Allison Bishop
Allison B. Lewko
Allison Bishop Lewko
Columbia University, New York City, USA
http://www.cs.columbia.edu/~allison/
https://zbmath.org/authors/?q=ai:lewko.allison
Anindya Bhandari
Allison Bishop
What If Alice Wants Her Story Told?
900
2023
2023
IACR Cryptol. ePrint Arch.
https://eprint.iacr.org/2023/900
db/journals/iacr/iacr2023.html#BhandariB23
Arthur Américo
Allison Bishop
Paul Cesaretti
Garrison Grogan
Adam McKoy
Robert Moss
Lisa Oakley
Marcel Ribeiro
Mohammad Shokri
Defining and Controlling Information Leakage in US Equities Trading.
971
2023
2023
IACR Cryptol. ePrint Arch.
https://eprint.iacr.org/2023/971
db/journals/iacr/iacr2023.html#AmericoBCGMMORS23
Ghada Almashaqbeh
Allison Bishop
Justin Cappos
MicroCash: Practical Concurrent Processing of Micropayments.
227-244
2020
Financial Cryptography
https://doi.org/10.1007/978-3-030-51280-4_13
conf/fc/2020
db/conf/fc/fc2020.html#AlmashaqbehBC20
Alexander Bienstock
Allison Bishop
Eli Goldin
Garrison Grogan
Victor Lecomte
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?
164
2020
2020
IACR Cryptol. ePrint Arch.
https://eprint.iacr.org/2020/164
db/journals/iacr/iacr2020.html#BienstockBGGL20
Ghada Almashaqbeh
Kevin Kelley
Allison Bishop
Justin Cappos
CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks.
250-258
2019
CNS
https://doi.org/10.1109/CNS.2019.8802825
conf/cns/2019
db/conf/cns/cns2019.html#AlmashaqbehKBC19
Ghada Almashaqbeh
Allison Bishop
Justin Cappos
ABC: A Cryptocurrency-Focused Threat Modeling Framework.
859-864
2019
INFOCOM Workshops
https://doi.org/10.1109/INFCOMW.2019.8845101
conf/infocom/2019w
db/conf/infocom/infocom2019w.html#AlmashaqbehBC19
Ghada Almashaqbeh
Allison Bishop
Justin Cappos
ABC: A Cryptocurrency-Focused Threat Modeling Framework.
2019
abs/1903.03422
CoRR
http://arxiv.org/abs/1903.03422
db/journals/corr/corr1903.html#abs-1903-03422
Kevin Shi
Daniel Hsu 0001
Allison Bishop
A cryptographic approach to black box adversarial machine learning.
2019
abs/1906.03231
CoRR
http://arxiv.org/abs/1906.03231
db/journals/corr/corr1906.html#abs-1906-03231
Ghada Almashaqbeh
Kevin Kelley
Allison Bishop
Justin Cappos
CAPnet: A Defense Against Cache Accounting Attacks on Content Distribution Networks.
2019
abs/1906.10272
CoRR
http://arxiv.org/abs/1906.10272
db/journals/corr/corr1906.html#abs-1906-10272
Ghada Almashaqbeh
Allison Bishop
Justin Cappos
MicroCash: Practical Concurrent Processing of Micropayments.
2019
abs/1911.08520
CoRR
http://arxiv.org/abs/1911.08520
db/journals/corr/corr1911.html#abs-1911-08520
Allison Bishop
Lucas Kowalczyk
Tal Malkin
Valerio Pastro
Mariana Raykova 0001
Kevin Shi
In Pursuit of Clarity In Obfuscation.
463
2019
2019
IACR Cryptol. ePrint Arch.
https://eprint.iacr.org/2019/463
db/journals/iacr/iacr2019.html#BishopKMPRS19
Allison Bishop
Lucas Kowalczyk
Tal Malkin
Valerio Pastro
Mariana Raykova 0001
Kevin Shi
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards.
731-752
2018
CRYPTO (3)
https://doi.org/10.1007/978-3-319-96878-0_25
conf/crypto/2018-3
db/conf/crypto/crypto2018-3.html#BishopKMP0S18
Allison Bishop
Lucas Kowalczyk
Tal Malkin
Valerio Pastro
Mariana Raykova 0001
Kevin Shi
A Simple Obfuscation Scheme for Pattern-Matching with Wildcards.
210
2018
2018
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2018/210
db/journals/iacr/iacr2018.html#BishopKMP0S18
Allison Bishop
Valerio Pastro
Rajmohan Rajaraman
Daniel Wichs
Essentially Optimal Robust Secret Sharing with Maximal Corruptions.
58-86
2016
EUROCRYPT (1)
https://doi.org/10.1007/978-3-662-49890-3_3
conf/eurocrypt/2016-1
db/conf/eurocrypt/eurocrypt2016-1.html#BishopPRW16
Allison Bishop
Valerio Pastro
Robust Secret Sharing Schemes Against Local Adversaries.
327-356
2016
Public Key Cryptography (2)
https://doi.org/10.1007/978-3-662-49387-8_13
conf/pkc/2016-2
db/conf/pkc/pkc2016-2.html#BishopP16
Allison Bishop
Yevgeniy Dodis
Interactive Coding for Interactive Proofs.
352-366
2016
TCC (A2)
https://doi.org/10.1007/978-3-662-49099-0_13
conf/tcc/2016a2
db/conf/tcc/tcc2016a2.html#BishopD16
Allison B. Lewko
Mark Lewko
On the complexity of asynchronous agreement against powerful adversaries.
377-389
2015
28
Distributed Comput.
6
https://doi.org/10.1007/s00446-014-0224-5
db/journals/dc/dc28.html#LewkoL15
Allison Bishop
Abhishek Jain 0002
Lucas Kowalczyk
Function-Hiding Inner Product Encryption.
470-491
2015
ASIACRYPT (1)
https://doi.org/10.1007/978-3-662-48797-6_20
conf/asiacrypt/2015-1
db/conf/asiacrypt/asiacrypt2015-1.html#Bishop0K15
Allison Bishop
Susan Hohenberger
Brent Waters
New Circular Security Counterexamples from Decision Linear and Learning with Errors.
776-800
2015
ASIACRYPT (2)
https://doi.org/10.1007/978-3-662-48800-3_32
conf/asiacrypt/2015-2
db/conf/asiacrypt/asiacrypt2015-2.html#BishopHW15
Lucas Kowalczyk
Allison Bishop Lewko
Bilinear Entropy Expansion from the Decisional Linear Assumption.
524-541
2015
CRYPTO (2)
https://doi.org/10.1007/978-3-662-48000-7_26
conf/crypto/2015-2
db/conf/crypto/crypto2015-2.html#KowalczykL15
Craig Gentry
Allison Bishop Lewko
Amit Sahai
Brent Waters
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption.
151-170
2015
FOCS
https://doi.org/10.1109/FOCS.2015.19
https://doi.ieeecomputersociety.org/10.1109/FOCS.2015.19
conf/focs/2015
db/conf/focs/focs2015.html#GentryLSW15
Abhishek Jain 0002
Yael Tauman Kalai
Allison Bishop Lewko
Interactive Coding for Multiparty Protocols.
1-10
2015
ITCS
https://doi.org/10.1145/2688073.2688109
conf/innovations/2015
db/conf/innovations/innovations2015.html#0002KL15
Allison B. Lewko
Sarah Meiklejohn
A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups.
377-398
2015
Public Key Cryptography
https://doi.org/10.1007/978-3-662-46447-2_17
conf/pkc/2015
db/conf/pkc/pkc2015.html#LewkoM15
Venkata Koppula
Allison Bishop Lewko
Brent Waters
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory.
419-428
2015
STOC
https://doi.org/10.1145/2746539.2746614
conf/stoc/2015
db/conf/stoc/stoc2015.html#KoppulaLW15
Tal Malkin
Vladimir Kolesnikov
Allison Bishop Lewko
Michalis Polychronakis
Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers
ACNS
Springer
2015
Lecture Notes in Computer Science
9092
978-3-319-28165-0
https://doi.org/10.1007/978-3-319-28166-7
db/conf/acns/acns2015.html
Allison B. Lewko
Ellen Vitercik
Balancing Communication for Multi-party Interactive Coding.
2015
abs/1503.06381
CoRR
http://arxiv.org/abs/1503.06381
db/journals/corr/corr1503.html#LewkoV15
Allison Bishop
Abhishek Jain 0002
Lucas Kowalczyk
Function-Hiding Inner Product Encryption.
672
2015
2015
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2015/672
db/journals/iacr/iacr2015.html#BishopJK15
Allison Bishop
Susan Hohenberger
Brent Waters
New Circular Security Counterexamples from Decision Linear and Learning with Errors.
715
2015
2015
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2015/715
db/journals/iacr/iacr2015.html#BishopHW15
Allison Bishop
Valerio Pastro
Rajmohan Rajaraman
Daniel Wichs
Essentially Optimal Robust Secret Sharing with Maximal Corruptions.
1032
2015
2015
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2015/1032
db/journals/iacr/iacr2015.html#BishopPRW15
Craig Gentry
Allison B. Lewko
Brent Waters
Witness Encryption from Instance Independent Assumptions.
426-443
2014
CRYPTO (1)
https://doi.org/10.1007/978-3-662-44371-2_24
conf/crypto/2014-1
db/conf/crypto/crypto2014-1.html#GentryLW14
Allison B. Lewko
Brent Waters
Why Proving HIBE Systems Secure Is Difficult.
58-76
2014
EUROCRYPT
https://doi.org/10.1007/978-3-642-55220-5_4
conf/eurocrypt/2014
db/conf/eurocrypt/eurocrypt2014.html#LewkoW14
Craig Gentry
Allison Bishop Lewko
Brent Waters
Witness Encryption from Instance Independent Assumptions.
273
2014
2014
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2014/273
db/journals/iacr/iacr2014.html#GentryLW14
Craig Gentry
Allison B. Lewko
Amit Sahai
Brent Waters
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption.
309
2014
2014
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2014/309
db/journals/iacr/iacr2014.html#GentryLSW14
Lucas Kowalczyk
Allison Bishop Lewko
Bilinear Entropy Expansion from the Decisional Linear Assumption.
754
2014
2014
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2014/754
db/journals/iacr/iacr2014.html#KowalczykL14
Yevgeniy Dodis
Allison Bishop Lewko
Interactive Coding for Interactive Proofs.
827
2014
2014
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2014/827
db/journals/iacr/iacr2014.html#DodisL14
Allison Bishop Lewko
Valerio Pastro
Robust Secret Sharing Schemes Against Local Adversaries.
909
2014
2014
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2014/909
db/journals/iacr/iacr2014.html#LewkoP14
Venkata Koppula
Allison Bishop Lewko
Brent Waters
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory.
925
2014
2014
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2014/925
db/journals/iacr/iacr2014.html#KoppulaLW14
Allison B. Lewko
Mark Lewko
On the complexity of asynchronous agreement against powerful adversaries.
280-289
2013
PODC
https://doi.org/10.1145/2484239.2484250
conf/podc/2013
db/conf/podc/podc2013.html#LewkoL13
Allison B. Lewko
Mark Lewko
On the Complexity of Asynchronous Agreement Against Powerful Adversaries
http://arxiv.org/abs/1301.3223
2013
CoRR
abs/1301.3223
db/journals/corr/corr1301.html#abs-1301-3223
Allison B. Lewko
Brent Waters
Why Proving HIBE Systems Secure is Difficult.
68
2013
2013
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2013/068
db/journals/iacr/iacr2013.html#LewkoW13
Allison B. Lewko
Sarah Meiklejohn
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order in Prime-Order Bilinear Groups.
300
2013
2013
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2013/300
db/journals/iacr/iacr2013.html#LewkoM13
Michael Gerbush
Allison B. Lewko
Adam O'Neill
Brent Waters
Dual Form Signatures: An Approach for Proving Security from Static Assumptions.
25-42
2012
ASIACRYPT
https://doi.org/10.1007/978-3-642-34961-4_4
conf/asiacrypt/2012
db/conf/asiacrypt/asiacrypt2012.html#GerbushLOW12
Allison B. Lewko
Brent Waters
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.
180-198
2012
CRYPTO
https://doi.org/10.1007/978-3-642-32009-5_12
conf/crypto/2012
db/conf/crypto/crypto2012.html#LewkoW12
Allison B. Lewko
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting.
318-335
2012
EUROCRYPT
https://doi.org/10.1007/978-3-642-29011-4_20
conf/eurocrypt/2012
db/conf/eurocrypt/eurocrypt2012.html#Lewko12
Susan Hohenberger
Allison B. Lewko
Brent Waters
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security.
663-681
2012
EUROCRYPT
https://doi.org/10.1007/978-3-642-29011-4_39
conf/eurocrypt/2012
db/conf/eurocrypt/eurocrypt2012.html#HohenbergerLW12
Yael Tauman Kalai
Allison B. Lewko
Anup Rao 0001
Formulas Resilient to Short-Circuit Errors.
490-499
2012
FOCS
https://doi.org/10.1109/FOCS.2012.69
https://doi.ieeecomputersociety.org/10.1109/FOCS.2012.69
conf/focs/2012
db/conf/focs/focs2012.html#KalaiLR12
Shafi Goldwasser
Allison B. Lewko
David A. Wilson
Bounded-Collusion IBE from Key Homomorphism.
564-581
2012
TCC
https://doi.org/10.1007/978-3-642-28914-9_32
conf/tcc/2012
db/conf/tcc/tcc2012.html#GoldwasserLW12
Susan Hohenberger
Allison B. Lewko
Brent Waters
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security.
6
2012
2012
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2012/006
db/journals/iacr/iacr2012.html#HohenbergerLW12
Michael Gerbush
Allison B. Lewko
Adam O'Neill
Brent Waters
Dual Form Signatures: An Approach for Proving Security from Static Assumptions.
261
2012
2012
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2012/261
db/journals/iacr/iacr2012.html#GerbushLOW12
Allison B. Lewko
Brent Waters
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.
326
2012
2012
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2012/326
db/journals/iacr/iacr2012.html#LewkoW12
Allison B. Lewko
Mark Lewko
On the structure of sets of large doubling.
688-708
2011
32
Eur. J. Comb.
5
https://doi.org/10.1016/j.ejc.2011.03.001
db/journals/ejc/ejc32.html#LewkoL11
Allison B. Lewko
Brent Waters
Unbounded HIBE and Attribute-Based Encryption.
547-567
2011
EUROCRYPT
https://doi.org/10.1007/978-3-642-20465-4_30
conf/eurocrypt/2011
db/conf/eurocrypt/eurocrypt2011.html#LewkoW11
Allison B. Lewko
Brent Waters
Decentralizing Attribute-Based Encryption.
568-588
2011
EUROCRYPT
https://doi.org/10.1007/978-3-642-20465-4_31
conf/eurocrypt/2011
db/conf/eurocrypt/eurocrypt2011.html#LewkoW11a
Yevgeniy Dodis
Allison B. Lewko
Brent Waters
Daniel Wichs
Storing Secrets on Continually Leaky Devices.
688-697
2011
FOCS
https://doi.org/10.1109/FOCS.2011.35
https://doi.ieeecomputersociety.org/10.1109/FOCS.2011.35
conf/focs/2011
db/conf/focs/focs2011.html#DodisLWW11
Allison B. Lewko
Mark Lewko
Brent Waters
How to leak on key updates.
725-734
2011
STOC
https://doi.org/10.1145/1993636.1993732
conf/stoc/2011
db/conf/stoc/stoc2011.html#LewkoLW11
Allison B. Lewko
Yannis Rouselakis
Brent Waters
Achieving Leakage Resilience through Dual System Encryption.
70-88
2011
TCC
https://doi.org/10.1007/978-3-642-19571-6_6
conf/tcc/2011
db/conf/tcc/tcc2011.html#LewkoRW11
Allison B. Lewko
The Contest between Simplicity and Efficiency in Asynchronous Byzantine Agreement.
348-362
2011
DISC
https://doi.org/10.1007/978-3-642-24100-0_35
conf/wdag/2011
db/conf/wdag/disc2011.html#Lewko11
Allison B. Lewko
The Contest Between Simplicity and Efficiency in Asynchronous Byzantine Agreement
http://arxiv.org/abs/1106.5170
2011
CoRR
abs/1106.5170
db/journals/corr/corr1106.html#abs-1106-5170
Allison B. Lewko
Brent Waters
Unbounded HIBE and Attribute-Based Encryption.
49
2011
2011
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2011/049
db/journals/iacr/iacr2011.html#LewkoW11
Yevgeniy Dodis
Allison B. Lewko
Brent Waters
Daniel Wichs
Storing Secrets on Continually Leaky Devices.
369
2011
2011
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2011/369
db/journals/iacr/iacr2011.html#DodisLWW11
Allison B. Lewko
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting.
490
2011
2011
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2011/490
db/journals/iacr/iacr2011.html#Lewko11
Allison B. Lewko
Tatsuaki Okamoto
Amit Sahai
Katsuyuki Takashima
Brent Waters
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
62-91
2010
EUROCRYPT
https://doi.org/10.1007/978-3-642-13190-5_4
conf/eurocrypt/2010
db/conf/eurocrypt/eurocrypt2010.html#LewkoOSTW10
Allison B. Lewko
Brent Waters
On the Insecurity of Parallel Repetition for Leakage Resilience.
521-530
2010
FOCS
https://doi.org/10.1109/FOCS.2010.57
https://doi.ieeecomputersociety.org/10.1109/FOCS.2010.57
conf/focs/2010
db/conf/focs/focs2010.html#LewkoW10
Allison B. Lewko
Amit Sahai
Brent Waters
Revocation Systems with Very Small Private Keys.
273-285
2010
IEEE Symposium on Security and Privacy
https://doi.org/10.1109/SP.2010.23
https://doi.ieeecomputersociety.org/10.1109/SP.2010.23
conf/sp/2010
db/conf/sp/sp2010.html#LewkoSW10
Allison B. Lewko
Brent Waters
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
455-479
2010
TCC
https://doi.org/10.1007/978-3-642-11799-2_27
conf/tcc/2010
db/conf/tcc/tcc2010.html#LewkoW10
Allison B. Lewko
Tatsuaki Okamoto
Amit Sahai
Katsuyuki Takashima
Brent Waters
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
110
2010
2010
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2010/110
db/journals/iacr/iacr2010.html#LewkoOSTW10
Allison B. Lewko
Brent Waters
Decentralizing Attribute-Based Encryption.
351
2010
2010
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2010/351
db/journals/iacr/iacr2010.html#LewkoW10
Allison B. Lewko
Brent Waters
On the Insecurity of Parallel Repetition for Leakage Resilience.
404
2010
2010
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2010/404
db/journals/iacr/iacr2010.html#LewkoW10a
Allison B. Lewko
Yannis Rouselakis
Brent Waters
Achieving Leakage Resilience Through Dual System Encryption.
438
2010
2010
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2010/438
db/journals/iacr/iacr2010.html#LewkoRW10
Allison B. Lewko
Mark Lewko
Brent Waters
How to Leak on Key Updates.
562
2010
2010
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2010/562
db/journals/iacr/iacr2010.html#LewkoLW10
Allison B. Lewko
Brent Waters
Efficient pseudorandom functions from the decisional linear assumption and weaker variants.
112-120
2009
CCS
https://doi.org/10.1145/1653662.1653677
conf/ccs/2009
db/conf/ccs/ccs2009.html#LewkoW09
Allison B. Lewko
Brent Waters
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
482
2009
2009
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2009/482
db/journals/iacr/iacr2009.html#LewkoW09
Allison B. Lewko
Brent Waters
Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants.
486
2009
2009
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2009/486
db/journals/iacr/iacr2009.html#LewkoW09a
Allison B. Lewko
Amit Sahai
Brent Waters
Revocation Systems with Very Small Private Keys.
309
2008
2008
IACR Cryptol. ePrint Arch.
http://eprint.iacr.org/2008/309
db/journals/iacr/iacr2008.html#LewkoSW08
Ghada A. Al-MashaqbehGhada Almashaqbeh
Arthur Américo
Anindya Bhandari
Alexander Bienstock
Justin Cappos
Paul Cesaretti
Yevgeniy Dodis
Craig Gentry
Michael Gerbush
Eli Goldin
Shafi Goldwasser
Garrison Grogan
Susan Hohenberger
Daniel Hsu 0001
Abhishek Jain 0002
Yael Tauman Kalai
Kevin Kelley
Vladimir Kolesnikov
Venkata Koppula
Lucas Kowalczyk
Victor Lecomte
Mark Lewko
Tal Malkin
Adam McKoy
Sarah Meiklejohn
Robert Moss
Lisa Oakley
Tatsuaki Okamoto
Adam O'Neill
Valerio Pastro
Michalis Polychronakis
Rajmohan Rajaraman
Anup Rao 0001
Mariana Raykova 0001
Marcel Ribeiro
Yannis Rouselakis
Amit Sahai
Kevin Shi
Mohammad Shokri
Katsuyuki Takashima
Ellen Vitercik
Brent Waters
Daniel Wichs
David A. Wilson