Brent Waters
Brent Waters
Verified email at cs.utexas.edu - Homepage
TitleCited byYear
Attribute-based encryption for fine-grained access control of encrypted data
V Goyal, O Pandey, A Sahai, B Waters
Proceedings of the 13th ACM conference on Computer and communications …, 2006
46392006
Ciphertext-policy attribute-based encryption
J Bethencourt, A Sahai, B Waters
2007 IEEE symposium on security and privacy (SP'07), 321-334, 2007
42462007
Fuzzy identity-based encryption
A Sahai, B Waters
Annual International Conference on the Theory and Applications of …, 2005
38952005
Efficient identity-based encryption without random oracles
B Waters
Annual International Conference on the Theory and Applications of …, 2005
21772005
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
B Waters
International Workshop on Public Key Cryptography, 53-70, 2011
16422011
Compact proofs of retrievability
H Shacham, B Waters
International Conference on the Theory and Application of Cryptology and …, 2008
16042008
Conjunctive, subset, and range queries on encrypted data
D Boneh, B Waters
Theory of Cryptography Conference, 535-554, 2007
13742007
Attribute-based encryption with non-monotonic access structures
R Ostrovsky, A Sahai, B Waters
Proceedings of the 14th ACM conference on Computer and communications …, 2007
11592007
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
A Lewko, T Okamoto, A Sahai, K Takashima, B Waters
Annual International Conference on the Theory and Applications of …, 2010
11462010
Collusion resistant broadcast encryption with short ciphertexts and private keys
D Boneh, C Gentry, B Waters
Annual International Cryptology Conference, 258-275, 2005
10962005
Predicate encryption supporting disjunctions, polynomial equations, and inner products
J Katz, A Sahai, B Waters
annual international conference on the theory and applications of …, 2008
10382008
Decentralizing attribute-based encryption
A Lewko, B Waters
Annual international conference on the theory and applications of …, 2011
10052011
Candidate indistinguishability obfuscation and functional encryption for all circuits
S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters
SIAM Journal on Computing 45 (3), 882-929, 2016
9702016
Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based
C Gentry, A Sahai, B Waters
Annual Cryptology Conference, 75-92, 2013
8052013
Secure conjunctive keyword search over encrypted data
P Golle, J Staddon, B Waters
International Conference on Applied Cryptography and Network Security, 31-45, 2004
7892004
Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
B Waters
Annual International Cryptology Conference, 619-636, 2009
7882009
Functional encryption: Definitions and challenges
D Boneh, A Sahai, B Waters
Theory of Cryptography Conference, 253-273, 2011
6572011
Secure attribute-based systems
M Pirretti, P Traynor, P McDaniel, B Waters
Journal of Computer Security 18 (5), 799-837, 2010
6312010
Outsourcing the decryption of abe ciphertexts.
M Green, S Hohenberger, B Waters
USENIX Security Symposium 2011 (3), 2011
5822011
A framework for efficient and composable oblivious transfer
C Peikert, V Vaikuntanathan, B Waters
Annual international cryptology conference, 554-571, 2008
5672008
The system can't perform the operation now. Try again later.
Articles 1–20