu},
  title        = {Batch Arguments for {NP} and More from Standard Bilinear Group Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/336},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatersW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001KLW22,
  author       = {Rachit Garg and
                  Dakshita Khurana and
                  George Lu and
                  Brent Waters},
  title        = {On Non-uniform Security for Black-box Non-Interactive {CCA} Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1032},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1032},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001KLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatersW022,
  author       = {Brent Waters and
                  Hoeteck Wee and
                  David J. Wu},
  title        = {Multi-Authority {ABE} from Lattices without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1194},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1194},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatersW022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuW22,
  author       = {George Lu and
                  Brent Waters},
  title        = {How to Sample a Discrete Gaussian (and more) from a Random Oracle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1227},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1227},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaKW22,
  author       = {Pratish Datta and
                  Ilan Komargodski and
                  Brent Waters},
  title        = {Fully Adaptive Decentralized Multi-Authority {ABE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1311},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1311},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaKW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppulaWZ22,
  author       = {Venkata Koppula and
                  Brent Waters and
                  Mark Zhandry},
  title        = {Adaptive Multiparty {NIKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1324},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1324},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppulaWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerLWW22,
  author       = {Susan Hohenberger and
                  George Lu and
                  Brent Waters and
                  David J. Wu},
  title        = {Registered Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1500},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1500},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerLWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GhosalSW22,
  author       = {Riddhi Ghosal and
                  Amit Sahai and
                  Brent Waters},
  title        = {Non-Interactive Publicly-Verifiable Delegation of Committed Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1508},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1508},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GhosalSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargSWW22,
  author       = {Rachit Garg and
                  Kristin Sheridan and
                  Brent Waters and
                  David J. Wu},
  title        = {Fully Succinct Batch Arguments for {NP} from Indistinguishability
                  Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1760},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1760},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GargSWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/SahaiW21,
  author       = {Amit Sahai and
                  Brent Waters},
  title        = {How to Use Indistinguishability Obfuscation: Deniable Encryption,
                  and More},
  journal      = {{SIAM} J. Comput.},
  volume       = {50},
  number       = {3},
  pages        = {857--908},
  year         = {2021},
  url          = {https://doi.org/10.1137/15M1030108},
  doi          = {10.1137/15M1030108},
  timestamp    = {Wed, 14 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/SahaiW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GoyalKWW21,
  author       = {Rishab Goyal and
                  Sam Kim and
                  Brent Waters and
                  David J. Wu},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13092},
  pages        = {250--280},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92078-4\_9},
  doi          = {10.1007/978-3-030-92078-4\_9},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GoyalKWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GoyalLW21,
  author       = {Rishab Goyal and
                  Jiahui Liu and
                  Brent Waters},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Adaptive Security via Deletion in Attribute-Based Encryption: Solutions
                  from Search Assumptions in Bilinear Groups},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  pages        = {311--341},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5\_11},
  doi          = {10.1007/978-3-030-92068-5\_11},
  timestamp    = {Fri, 03 Dec 2021 17:36:41 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GoyalLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GoyalSW21,
  author       = {Rishab Goyal and
                  Ridwan Syed and
                  Brent Waters},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Bounded Collusion {ABE} for TMs from {IBE}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  pages        = {371--402},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5\_13},
  doi          = {10.1007/978-3-030-92068-5\_13},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GoyalSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/QuachWW21,
  author       = {Willy Quach and
                  Brent Waters and
                  Daniel Wichs},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Targeted Lossy Functions and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {424--453},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_15},
  doi          = {10.1007/978-3-030-84259-8\_15},
  timestamp    = {Mon, 16 Aug 2021 09:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/QuachWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GargKLW21,
  author       = {Rachit Garg and
                  Dakshita Khurana and
                  George Lu and
                  Brent Waters},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Black-Box Non-interactive Non-malleable Commitments},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12698},
  pages        = {159--185},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77883-5\_6},
  doi          = {10.1007/978-3-030-77883-5\_6},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GargKLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DattaKW21,
  author       = {Pratish Datta and
                  Ilan Komargodski and
                  Brent Waters},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Decentralized Multi-authority {ABE} for DNFs from {LWE}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  pages        = {177--209},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5\_7},
  doi          = {10.1007/978-3-030-77870-5\_7},
  timestamp    = {Wed, 16 Jun 2021 11:49:32 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DattaKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KhuranaW21,
  author       = {Dakshita Khurana and
                  Brent Waters},
  editor       = {Juan A. Garay},
  title        = {On the {CCA} Compatibility of Public-Key Infrastructure},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {235--260},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_9},
  doi          = {10.1007/978-3-030-75248-4\_9},
  timestamp    = {Fri, 07 May 2021 15:40:46 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KhuranaW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2021-1,
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13042},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90459-3},
  doi          = {10.1007/978-3-030-90459-3},
  isbn         = {978-3-030-90458-6},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/2021-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2021-2,
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13043},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90453-1},
  doi          = {10.1007/978-3-030-90453-1},
  isbn         = {978-3-030-90452-4},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/2021-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tcc/2021-3,
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13044},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90456-2},
  doi          = {10.1007/978-3-030-90456-2},
  isbn         = {978-3-030-90455-5},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/2021-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaW21,
  author       = {Dakshita Khurana and
                  Brent Waters},
  title        = {On the {CCA} Compatibility of Public-Key Infrastructure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/271},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalLW21,
  author       = {Rishab Goyal and
                  Jiahui Liu and
                  Brent Waters},
  title        = {Adaptive Security via Deletion in Attribute-Based Encryption: Solutions
                  from Search Assumptions in Bilinear Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {343},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/343},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalSW21,
  author       = {Rishab Goyal and
                  Ridwan Syed and
                  Brent Waters},
  title        = {Bounded Collusion {ABE} for TMs from {IBE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {709},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/709},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalSW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGLW21,
  author       = {Rachit Garg and
                  Rishab Goyal and
                  George Lu and
                  Brent Waters},
  title        = {Dynamic Collusion Bounded Functional Encryption from Identity-Based
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {847},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/847},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/QuachWW21,
  author       = {Willy Quach and
                  Brent Waters and
                  Daniel Wichs},
  title        = {Targeted Lossy Functions and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {895},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/895},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/QuachWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaKW21,
  author       = {Pratish Datta and
                  Ilan Komargodski and
                  Brent Waters},
  title        = {Decentralized Multi-Authority {ABE} for NC{\^{}}1 from Computational-BDH},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1325},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1325},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaKW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/GoyalKW20,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Collusion Resistant Traitor Tracing from Learning with Errors},
  journal      = {{SIAM} J. Comput.},
  volume       = {49},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1137/18M1197825},
  doi          = {10.1137/18M1197825},
  timestamp    = {Thu, 26 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/siamcomp/GoyalKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HohenbergerW20,
  author       = {Susan Hohenberger and
                  Brent Waters},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {New Methods and Abstractions for RSA-Based Forward Secure Signatures},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12146},
  pages        = {292--312},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57808-4\_15},
  doi          = {10.1007/978-3-030-57808-4\_15},
  timestamp    = {Thu, 27 Aug 2020 11:49:09 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/HohenbergerW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HohenbergerVW20,
  author       = {Susan Hohenberger and
                  Satyanarayana Vusirikala and
                  Brent Waters},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {{PPE} Circuits: Formal Definition to Software Automation},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {391--408},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417230},
  doi          = {10.1145/3372297.3417230},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HohenbergerVW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalVW20,
  author       = {Rishab Goyal and
                  Satyanarayana Vusirikala and
                  Brent Waters},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {New Constructions of Hinting PRGs, OWFs with Encryption, and More},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {527--558},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_18},
  doi          = {10.1007/978-3-030-56784-2\_18},
  timestamp    = {Wed, 12 Aug 2020 14:16:56 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalVW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HohenbergerKW20,
  author       = {Susan Hohenberger and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Chosen Ciphertext Security from Injective Trapdoor Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {836--866},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_28},
  doi          = {10.1007/978-3-030-56784-2\_28},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HohenbergerKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalKVW20,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Satyanarayana Vusirikala and
                  Brent Waters},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {On Perfect Correctness in (Lockable) Obfuscation},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {229--259},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_9},
  doi          = {10.1007/978-3-030-64375-1\_9},
  timestamp    = {Tue, 15 Dec 2020 11:52:09 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GoyalKVW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GargLW20,
  author       = {Rachit Garg and
                  George Lu and
                  Brent Waters},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {New Techniques in Replica Encodings with Client Setup},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12552},
  pages        = {550--583},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64381-2\_20},
  doi          = {10.1007/978-3-030-64381-2\_20},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GargLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKWW20,
  author       = {Rishab Goyal and
                  Sam Kim and
                  Brent Waters and
                  David J. Wu},
  title        = {Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/316},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargLW20,
  author       = {Rachit Garg and
                  George Lu and
                  Brent Waters},
  title        = {New Techniques in Replica Encodings with Client Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/617},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GargLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerKW20,
  author       = {Susan Hohenberger and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Chosen Ciphertext Security from Injective Trapdoor Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {759},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/759},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerW20,
  author       = {Susan Hohenberger and
                  Brent Waters},
  title        = {New Methods and Abstractions for RSA-Based Forward Secure Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {874},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/874},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargKLW20,
  author       = {Rachit Garg and
                  Dakshita Khurana and
                  George Lu and
                  Brent Waters},
  title        = {Black-Box Non-Interactive Non-Malleable Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1197},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1197},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GargKLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaKW20,
  author       = {Pratish Datta and
                  Ilan Komargodski and
                  Brent Waters},
  title        = {Decentralized Multi-Authority {ABE} for DNFs from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1386},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1386},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BadrinarayananF19,
  author       = {Saikrishna Badrinarayanan and
                  Rex Fernando and
                  Venkata Koppula and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Output Compression, MPC, and iO for Turing Machines},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11921},
  pages        = {342--370},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34578-5\_13},
  doi          = {10.1007/978-3-030-34578-5\_13},
  timestamp    = {Tue, 26 Nov 2019 14:11:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BadrinarayananF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalKMWW19,
  author       = {Rishab Goyal and
                  Sam Kim and
                  Nathan Manohar and
                  Brent Waters and
                  David J. Wu},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Watermarking Public-Key Cryptographic Primitives},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {367--398},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_12},
  doi          = {10.1007/978-3-030-26954-8\_12},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalKMWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KoppulaW19,
  author       = {Venkata Koppula and
                  Brent Waters},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Realizing Chosen Ciphertext Security Generically in Attribute-Based
                  Encryption and Predicate Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {671--700},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_23},
  doi          = {10.1007/978-3-030-26951-7\_23},
  timestamp    = {Fri, 09 Aug 2019 14:22:41 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KoppulaW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GongWW19,
  author       = {Junqing Gong and
                  Brent Waters and
                  Hoeteck Wee},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {{ABE} for {DFA} from k-Lin},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {732--764},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_25},
  doi          = {10.1007/978-3-030-26951-7\_25},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GongWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalQWW19,
  author       = {Rishab Goyal and
                  Willy Quach and
                  Brent Waters and
                  Daniel Wichs},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Broadcast and Trace with N{\^{}}{\(\epsilon\)} Ciphertext Size from
                  Standard Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {826--855},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_27},
  doi          = {10.1007/978-3-030-26954-8\_27},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalQWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HofheinzKKW19,
  author       = {Dennis Hofheinz and
                  Akshay Kamath and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Ian Goldberg and
                  Tyler Moore},
  title        = {Adaptively Secure Constrained Pseudorandom Functions},
  booktitle    = {Financial Cryptography and Data Security - 23rd International Conference,
                  {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11598},
  pages        = {357--376},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-32101-7\_22},
  doi          = {10.1007/978-3-030-32101-7\_22},
  timestamp    = {Wed, 12 Aug 2020 17:59:02 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HofheinzKKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GoyalVW19,
  author       = {Rishab Goyal and
                  Satyanarayana Vusirikala and
                  Brent Waters},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Collusion Resistant Broadcast and Trace from Positional Witness Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_1},
  doi          = {10.1007/978-3-030-17259-6\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GoyalVW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalKW19,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {New Approaches to Traitor Tracing with Embedded Identities},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11892},
  pages        = {149--179},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36033-7\_6},
  doi          = {10.1007/978-3-030-36033-7\_6},
  timestamp    = {Mon, 25 Nov 2019 13:59:31 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GoyalKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalVW19,
  author       = {Rishab Goyal and
                  Satyanarayana Vusirikala and
                  Brent Waters},
  title        = {Collusion Resistant Broadcast and Trace from Positional Witness Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {31},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/031},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalVW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKMWW19,
  author       = {Rishab Goyal and
                  Sam Kim and
                  Nathan Manohar and
                  Brent Waters and
                  David J. Wu},
  title        = {Watermarking Public-Key Cryptographic Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {628},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/628},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKMWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GongWW19,
  author       = {Junqing Gong and
                  Brent Waters and
                  Hoeteck Wee},
  title        = {{ABE} for {DFA} from k-Lin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {630},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/630},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GongWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalQWW19,
  author       = {Rishab Goyal and
                  Willy Quach and
                  Brent Waters and
                  Daniel Wichs},
  title        = {Broadcast and Trace with N{\^{}}epsilon Ciphertext Size from Standard
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {636},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/636},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalQWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalVW19a,
  author       = {Rishab Goyal and
                  Satyanarayana Vusirikala and
                  Brent Waters},
  title        = {New Constructions of Hinting PRGs, OWFs with Encryption, and more},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {962},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/962},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalVW19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKW19,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {New Approaches to Traitor Tracing with Embedded Identities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {980},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/980},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKVW19,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Satyanarayana Vusirikala and
                  Brent Waters},
  title        = {On Perfect Correctness in (Lockable) Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1010},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKVW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalKRW18,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Andrew Russell and
                  Brent Waters},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Risky Traitor Tracing and New Differential Privacy Negative Results},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {467--497},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_16},
  doi          = {10.1007/978-3-319-96884-1\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalKRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HohenbergerW18,
  author       = {Susan Hohenberger and
                  Brent Waters},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Synchronized Aggregate Signatures from the {RSA} Assumption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {197--229},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_7},
  doi          = {10.1007/978-3-319-78375-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HohenbergerW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GoyalKW18,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Ilias Diakonikolas and
                  David Kempe and
                  Monika Henzinger},
  title        = {Collusion resistant traitor tracing from learning with errors},
  booktitle    = {Proceedings of the 50th Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2018, Los Angeles, CA, USA, June 25-29, 2018},
  pages        = {660--670},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3188745.3188844},
  doi          = {10.1145/3188745.3188844},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/GoyalKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChenVWWW18,
  author       = {Yilei Chen and
                  Vinod Vaikuntanathan and
                  Brent Waters and
                  Hoeteck Wee and
                  Daniel Wichs},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Traitor-Tracing from {LWE} Made Simple and Attribute-Based},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11240},
  pages        = {341--369},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03810-6\_13},
  doi          = {10.1007/978-3-030-03810-6\_13},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChenVWWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BadrinarayananK18,
  author       = {Saikrishna Badrinarayanan and
                  Dakshita Khurana and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Upgrading to Functional Encryption},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {629--658},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_23},
  doi          = {10.1007/978-3-030-03807-6\_23},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BadrinarayananK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalKW18,
  author       = {Shashank Agrawal and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Impossibility of Simulation Secure Functional Encryption Even with
                  Random Oracles},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {659--688},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_24},
  doi          = {10.1007/978-3-030-03807-6\_24},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerW18,
  author       = {Susan Hohenberger and
                  Brent Waters},
  title        = {Synchronized Aggregate Signatures from the {RSA} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananK18,
  author       = {Saikrishna Badrinarayanan and
                  Dakshita Khurana and
                  Amit Sahai and
                  Brent Waters},
  title        = {Upgrading to Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKW18,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Collusion Resistant Traitor Tracing from Learning with Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {346},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/346},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppulaW18,
  author       = {Venkata Koppula and
                  Brent Waters},
  title        = {Realizing Chosen Ciphertext Security Generically in Attribute-Based
                  Encryption and Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {847},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/847},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppulaW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananF18,
  author       = {Saikrishna Badrinarayanan and
                  Rex Fernando and
                  Venkata Koppula and
                  Amit Sahai and
                  Brent Waters},
  title        = {Output Compression, MPC, and iO for Turing Machines},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {866},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/866},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenVWWW18,
  author       = {Yilei Chen and
                  Vinod Vaikuntanathan and
                  Brent Waters and
                  Hoeteck Wee and
                  Daniel Wichs},
  title        = {Traitor-Tracing from {LWE} Made Simple and Attribute-Based},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {897},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/897},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenVWWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FreitagGHKLOTW17,
  author       = {Cody Freitag and
                  Rishab Goyal and
                  Susan Hohenberger and
                  Venkata Koppula and
                  Eysa Lee and
                  Tatsuaki Okamoto and
                  Jordan Tran and
                  Brent Waters},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Signature Schemes with Randomized Verification},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {373--389},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_19},
  doi          = {10.1007/978-3-319-61204-1\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FreitagGHKLOTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GoyalKW17,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Separating Semantic and Circular Security for Symmetric-Key Bit Encryption
                  from the Learning with Errors Assumption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10211},
  pages        = {528--557},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56614-6\_18},
  doi          = {10.1007/978-3-319-56614-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GoyalKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoyalKW17,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Chris Umans},
  title        = {Lockable Obfuscation},
  booktitle    = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2017, Berkeley, CA, USA, October 15-17, 2017},
  pages        = {612--621},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/FOCS.2017.62},
  doi          = {10.1109/FOCS.2017.62},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoyalKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GoyalKW17,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Serge Fehr},
  title        = {Separating {IND-CPA} and Circular Security for Unbounded Length Key
                  Cycles},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {232--246},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_10},
  doi          = {10.1007/978-3-662-54365-8\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GoyalKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KoppulaPW17,
  author       = {Venkata Koppula and
                  Andrew Poelstra and
                  Brent Waters},
  editor       = {Serge Fehr},
  title        = {Universal Samplers with Fast Verification},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {525--554},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_18},
  doi          = {10.1007/978-3-662-54388-7\_18},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KoppulaPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalHKW17,
  author       = {Rishab Goyal and
                  Susan Hohenberger and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {A Generic Approach to Constructing and Proving Verifiable Random Functions},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  pages        = {537--566},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3\_18},
  doi          = {10.1007/978-3-319-70503-3\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoyalHKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppulaPW17,
  author       = {Venkata Koppula and
                  Andrew Poelstra and
                  Brent Waters},
  title        = {Universal Samplers with Fast Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {12},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppulaPW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalHKW17,
  author       = {Rishab Goyal and
                  Susan Hohenberger and
                  Venkata Koppula and
                  Brent Waters},
  title        = {A Generic Approach to Constructing and Proving Verifiable Random Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalHKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKW17,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Separating Semantic and Circular Security for Symmetric-Key Bit Encryption
                  from the Learning with Errors Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKW17a,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Separating {IND-CPA} and Circular Security for Unbounded Length Key
                  Cycles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKW17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKW17b,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Lockable Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {274},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/274},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKW17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKRW17,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Andrew Russell and
                  Brent Waters},
  title        = {Risky Traitor Tracing and New Differential Privacy Negative Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1117},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKRW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/GargGH0SW16,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova and
                  Amit Sahai and
                  Brent Waters},
  title        = {Hiding secrets in software: a cryptographic approach to program obfuscation},
  journal      = {Commun. {ACM}},
  volume       = {59},
  number       = {5},
  pages        = {113--120},
  year         = {2016},
  url          = {https://doi.org/10.1145/2902313},
  doi          = {10.1145/2902313},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/GargGH0SW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/GargGH0SW16,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova and
                  Amit Sahai and
                  Brent Waters},
  title        = {Candidate Indistinguishability Obfuscation and Functional Encryption
                  for All Circuits},
  journal      = {{SIAM} J. Comput.},
  volume       = {45},
  number       = {3},
  pages        = {882--929},
  year         = {2016},
  url          = {https://doi.org/10.1137/14095772X},
  doi          = {10.1137/14095772X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/GargGH0SW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KoppulaPRW16,
  author       = {Venkata Koppula and
                  Omkant Pandey and
                  Yannis Rouselakis and
                  Brent Waters},
  editor       = {Mark Manulis and
                  Ahmad{-}Reza Sadeghi and
                  Steve A. Schneider},
  title        = {Deterministic Public-Key Encryption Under Continual Leakage},
  booktitle    = {Applied Cryptography and Network Security - 14th International Conference,
                  {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9696},
  pages        = {304--323},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39555-5\_17},
  doi          = {10.1007/978-3-319-39555-5\_17},
  timestamp    = {Fri, 07 Aug 2020 17:57:32 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KoppulaPRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HofheinzJKSWZ16,
  author       = {Dennis Hofheinz and
                  Tibor Jager and
                  Dakshita Khurana and
                  Amit Sahai and
                  Brent Waters and
                  Mark Zhandry},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {How to Generate and Use Universal Samplers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {715--744},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_24},
  doi          = {10.1007/978-3-662-53890-6\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HofheinzJKSWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KoppulaW16,
  author       = {Venkata Koppula and
                  Brent Waters},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Circular Security Separations for Arbitrary Length Cycles from {LWE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {681--700},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_24},
  doi          = {10.1007/978-3-662-53008-5\_24},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KoppulaW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DeshpandeKW16,
  author       = {Apoorvaa Deshpande and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Constrained Pseudorandom Functions for Unconstrained Inputs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {124--153},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_5},
  doi          = {10.1007/978-3-662-49896-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DeshpandeKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareSW16,
  author       = {Mihir Bellare and
                  Igors Stepanovs and
                  Brent Waters},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {New Negative Results on Differing-Inputs Obfuscation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {792--821},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_28},
  doi          = {10.1007/978-3-662-49896-5\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BitanskyG0PVW16,
  author       = {Nir Bitansky and
                  Shafi Goldwasser and
                  Abhishek Jain and
                  Omer Paneth and
                  Vinod Vaikuntanathan and
                  Brent Waters},
  editor       = {Madhu Sudan},
  title        = {Time-Lock Puzzles from Randomized Encodings},
  booktitle    = {Proceedings of the 2016 {ACM} Conference on Innovations in Theoretical
                  Computer Science, Cambridge, MA, USA, January 14-16, 2016},
  pages        = {345--356},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2840728.2840745},
  doi          = {10.1145/2840728.2840745},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/BitanskyG0PVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GoyalKW16,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Semi-adaptive Security and Bundling Functionalities Made Generic and
                  Easy},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {361--388},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_14},
  doi          = {10.1007/978-3-662-53644-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GoyalKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppulaW16,
  author       = {Venkata Koppula and
                  Brent Waters},
  title        = {Circular Security Counterexamples for Arbitrary Length Cycles from
                  {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppulaW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareSW16,
  author       = {Mihir Bellare and
                  Igors Stepanovs and
                  Brent Waters},
  title        = {New Negative Results on Differing-Inputs Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DeshpandeKW16,
  author       = {Apoorvaa Deshpande and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Constrained Pseudorandom Functions for Unconstrained Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DeshpandeKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKW16,
  author       = {Rishab Goyal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Semi-Adaptive Security and Bundling Functionalities Made Generic and
                  Easy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalKW16,
  author       = {Shashank Agrawal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Impossibility of Simulation Secure Functional Encryption Even with
                  Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {959},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/959},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AhnBCHSW15,
  author       = {Jae Hyun Ahn and
                  Dan Boneh and
                  Jan Camenisch and
                  Susan Hohenberger and
                  Abhi Shelat and
                  Brent Waters},
  title        = {Computing on Authenticated Data},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {2},
  pages        = {351--395},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-014-9182-0},
  doi          = {10.1007/S00145-014-9182-0},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AhnBCHSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/ApplebaumIKW15,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Brent Waters},
  title        = {Encoding Functions with Constant Online Rate, or How to Compress Garbled
                  Circuit Keys},
  journal      = {{SIAM} J. Comput.},
  volume       = {44},
  number       = {2},
  pages        = {433--466},
  year         = {2015},
  url          = {https://doi.org/10.1137/130929643},
  doi          = {10.1137/130929643},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/ApplebaumIKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HohenbergerKW15,
  author       = {Susan Hohenberger and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Adaptively Secure Puncturable Pseudorandom Functions in the Standard
                  Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {79--102},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_4},
  doi          = {10.1007/978-3-662-48797-6\_4},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HohenbergerKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OkamotoPWW15,
  author       = {Tatsuaki Okamoto and
                  Krzysztof Pietrzak and
                  Brent Waters and
                  Daniel Wichs},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {New Realizations of Somewhere Statistically Binding Hashing and Positional
                  Accumulators},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {121--145},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_6},
  doi          = {10.1007/978-3-662-48797-6\_6},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OkamotoPWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BishopHW15,
  author       = {Allison Bishop and
                  Susan Hohenberger and
                  Brent Waters},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {New Circular Security Counterexamples from Decision Linear and Learning
                  with Errors},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {776--800},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_32},
  doi          = {10.1007/978-3-662-48800-3\_32},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BishopHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Waters15,
  author       = {Brent Waters},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {A Punctured Programming Approach to Adaptively Secure Functional Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {678--697},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_33},
  doi          = {10.1007/978-3-662-48000-7\_33},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Waters15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HohenbergerKW15,
  author       = {Susan Hohenberger and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Universal Signature Aggregators},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {3--34},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_1},
  doi          = {10.1007/978-3-662-46803-6\_1},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HohenbergerKW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/RouselakisW15,
  author       = {Yannis Rouselakis and
                  Brent Waters},
  editor       = {Rainer B{\"{o}}hme and
                  Tatsuaki Okamoto},
  title        = {Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based
                  Encryption},
  booktitle    = {Financial Cryptography and Data Security - 19th International Conference,
                  {FC} 2015, San Juan, Puerto Rico, January 26-30, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8975},
  pages        = {315--332},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47854-7\_19},
  doi          = {10.1007/978-3-662-47854-7\_19},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/RouselakisW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GentryLSW15,
  author       = {Craig Gentry and
                  Allison Bishop Lewko and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Venkatesan Guruswami},
  title        = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination
                  Assumption},
  booktitle    = {{IEEE} 56th Annual Symposium on Foundations of Computer Science, {FOCS}
                  2015, Berkeley, CA, USA, 17-20 October, 2015},
  pages        = {151--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/FOCS.2015.19},
  doi          = {10.1109/FOCS.2015.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GentryLSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/KoppulaLW15,
  author       = {Venkata Koppula and
                  Allison Bishop Lewko and
                  Brent Waters},
  editor       = {Rocco A. Servedio and
                  Ronitt Rubinfeld},
  title        = {Indistinguishability Obfuscation for Turing Machines with Unbounded
                  Memory},
  booktitle    = {Proceedings of the Forty-Seventh Annual {ACM} on Symposium on Theory
                  of Computing, {STOC} 2015, Portland, OR, USA, June 14-17, 2015},
  pages        = {419--428},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2746539.2746614},
  doi          = {10.1145/2746539.2746614},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/KoppulaLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KoppulaRW15,
  author       = {Venkata Koppula and
                  Kim Ramchen and
                  Brent Waters},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Separations in Circular Security for Arbitrary Length Key Cycles},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {378--400},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_15},
  doi          = {10.1007/978-3-662-46497-7\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KoppulaRW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RouselakisW15,
  author       = {Yannis Rouselakis and
                  Brent Waters},
  title        = {Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RouselakisW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyG0PVW15,
  author       = {Nir Bitansky and
                  Shafi Goldwasser and
                  Abhishek Jain and
                  Omer Paneth and
                  Vinod Vaikuntanathan and
                  Brent Waters},
  title        = {Time-Lock Puzzles from Randomized Encodings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/514},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyG0PVW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BishopHW15,
  author       = {Allison Bishop and
                  Susan Hohenberger and
                  Brent Waters},
  title        = {New Circular Security Counterexamples from Decision Linear and Learning
                  with Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {715},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/715},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BishopHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkamotoPWW15,
  author       = {Tatsuaki Okamoto and
                  Krzysztof Pietrzak and
                  Brent Waters and
                  Daniel Wichs},
  title        = {New Realizations of Somewhere Statistically Binding Hashing and Positional
                  Accumulators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {869},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/869},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkamotoPWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/LeeDKWW14,
  author       = {Michael Z. Lee and
                  Alan M. Dunn and
                  Jonathan Katz and
                  Brent Waters and
                  Emmett Witchel},
  title        = {Anon-Pass: Practical Anonymous Subscriptions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {3},
  pages        = {20--27},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2013.158},
  doi          = {10.1109/MSP.2013.158},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/LeeDKWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RamchenW14,
  author       = {Kim Ramchen and
                  Brent Waters},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Fully Secure and Fast Signing from Obfuscation},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {659--673},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660306},
  doi          = {10.1145/2660267.2660306},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RamchenW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehWZ14,
  author       = {Dan Boneh and
                  Brent Waters and
                  Mark Zhandry},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Low Overhead Broadcast Encryption from Multilinear Maps},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {206--223},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_12},
  doi          = {10.1007/978-3-662-44371-2\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentryLW14,
  author       = {Craig Gentry and
                  Allison B. Lewko and
                  Brent Waters},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Witness Encryption from Instance Independent Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {426--443},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_24},
  doi          = {10.1007/978-3-662-44371-2\_24},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentryLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/CalderonMSW14,
  author       = {Theresa Calderon and
                  Sarah Meiklejohn and
                  Hovav Shacham and
                  Brent Waters},
  editor       = {Josh Benaloh},
  title        = {Rethinking Verifiably Encrypted Signatures: {A} Gap in Functionality
                  and Potential Solutions},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {349--366},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_18},
  doi          = {10.1007/978-3-319-04852-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/CalderonMSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoW14,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Why Proving {HIBE} Systems Secure Is Difficult},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {58--76},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_4},
  doi          = {10.1007/978-3-642-55220-5\_4},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HohenbergerSW14,
  author       = {Susan Hohenberger and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Replacing a Random Oracle: Full Domain Hash from Indistinguishability
                  Obfuscation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {201--220},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_12},
  doi          = {10.1007/978-3-642-55220-5\_12},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HohenbergerSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HohenbergerW14,
  author       = {Susan Hohenberger and
                  Brent Waters},
  editor       = {Hugo Krawczyk},
  title        = {Online/Offline Attribute-Based Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {293--310},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_17},
  doi          = {10.1007/978-3-642-54631-0\_17},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HohenbergerW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PandeyRW14,
  author       = {Omkant Pandey and
                  Kim Ramchen and
                  Brent Waters},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Relaxed Two-to-One Recoding Schemes},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {57--76},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_4},
  doi          = {10.1007/978-3-319-10879-7\_4},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PandeyRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/SahaiW14,
  author       = {Amit Sahai and
                  Brent Waters},
  editor       = {David B. Shmoys},
  title        = {How to use indistinguishability obfuscation: deniable encryption,
                  and more},
  booktitle    = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA,
                  May 31 - June 03, 2014},
  pages        = {475--484},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2591796.2591825},
  doi          = {10.1145/2591796.2591825},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/SahaiW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerW14,
  author       = {Susan Hohenberger and
                  Brent Waters},
  title        = {Online/Offline Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {21},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehWZ14,
  author       = {Dan Boneh and
                  Brent Waters and
                  Mark Zhandry},
  title        = {Low Overhead Broadcast Encryption from Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryLW14,
  author       = {Craig Gentry and
                  Allison Bishop Lewko and
                  Brent Waters},
  title        = {Witness Encryption from Instance Independent Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {273},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/273},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryLSW14,
  author       = {Craig Gentry and
                  Allison B. Lewko and
                  Amit Sahai and
                  Brent Waters},
  title        = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryLSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PandeyRW14,
  author       = {Omkant Pandey and
                  Kim Ramchen and
                  Brent Waters},
  title        = {Relaxed Two-to-one Recoding Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PandeyRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaSW14,
  author       = {Dakshita Khurana and
                  Amit Sahai and
                  Brent Waters},
  title        = {How to Generate and use Universal Parameters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/507},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerKW14,
  author       = {Susan Hohenberger and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Adaptively Secure Puncturable Pseudorandom Functions in the Standard
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {521},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/521},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerKW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RamchenW14,
  author       = {Kim Ramchen and
                  Brent Waters},
  title        = {Fully Secure and Fast Signing from Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {523},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/523},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RamchenW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Waters14,
  author       = {Brent Waters},
  title        = {A Punctured Programming Approach to Adaptively Secure Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {588},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/588},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Waters14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HofheinzKKW14,
  author       = {Dennis Hofheinz and
                  Akshay Kamath and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Adaptively Secure Constrained Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {720},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/720},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HofheinzKKW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerKW14a,
  author       = {Susan Hohenberger and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Universal Signature Aggregators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {745},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/745},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerKW14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppulaPRW14,
  author       = {Venkata Koppula and
                  Omkant Pandey and
                  Yannis Rouselakis and
                  Brent Waters},
  title        = {Deterministic Public-Key Encryption under Continual Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {780},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/780},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppulaPRW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppulaLW14,
  author       = {Venkata Koppula and
                  Allison Bishop Lewko and
                  Brent Waters},
  title        = {Indistinguishability Obfuscation for Turing Machines with Unbounded
                  Memory},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {925},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/925},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppulaLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KatzSW13,
  author       = {Jonathan Katz and
                  Amit Sahai and
                  Brent Waters},
  title        = {Predicate Encryption Supporting Disjunctions, Polynomial Equations,
                  and Inner Products},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {2},
  pages        = {191--224},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-012-9119-4},
  doi          = {10.1007/S00145-012-9119-4},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KatzSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/LuOSSW13,
  author       = {Steve Lu and
                  Rafail Ostrovsky and
                  Amit Sahai and
                  Hovav Shacham and
                  Brent Waters},
  title        = {Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted
                  Signatures Without Random Oracles},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {2},
  pages        = {340--373},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-012-9126-5},
  doi          = {10.1007/S00145-012-9126-5},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/LuOSSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ShachamW13,
  author       = {Hovav Shacham and
                  Brent Waters},
  title        = {Compact Proofs of Retrievability},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {3},
  pages        = {442--483},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-012-9129-2},
  doi          = {10.1007/S00145-012-9129-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ShachamW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehW13,
  author       = {Dan Boneh and
                  Brent Waters},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Constrained Pseudorandom Functions and Their Applications},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {280--300},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_15},
  doi          = {10.1007/978-3-642-42045-0\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BonehW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RouselakisW13,
  author       = {Yannis Rouselakis and
                  Brent Waters},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Practical constructions and new proof methods for large universe attribute-based
                  encryption},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {463--474},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516672},
  doi          = {10.1145/2508859.2516672},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RouselakisW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GentrySW13,
  author       = {Craig Gentry and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler,
                  Asymptotically-Faster, Attribute-Based},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {75--92},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_5},
  doi          = {10.1007/978-3-642-40041-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GentrySW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ApplebaumIKW13,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Brent Waters},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Encoding Functions with Constant Online Rate or How to Compress Garbled
                  Circuits Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {166--184},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_10},
  doi          = {10.1007/978-3-642-40084-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ApplebaumIKW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GargGHSW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Attribute-Based Encryption for Circuits from Multilinear Maps},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {479--499},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_27},
  doi          = {10.1007/978-3-642-40084-1\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GargGHSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HohenbergerSW13,
  author       = {Susan Hohenberger and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based
                  Aggregate Signatures},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {494--512},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_27},
  doi          = {10.1007/978-3-642-40041-4\_27},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HohenbergerSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BensonSW13,
  author       = {Karyn Benson and
                  Hovav Shacham and
                  Brent Waters},
  editor       = {Ed Dawson},
  title        = {The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively
                  Weaker Assumptions},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {310--325},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_20},
  doi          = {10.1007/978-3-642-36095-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BensonSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GargGH0SW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova and
                  Amit Sahai and
                  Brent Waters},
  title        = {Candidate Indistinguishability Obfuscation and Functional Encryption
                  for all Circuits},
  booktitle    = {54th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2013, 26-29 October, 2013, Berkeley, CA, {USA}},
  pages        = {40--49},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/FOCS.2013.13},
  doi          = {10.1109/FOCS.2013.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GargGH0SW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Waters13,
  author       = {Brent Waters},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Functional Encryption: Origins and Recent Developments},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {51--54},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_4},
  doi          = {10.1007/978-3-642-36362-7\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Waters13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HohenbergerW13,
  author       = {Susan Hohenberger and
                  Brent Waters},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Attribute-Based Encryption with Fast Decryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {162--179},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_11},
  doi          = {10.1007/978-3-642-36362-7\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HohenbergerW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LeeDWWK13,
  author       = {Michael Z. Lee and
                  Alan M. Dunn and
                  Brent Waters and
                  Emmett Witchel and
                  Jonathan Katz},
  title        = {Anon-Pass: Practical Anonymous Subscriptions},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {319--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.29},
  doi          = {10.1109/SP.2013.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/LeeDWWK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/GargGSW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Dan Boneh and
                  Tim Roughgarden and
                  Joan Feigenbaum},
  title        = {Witness encryption and its applications},
  booktitle    = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA,
                  USA, June 1-4, 2013},
  pages        = {467--476},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2488608.2488667},
  doi          = {10.1145/2488608.2488667},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/GargGSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wacv/LuongGWG13,
  author       = {Andy Luong and
                  Michael Gerbush and
                  Brent Waters and
                  Kristen Grauman},
  title        = {Reconstructing a fragmented face from a cryptographic identification
                  protocol},
  booktitle    = {2013 {IEEE} Workshop on Applications of Computer Vision, {WACV} 2013,
                  Clearwater Beach, FL, USA, January 15-17, 2013},
  pages        = {238--245},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/WACV.2013.6475024},
  doi          = {10.1109/WACV.2013.6475024},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wacv/LuongGWG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW13,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {Why Proving {HIBE} Systems Secure is Difficult},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/068},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGHSW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Amit Sahai and
                  Brent Waters},
  title        = {Attribute-Based Encryption for Circuits from Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/128},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGHSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGSW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Amit Sahai and
                  Brent Waters},
  title        = {Witness Encryption and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {258},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/258},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerW13,
  author       = {Susan Hohenberger and
                  Brent Waters},
  title        = {Attribute-Based Encryption with Fast Decryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeDKWW13,
  author       = {Michael Z. Lee and
                  Alan M. Dunn and
                  Jonathan Katz and
                  Brent Waters and
                  Emmett Witchel},
  title        = {Anon-Pass: Practical Anonymous Subscriptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeDKWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentrySW13,
  author       = {Craig Gentry and
                  Amit Sahai and
                  Brent Waters},
  title        = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler,
                  Asymptotically-Faster, Attribute-Based},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentrySW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehW13,
  author       = {Dan Boneh and
                  Brent Waters},
  title        = {Constrained Pseudorandom Functions and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerSW13,
  author       = {Susan Hohenberger and
                  Amit Sahai and
                  Brent Waters},
  title        = {Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based
                  Aggregate Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/434},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargGH0SW13,
  author       = {Sanjam Garg and
                  Craig Gentry and
                  Shai Halevi and
                  Mariana Raykova and
                  Amit Sahai and
                  Brent Waters},
  title        = {Candidate Indistinguishability Obfuscation and Functional Encryption
                  for all circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/451},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargGH0SW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahaiW13,
  author       = {Amit Sahai and
                  Brent Waters},
  title        = {How to Use Indistinguishability Obfuscation: Deniable Encryption,
                  and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/454},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahaiW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerSW13a,
  author       = {Susan Hohenberger and
                  Amit Sahai and
                  Brent Waters},
  title        = {Replacing a Random Oracle: Full Domain Hash From Indistinguishability
                  Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/509},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerSW13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KoppulaRW13,
  author       = {Venkata Koppula and
                  Kim Ramchen and
                  Brent Waters},
  title        = {Separations in Circular Security for Arbitrary Length Key Cycles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {683},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/683},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KoppulaRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BonehSW12,
  author       = {Dan Boneh and
                  Amit Sahai and
                  Brent Waters},
  title        = {Functional encryption: a new vision for public-key cryptography},
  journal      = {Commun. {ACM}},
  volume       = {55},
  number       = {11},
  pages        = {56--64},
  year         = {2012},
  url          = {https://doi.org/10.1145/2366316.2366333},
  doi          = {10.1145/2366316.2366333},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BonehSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GerbushLOW12,
  author       = {Michael Gerbush and
                  Allison B. Lewko and
                  Adam O'Neill and
                  Brent Waters},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Dual Form Signatures: An Approach for Proving Security from Static
                  Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {25--42},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_4},
  doi          = {10.1007/978-3-642-34961-4\_4},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GerbushLOW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LewkoW12,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security
                  through Selective Techniques},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {180--198},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_12},
  doi          = {10.1007/978-3-642-32009-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LewkoW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/SahaiSW12,
  author       = {Amit Sahai and
                  Hakan Seyalioglu and
                  Brent Waters},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based
                  Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {199--217},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_13},
  doi          = {10.1007/978-3-642-32009-5\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/SahaiSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Waters12,
  author       = {Brent Waters},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Functional Encryption for Regular Languages},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {218--235},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_14},
  doi          = {10.1007/978-3-642-32009-5\_14},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Waters12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareKPW12,
  author       = {Mihir Bellare and
                  Eike Kiltz and
                  Chris Peikert and
                  Brent Waters},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Identity-Based (Lossy) Trapdoor Functions and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {228--245},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_15},
  doi          = {10.1007/978-3-642-29011-4\_15},
  timestamp    = {Sun, 12 Nov 2023 02:15:08 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareKPW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BellareDWY12,
  author       = {Mihir Bellare and
                  Rafael Dowsley and
                  Brent Waters and
                  Scott Yilek},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Standard Security Does Not Imply Security against Selective-Opening},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {645--662},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_38},
  doi          = {10.1007/978-3-642-29011-4\_38},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BellareDWY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HohenbergerLW12,
  author       = {Susan Hohenberger and
                  Allison B. Lewko and
                  Brent Waters},
  editor       = {David Pointcheval and
                  Thomas Johansson},
  title        = {Detecting Dangerous Queries: {A} New Approach for Chosen Ciphertext
                  Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2012 - 31st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cambridge, UK, April 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7237},
  pages        = {663--681},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29011-4\_39},
  doi          = {10.1007/978-3-642-29011-4\_39},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HohenbergerLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/BonehSW12,
  author       = {Dan Boneh and
                  Gil Segev and
                  Brent Waters},
  editor       = {Shafi Goldwasser},
  title        = {Targeted malleability: homomorphic encryption for restricted computations},
  booktitle    = {Innovations in Theoretical Computer Science 2012, Cambridge, MA, USA,
                  January 8-10, 2012},
  pages        = {350--366},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2090236.2090264},
  doi          = {10.1145/2090236.2090264},
  timestamp    = {Sun, 16 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/BonehSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AhnBCHSW12,
  author       = {Jae Hyun Ahn and
                  Dan Boneh and
                  Jan Camenisch and
                  Susan Hohenberger and
                  Abhi Shelat and
                  Brent Waters},
  editor       = {Ronald Cramer},
  title        = {Computing on Authenticated Data},
  booktitle    = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
                  2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7194},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28914-9\_1},
  doi          = {10.1007/978-3-642-28914-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AhnBCHSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-5287,
  author       = {Amit Sahai and
                  Brent Waters},
  title        = {Attribute-Based Encryption for Circuits from Multilinear Maps},
  journal      = {CoRR},
  volume       = {abs/1210.5287},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.5287},
  eprinttype    = {arXiv},
  eprint       = {1210.5287},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-5287.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerLW12,
  author       = {Susan Hohenberger and
                  Allison B. Lewko and
                  Brent Waters},
  title        = {Detecting Dangerous Queries: {A} New Approach for Chosen Ciphertext
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GerbushLOW12,
  author       = {Michael Gerbush and
                  Allison B. Lewko and
                  Adam O'Neill and
                  Brent Waters},
  title        = {Dual Form Signatures: An Approach for Proving Security from Static
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GerbushLOW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW12,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security
                  through Selective Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {326},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Waters12,
  author       = {Brent Waters},
  title        = {Functional Encryption for Regular Languages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Waters12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahaiSW12,
  author       = {Amit Sahai and
                  Hakan Seyalioglu and
                  Brent Waters},
  title        = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahaiSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RouselakisW12,
  author       = {Yannis Rouselakis and
                  Brent Waters},
  title        = {New Constructions and Proof Methods for Large Universe Attribute-Based
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {583},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/583},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RouselakisW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahaiW12,
  author       = {Amit Sahai and
                  Brent Waters},
  title        = {Attribute-Based Encryption for Circuits from Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {592},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/592},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahaiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BensonSW12,
  author       = {Karyn Benson and
                  Hovav Shacham and
                  Brent Waters},
  title        = {The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively
                  Weaker Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {687},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/687},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BensonSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ApplebaumIKW12,
  author       = {Benny Applebaum and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Brent Waters},
  title        = {Encoding Functions with Constant Online Rate or How to Compress Keys
                  in Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {693},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/693},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ApplebaumIKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/PeikertW11,
  author       = {Chris Peikert and
                  Brent Waters},
  title        = {Lossy Trapdoor Functions and Their Applications},
  journal      = {{SIAM} J. Comput.},
  volume       = {40},
  number       = {6},
  pages        = {1803--1844},
  year         = {2011},
  url          = {https://doi.org/10.1137/080733954},
  doi          = {10.1137/080733954},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/PeikertW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ONeillPW11,
  author       = {Adam O'Neill and
                  Chris Peikert and
                  Brent Waters},
  editor       = {Phillip Rogaway},
  title        = {Bi-Deniable Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {525--542},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_30},
  doi          = {10.1007/978-3-642-22792-9\_30},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ONeillPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoW11,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Kenneth G. Paterson},
  title        = {Unbounded {HIBE} and Attribute-Based Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {547--567},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_30},
  doi          = {10.1007/978-3-642-20465-4\_30},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoW11a,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Kenneth G. Paterson},
  title        = {Decentralizing Attribute-Based Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {568--588},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_31},
  doi          = {10.1007/978-3-642-20465-4\_31},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoW11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/DodisLWW11,
  author       = {Yevgeniy Dodis and
                  Allison B. Lewko and
                  Brent Waters and
                  Daniel Wichs},
  editor       = {Rafail Ostrovsky},
  title        = {Storing Secrets on Continually Leaky Devices},
  booktitle    = {{IEEE} 52nd Annual Symposium on Foundations of Computer Science, {FOCS}
                  2011, Palm Springs, CA, USA, October 22-25, 2011},
  pages        = {688--697},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/FOCS.2011.35},
  doi          = {10.1109/FOCS.2011.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/DodisLWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Waters11,
  author       = {Brent Waters},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient,
                  and Provably Secure Realization},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {53--70},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_4},
  doi          = {10.1007/978-3-642-19379-8\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Waters11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/LewkoLW11,
  author       = {Allison B. Lewko and
                  Mark Lewko and
                  Brent Waters},
  editor       = {Lance Fortnow and
                  Salil P. Vadhan},
  title        = {How to leak on key updates},
  booktitle    = {Proceedings of the 43rd {ACM} Symposium on Theory of Computing, {STOC}
                  2011, San Jose, CA, USA, 6-8 June 2011},
  pages        = {725--734},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1993636.1993732},
  doi          = {10.1145/1993636.1993732},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/LewkoLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LewkoRW11,
  author       = {Allison B. Lewko and
                  Yannis Rouselakis and
                  Brent Waters},
  editor       = {Yuval Ishai},
  title        = {Achieving Leakage Resilience through Dual System Encryption},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {70--88},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_6},
  doi          = {10.1007/978-3-642-19571-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LewkoRW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BellareWY11,
  author       = {Mihir Bellare and
                  Brent Waters and
                  Scott Yilek},
  editor       = {Yuval Ishai},
  title        = {Identity-Based Encryption Secure against Selective Opening Attack},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_15},
  doi          = {10.1007/978-3-642-19571-6\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BellareWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BonehSW11,
  author       = {Dan Boneh and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Yuval Ishai},
  title        = {Functional Encryption: Definitions and Challenges},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {253--273},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_16},
  doi          = {10.1007/978-3-642-19571-6\_16},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BonehSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DunnHWW11,
  author       = {Alan M. Dunn and
                  Owen S. Hofmann and
                  Brent Waters and
                  Emmett Witchel},
  title        = {Cloaking Malware with the Trusted Platform Module},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Dunn.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DunnHWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/GreenHW11,
  author       = {Matthew Green and
                  Susan Hohenberger and
                  Brent Waters},
  title        = {Outsourcing the Decryption of {ABE} Ciphertexts},
  booktitle    = {20th {USENIX} Security Symposium, San Francisco, CA, USA, August 8-12,
                  2011, Proceedings},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {http://static.usenix.org/events/sec11/tech/full\_papers/Green.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/GreenHW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW11,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {Unbounded {HIBE} and Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {49},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/049},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhnBCHSW11,
  author       = {Jae Hyun Ahn and
                  Dan Boneh and
                  Jan Camenisch and
                  Susan Hohenberger and
                  Abhi Shelat and
                  Brent Waters},
  title        = {Computing on Authenticated Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AhnBCHSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehSW11,
  author       = {Dan Boneh and
                  Gil Segev and
                  Brent Waters},
  title        = {Targeted Malleability: Homomorphic Encryption for Restricted Computations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ONeillPW11,
  author       = {Adam O'Neill and
                  Chris Peikert and
                  Brent Waters},
  title        = {Bi-Deniable Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ONeillPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisLWW11,
  author       = {Yevgeniy Dodis and
                  Allison B. Lewko and
                  Brent Waters and
                  Daniel Wichs},
  title        = {Storing Secrets on Continually Leaky Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/369},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisLWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareKPW11,
  author       = {Mihir Bellare and
                  Eike Kiltz and
                  Chris Peikert and
                  Brent Waters},
  title        = {Identity-Based (Lossy) Trapdoor Functions and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/479},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareKPW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareDWY11,
  author       = {Mihir Bellare and
                  Rafael Dowsley and
                  Brent Waters and
                  Scott Yilek},
  title        = {Standard Security Does Not Imply Security Against Selective-Opening},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {581},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/581},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareDWY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/PirrettiTMW10,
  author       = {Matthew Pirretti and
                  Patrick Traynor and
                  Patrick D. McDaniel and
                  Brent Waters},
  title        = {Secure attribute-based systems},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {5},
  pages        = {799--837},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2009-0383},
  doi          = {10.3233/JCS-2009-0383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/PirrettiTMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BoyenW10,
  author       = {Xavier Boyen and
                  Brent Waters},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {35--52},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_3},
  doi          = {10.1007/978-3-642-13708-2\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BoyenW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GargKSW10,
  author       = {Sanjam Garg and
                  Abishek Kumarasubramanian and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Building efficient fully collusion-resilient traitor tracing and revocation
                  schemes},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {121--130},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866322},
  doi          = {10.1145/1866307.1866322},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GargKSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChowDRW10,
  author       = {Sherman S. M. Chow and
                  Yevgeniy Dodis and
                  Yannis Rouselakis and
                  Brent Waters},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Practical leakage-resilient identity-based encryption from simple
                  assumptions},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {152--161},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866325},
  doi          = {10.1145/1866307.1866325},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChowDRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LewkoOSTW10,
  author       = {Allison B. Lewko and
                  Tatsuaki Okamoto and
                  Amit Sahai and
                  Katsuyuki Takashima and
                  Brent Waters},
  editor       = {Henri Gilbert},
  title        = {Fully Secure Functional Encryption: Attribute-Based Encryption and
                  (Hierarchical) Inner Product Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {62--91},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_4},
  doi          = {10.1007/978-3-642-13190-5\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LewkoOSTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HohenbergerW10,
  author       = {Susan Hohenberger and
                  Brent Waters},
  editor       = {Henri Gilbert},
  title        = {Constructing Verifiable Random Functions with Large Input Spaces},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {656--672},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_33},
  doi          = {10.1007/978-3-642-13190-5\_33},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HohenbergerW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/LewkoW10,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {On the Insecurity of Parallel Repetition for Leakage Resilience},
  booktitle    = {51th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2010, October 23-26, 2010, Las Vegas, Nevada, {USA}},
  pages        = {521--530},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/FOCS.2010.57},
  doi          = {10.1109/FOCS.2010.57},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/LewkoW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WolchokHHFHRWW10,
  author       = {Scott Wolchok and
                  Owen S. Hofmann and
                  Nadia Heninger and
                  Edward W. Felten and
                  J. Alex Halderman and
                  Christopher J. Rossbach and
                  Brent Waters and
                  Emmett Witchel},
  title        = {Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2010, San Diego, California, USA, 28th February - 3rd March
                  2010},
  publisher    = {The Internet Society},
  year         = {2010},
  url          = {https://www.ndss-symposium.org/ndss2010/defeating-vanish-low-cost-sybil-attacks-against-large-dhts},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WolchokHHFHRWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/LewkoSW10,
  author       = {Allison B. Lewko and
                  Amit Sahai and
                  Brent Waters},
  title        = {Revocation Systems with Very Small Private Keys},
  booktitle    = {31st {IEEE} Symposium on Security and Privacy, {SP} 2010, 16-19 May
                  2010, Berleley/Oakland, California, {USA}},
  pages        = {273--285},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SP.2010.23},
  doi          = {10.1109/SP.2010.23},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/LewkoSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LewkoW10,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Daniele Micciancio},
  title        = {New Techniques for Dual System Encryption and Fully Secure {HIBE}
                  with Short Ciphertexts},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {455--479},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_27},
  doi          = {10.1007/978-3-642-11799-2\_27},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LewkoW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerW10,
  author       = {Susan Hohenberger and
                  Brent Waters},
  title        = {Constructing Verifiable Random Functions with Large Input Spaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoOSTW10,
  author       = {Allison B. Lewko and
                  Tatsuaki Okamoto and
                  Amit Sahai and
                  Katsuyuki Takashima and
                  Brent Waters},
  title        = {Fully Secure Functional Encryption: Attribute-Based Encryption and
                  (Hierarchical) Inner Product Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {110},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/110},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoOSTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BellareWY10,
  author       = {Mihir Bellare and
                  Brent Waters and
                  Scott Yilek},
  title        = {Identity-Based Encryption Secure against Selective Opening Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {159},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/159},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BellareWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW10,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {Decentralizing Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {351},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/351},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW10a,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {On the Insecurity of Parallel Repetition for Leakage Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoRW10,
  author       = {Allison B. Lewko and
                  Yannis Rouselakis and
                  Brent Waters},
  title        = {Achieving Leakage Resilience Through Dual System Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehSW10,
  author       = {Dan Boneh and
                  Amit Sahai and
                  Brent Waters},
  title        = {Functional Encryption: Definitions and Challenges},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoLW10,
  author       = {Allison B. Lewko and
                  Mark Lewko and
                  Brent Waters},
  title        = {How to Leak on Key Updates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {562},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/562},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BethencourtSW09,
  author       = {John Bethencourt and
                  Dawn Xiaodong Song and
                  Brent Waters},
  title        = {New Techniques for Private Stream Searching},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {16:1--16:32},
  year         = {2009},
  url          = {https://doi.org/10.1145/1455526.1455529},
  doi          = {10.1145/1455526.1455529},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BethencourtSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LewkoW09,
  author       = {Allison B. Lewko and
                  Brent Waters},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {Efficient pseudorandom functions from the decisional linear assumption
                  and weaker variants},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {112--120},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653677},
  doi          = {10.1145/1653662.1653677},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LewkoW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Waters09,
  author       = {Brent Waters},
  editor       = {Shai Halevi},
  title        = {Dual System Encryption: Realizing Fully Secure {IBE} and {HIBE} under
                  Simple Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {619--636},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_36},
  doi          = {10.1007/978-3-642-03356-8\_36},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Waters09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HohenbergerW09,
  author       = {Susan Hohenberger and
                  Brent Waters},
  editor       = {Shai Halevi},
  title        = {Short and Stateless Signatures from the {RSA} Assumption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5677},
  pages        = {654--670},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03356-8\_38},
  doi          = {10.1007/978-3-642-03356-8\_38},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HohenbergerW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GentryW09,
  author       = {Craig Gentry and
                  Brent Waters},
  editor       = {Antoine Joux},
  title        = {Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {171--188},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_10},
  doi          = {10.1007/978-3-642-01001-9\_10},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GentryW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HohenbergerW09,
  author       = {Susan Hohenberger and
                  Brent Waters},
  editor       = {Antoine Joux},
  title        = {Realizing Hash-and-Sign Signatures under Standard Assumptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {333--350},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_19},
  doi          = {10.1007/978-3-642-01001-9\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HohenbergerW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BonehFKW09,
  author       = {Dan Boneh and
                  David Mandell Freeman and
                  Jonathan Katz and
                  Brent Waters},
  editor       = {Stanislaw Jarecki and
                  Gene Tsudik},
  title        = {Signing a Linear Subspace: Signature Schemes for Network Coding},
  booktitle    = {Public Key Cryptography - {PKC} 2009, 12th International Conference
                  on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
                  March 18-20, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5443},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00468-1\_5},
  doi          = {10.1007/978-3-642-00468-1\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BonehFKW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ShenSW09,
  author       = {Emily Shen and
                  Elaine Shi and
                  Brent Waters},
  editor       = {Omer Reingold},
  title        = {Predicate Privacy in Encryption Systems},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {457--473},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_27},
  doi          = {10.1007/978-3-642-00457-5\_27},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ShenSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ciss/SahaiWL09,
  author       = {Amit Sahai and
                  Brent Waters and
                  Steve Lu},
  editor       = {Marc Joye and
                  Gregory Neven},
  title        = {Attribute-Based Encryption},
  booktitle    = {Identity-Based Cryptography},
  series       = {Cryptology and Information Security Series},
  volume       = {2},
  pages        = {156--168},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-58603-947-9-156},
  doi          = {10.3233/978-1-58603-947-9-156},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ciss/SahaiWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2009,
  editor       = {Hovav Shacham and
                  Brent Waters},
  title        = {Pairing-Based Cryptography - Pairing 2009, Third International Conference,
                  Palo Alto, CA, USA, August 12-14, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5671},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03298-1},
  doi          = {10.1007/978-3-642-03298-1},
  isbn         = {978-3-642-03297-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerW09,
  author       = {Susan Hohenberger and
                  Brent Waters},
  title        = {Realizing Hash-and-Sign Signatures under Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerW09a,
  author       = {Susan Hohenberger and
                  Brent Waters},
  title        = {Short and Stateless Signatures from the {RSA} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {283},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/283},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerW09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Waters09,
  author       = {Brent Waters},
  title        = {Dual System Encryption: Realizing Fully Secure {IBE} and {HIBE} under
                  Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Waters09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW09,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {New Techniques for Dual System Encryption and Fully Secure {HIBE}
                  with Short Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/482},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoW09a,
  author       = {Allison B. Lewko and
                  Brent Waters},
  title        = {Efficient Pseudorandom Functions From the Decisional Linear Assumption
                  and Weaker Variants},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoW09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargKSW09,
  author       = {Sanjam Garg and
                  Abishek Kumarasubramanian and
                  Amit Sahai and
                  Brent Waters},
  title        = {Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {532},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/532},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargKSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ShachamW08,
  author       = {Hovav Shacham and
                  Brent Waters},
  editor       = {Josef Pieprzyk},
  title        = {Compact Proofs of Retrievability},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {90--107},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_7},
  doi          = {10.1007/978-3-540-89255-7\_7},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ShachamW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GoyalLSW08,
  author       = {Vipul Goyal and
                  Steve Lu and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Black-box accountable authority identity-based encryption},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {427--436},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455824},
  doi          = {10.1145/1455770.1455824},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GoyalLSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PeikertVW08,
  author       = {Chris Peikert and
                  Vinod Vaikuntanathan and
                  Brent Waters},
  editor       = {David A. Wagner},
  title        = {A Framework for Efficient and Composable Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {554--571},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_31},
  doi          = {10.1007/978-3-540-85174-5\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PeikertVW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KatzSW08,
  author       = {Jonathan Katz and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Nigel P. Smart},
  title        = {Predicate Encryption Supporting Disjunctions, Polynomial Equations,
                  and Inner Products},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {146--162},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_9},
  doi          = {10.1007/978-3-540-78967-3\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KatzSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/BonehPRVW08,
  author       = {Dan Boneh and
                  Periklis A. Papakonstantinou and
                  Charles Rackoff and
                  Yevgeniy Vahlis and
                  Brent Waters},
  title        = {On the Impossibility of Basing Identity Based Encryption on Trapdoor
                  Permutations},
  booktitle    = {49th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2008, October 25-28, 2008, Philadelphia, PA, {USA}},
  pages        = {283--292},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/FOCS.2008.67},
  doi          = {10.1109/FOCS.2008.67},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/BonehPRVW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/ShiW08,
  author       = {Elaine Shi and
                  Brent Waters},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Delegating Capabilities in Predicate Encryption Systems},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {560--578},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_46},
  doi          = {10.1007/978-3-540-70583-3\_46},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/ShiW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BethencourtSW08,
  author       = {John Bethencourt and
                  Dawn Song and
                  Brent Waters},
  title        = {Analysis-Resistant Malware},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2008, San Diego, California, USA, 10th February - 13th February
                  2008},
  publisher    = {The Internet Society},
  year         = {2008},
  url          = {https://www.ndss-symposium.org/ndss2008/analysis-resistant-malware/},
  timestamp    = {Mon, 01 Feb 2021 08:42:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BethencourtSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/PeikertW08,
  author       = {Chris Peikert and
                  Brent Waters},
  editor       = {Cynthia Dwork},
  title        = {Lossy trapdoor functions and their applications},
  booktitle    = {Proceedings of the 40th Annual {ACM} Symposium on Theory of Computing,
                  Victoria, British Columbia, Canada, May 17-20, 2008},
  pages        = {187--196},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1374376.1374406},
  doi          = {10.1145/1374376.1374406},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/PeikertW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShachamW08,
  author       = {Hovav Shacham and
                  Brent Waters},
  title        = {Compact Proofs of Retrievability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/073},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShachamW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GentryW08,
  author       = {Craig Gentry and
                  Brent Waters},
  title        = {Adaptive Security in Broadcast Encryption Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/268},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GentryW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiW08,
  author       = {Elaine Shi and
                  Brent Waters},
  title        = {Delegating Capabilities in Predicate Encryption Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Waters08,
  author       = {Brent Waters},
  title        = {Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient,
                  and Provably Secure Realization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Waters08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewkoSW08,
  author       = {Allison B. Lewko and
                  Amit Sahai and
                  Brent Waters},
  title        = {Revocation Systems with Very Small Private Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewkoSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehFKW08,
  author       = {Dan Boneh and
                  David Mandell Freeman and
                  Jonathan Katz and
                  Brent Waters},
  title        = {Signing a Linear Subspace: Signature Schemes for Network Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehFKW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShenSW08,
  author       = {Emily Shen and
                  Elaine Shi and
                  Brent Waters},
  title        = {Predicate Privacy in Encryption Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {536},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/536},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShenSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OstrovskySW07,
  author       = {Rafail Ostrovsky and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Attribute-based encryption with non-monotonic access structures},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {195--203},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315270},
  doi          = {10.1145/1315245.1315270},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OstrovskySW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaldermanW07,
  author       = {J. Alex Halderman and
                  Brent Waters},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Harvesting verifiable challenges from oblivious online sources},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {330--341},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315287},
  doi          = {10.1145/1315245.1315287},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HaldermanW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BethencourtBW07,
  author       = {John Bethencourt and
                  Dan Boneh and
                  Brent Waters},
  title        = {Cryptographic Methods for Storing Ballots on a Voting Machine},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
                  2007},
  publisher    = {The Internet Society},
  year         = {2007},
  url          = {https://www.ndss-symposium.org/ndss2007/cryptographic-methods-storing-ballots-voting-machine/},
  timestamp    = {Mon, 01 Feb 2021 08:42:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/BethencourtBW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BoyenW07,
  author       = {Xavier Boyen and
                  Brent Waters},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Full-Domain Subgroup Hiding and Constant-Size Group Signatures},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_1},
  doi          = {10.1007/978-3-540-71677-8\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BoyenW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ShachamW07,
  author       = {Hovav Shacham and
                  Brent Waters},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Efficient Ring Signatures Without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {166--180},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_12},
  doi          = {10.1007/978-3-540-71677-8\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ShachamW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BethencourtSW07,
  author       = {John Bethencourt and
                  Amit Sahai and
                  Brent Waters},
  title        = {Ciphertext-Policy Attribute-Based Encryption},
  booktitle    = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
                  May 2007, Oakland, California, {USA}},
  pages        = {321--334},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SP.2007.11},
  doi          = {10.1109/SP.2007.11},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BethencourtSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BonehW07,
  author       = {Dan Boneh and
                  Brent Waters},
  editor       = {Salil P. Vadhan},
  title        = {Conjunctive, Subset, and Range Queries on Encrypted Data},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {535--554},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_29},
  doi          = {10.1007/978-3-540-70936-7\_29},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BonehW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/PeikertW07,
  author       = {Chris Peikert and
                  Brent Waters},
  title        = {Lossy Trapdoor Functions and Their Applications},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR07-080}},
  year         = {2007},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-080/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR07-080},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/PeikertW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeikertW07,
  author       = {Chris Peikert and
                  Brent Waters},
  title        = {Lossy Trapdoor Functions and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {279},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/279},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeikertW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskySW07,
  author       = {Rafail Ostrovsky and
                  Amit Sahai and
                  Brent Waters},
  title        = {Attribute-Based Encryption with Non-Monotonic Access Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskySW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PeikertVW07,
  author       = {Chris Peikert and
                  Vinod Vaikuntanathan and
                  Brent Waters},
  title        = {A Framework for Efficient and Composable Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {348},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/348},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PeikertVW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzSW07,
  author       = {Jonathan Katz and
                  Amit Sahai and
                  Brent Waters},
  title        = {Predicate Encryption Supporting Disjunctions, Polynomial Equations,
                  and Inner Products},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GoyalPSW06,
  author       = {Vipul Goyal and
                  Omkant Pandey and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Attribute-based encryption for fine-grained access control of encrypted
                  data},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {89--98},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180418},
  doi          = {10.1145/1180405.1180418},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GoyalPSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PirrettiTMW06,
  author       = {Matthew Pirretti and
                  Patrick Traynor and
                  Patrick D. McDaniel and
                  Brent Waters},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Secure attribute-based systems},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {99--112},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180419},
  doi          = {10.1145/1180405.1180419},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PirrettiTMW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyenSSW06,
  author       = {Xavier Boyen and
                  Hovav Shacham and
                  Emily Shen and
                  Brent Waters},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Forward-secure signatures with untrusted update},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {191--200},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180430},
  doi          = {10.1145/1180405.1180430},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoyenSSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BonehW06,
  author       = {Dan Boneh and
                  Brent Waters},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {A fully collusion resistant broadcast, trace, and revoke system},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {211--220},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180432},
  doi          = {10.1145/1180405.1180432},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BonehW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoyenW06,
  author       = {Xavier Boyen and
                  Brent Waters},
  editor       = {Cynthia Dwork},
  title        = {Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4117},
  pages        = {290--307},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11818175\_17},
  doi          = {10.1007/11818175\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoyenW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyenW06,
  author       = {Xavier Boyen and
                  Brent Waters},
  editor       = {Serge Vaudenay},
  title        = {Compact Group Signatures Without Random Oracles},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {427--444},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_26},
  doi          = {10.1007/11761679\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyenW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LuOSSW06,
  author       = {Steve Lu and
                  Rafail Ostrovsky and
                  Amit Sahai and
                  Hovav Shacham and
                  Brent Waters},
  editor       = {Serge Vaudenay},
  title        = {Sequential Aggregate Signatures and Multisignatures Without Random
                  Oracles},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {465--485},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_28},
  doi          = {10.1007/11761679\_28},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LuOSSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehSW06,
  author       = {Dan Boneh and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Serge Vaudenay},
  title        = {Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and
                  Private Keys},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4004},
  pages        = {573--592},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11761679\_34},
  doi          = {10.1007/11761679\_34},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BonehSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BarthBW06,
  author       = {Adam Barth and
                  Dan Boneh and
                  Brent Waters},
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {Privacy in Encrypted Content Distribution Using Private Broadcast
                  Encryption},
  booktitle    = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  pages        = {52--64},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663\_4},
  doi          = {10.1007/11889663\_4},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BarthBW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BonehSW06,
  author       = {Dan Boneh and
                  Emily Shen and
                  Brent Waters},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {Strongly Unforgeable Signatures Based on Computational Diffie-Hellman},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {229--240},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_15},
  doi          = {10.1007/11745853\_15},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BonehSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BethencourtSW06,
  author       = {John Bethencourt and
                  Dawn Xiaodong Song and
                  Brent Waters},
  title        = {New Constructions and Practical Applications for Private Stream Searching
                  (Extended Abstract)},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {132--139},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.27},
  doi          = {10.1109/SP.2006.27},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BethencourtSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehSW06,
  author       = {Dan Boneh and
                  Amit Sahai and
                  Brent Waters},
  title        = {Fully Collusion Resistant Traitor Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenW06,
  author       = {Xavier Boyen and
                  Brent Waters},
  title        = {Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/085},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuOSSW06,
  author       = {Steve Lu and
                  Rafail Ostrovsky and
                  Amit Sahai and
                  Hovav Shacham and
                  Brent Waters},
  title        = {Sequential Aggregate Signatures and Multisignatures without Random
                  Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/096},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LuOSSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehW06,
  author       = {Dan Boneh and
                  Brent Waters},
  title        = {Conjunctive, Subset, and Range Queries on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/287},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShachamW06,
  author       = {Hovav Shacham and
                  Brent Waters},
  title        = {Efficient Ring Signatures without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/289},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShachamW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenSSW06,
  author       = {Xavier Boyen and
                  Hovav Shacham and
                  Emily Shen and
                  Brent Waters},
  title        = {Forward-Secure Signatures with Untrusted Update},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/297},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenSSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehW06a,
  author       = {Dan Boneh and
                  Brent Waters},
  title        = {A Fully Collusion Resistant Broadcast, Trace, and Revoke System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {298},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/298},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehW06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalPSW06,
  author       = {Vipul Goyal and
                  Omkant Pandey and
                  Amit Sahai and
                  Brent Waters},
  title        = {Attribute-Based Encryption for Fine-Grained Access Control of Encrypted
                  Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {309},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/309},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalPSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoyenMW05,
  author       = {Xavier Boyen and
                  Qixiang Mei and
                  Brent Waters},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Direct chosen ciphertext security from identity-based techniques},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {320--329},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102162},
  doi          = {10.1145/1102120.1102162},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BoyenMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehGW05,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Brent Waters},
  editor       = {Victor Shoup},
  title        = {Collusion Resistant Broadcast Encryption with Short Ciphertexts and
                  Private Keys},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {258--275},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_16},
  doi          = {10.1007/11535218\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehGW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Waters05,
  author       = {Brent Waters},
  editor       = {Ronald Cramer},
  title        = {Efficient Identity-Based Encryption Without Random Oracles},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {114--127},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_7},
  doi          = {10.1007/11426639\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Waters05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SahaiW05,
  author       = {Amit Sahai and
                  Brent Waters},
  editor       = {Ronald Cramer},
  title        = {Fuzzy Identity-Based Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {457--473},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_27},
  doi          = {10.1007/11426639\_27},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SahaiW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/HaldermanWF05,
  author       = {J. Alex Halderman and
                  Brent Waters and
                  Edward W. Felten},
  editor       = {Allan Ellis and
                  Tatsuya Hagino},
  title        = {A convenient method for securely managing passwords},
  booktitle    = {Proceedings of the 14th international conference on World Wide Web,
                  {WWW} 2005, Chiba, Japan, May 10-14, 2005},
  pages        = {471--479},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1060745.1060815},
  doi          = {10.1145/1060745.1060815},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/HaldermanWF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGW05,
  author       = {Dan Boneh and
                  Craig Gentry and
                  Brent Waters},
  title        = {Collusion Resistant Broadcast Encryption With Short Ciphertexts and
                  Private Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenMW05,
  author       = {Xavier Boyen and
                  Qixiang Mei and
                  Brent Waters},
  title        = {Direct Chosen Ciphertext Security from Identity-Based Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {288},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/288},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyenW05,
  author       = {Xavier Boyen and
                  Brent Waters},
  title        = {Compact Group Signatures Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {381},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/381},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyenW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GolleSW04,
  author       = {Philippe Golle and
                  Jessica Staddon and
                  Brent R. Waters},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Secure Conjunctive Keyword Search over Encrypted Data},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {31--45},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_3},
  doi          = {10.1007/978-3-540-24852-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GolleSW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WatersJHF04,
  author       = {Brent Waters and
                  Ari Juels and
                  J. Alex Halderman and
                  Edward W. Felten},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {New client puzzle outsourcing techniques for DoS resistance},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {246--256},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030117},
  doi          = {10.1145/1030083.1030117},
  timestamp    = {Fri, 13 Nov 2020 16:10:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WatersJHF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/WatersBDS04,
  author       = {Brent R. Waters and
                  Dirk Balfanz and
                  Glenn Durfee and
                  Diana K. Smetters},
  title        = {Building an Encrypted and Searchable Audit Log},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2004, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2004},
  url          = {https://www.ndss-symposium.org/ndss2004/building-encrypted-and-searchable-audit-log/},
  timestamp    = {Mon, 01 Feb 2021 08:42:17 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/WatersBDS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/HaldermanWF04,
  author       = {J. Alex Halderman and
                  Brent R. Waters and
                  Edward W. Felten},
  editor       = {Vijay Atluri and
                  Paul F. Syverson and
                  Sabrina De Capitani di Vimercati},
  title        = {Privacy management for portable recording devices},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2004, Washington, DC, USA, October 28, 2004},
  pages        = {16--24},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029179.1029183},
  doi          = {10.1145/1029179.1029183},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/HaldermanWF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahaiW04,
  author       = {Amit Sahai and
                  Brent Waters},
  title        = {Fuzzy Identity Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahaiW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Waters04,
  author       = {Brent R. Waters},
  title        = {Efficient Identity-Based Encryption Without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Waters04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WatersFS03,
  author       = {Brent R. Waters and
                  Edward W. Felten and
                  Amit Sahai},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Receiver anonymity via incomparable public keys},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {112--121},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948127},
  doi          = {10.1145/948109.948127},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WatersFS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics