Shweta Agrawal
Shweta Agrawal
Verified email at - Homepage
Cited by
Cited by
Efficient lattice (h) ibe in the standard model.
S Agrawal, D Boneh, X Boyen
Eurocrypt 6110, 553-572, 2010
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE
S Agrawal, D Boneh, X Boyen
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
Homomorphic MACs: MAC-based integrity for network coding
S Agrawal, D Boneh
Applied Cryptography and Network Security: 7th International Conference …, 2009
Functional encryption for inner product predicates from learning with errors
S Agrawal, DM Freeman, V Vaikuntanathan
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
Fully secure functional encryption for inner products, from standard assumptions
S Agrawal, B Libert, D Stehlé
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
Functional encryption: New perspectives and lower bounds
S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
Functional encryption for threshold functions (or fuzzy IBE) from lattices
S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
Preventing pollution attacks in multi-source network coding
S Agrawal, D Boneh, X Boyen, DM Freeman
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
Secrecy using compressive sensing
S Agrawal, S Vishwanath
2011 IEEE Information Theory Workshop, 563-567, 2011
Functional encryption and property preserving encryption: New definitions and positive results
S Agrawal, S Agrawal, S Badrinarayanan, A Kumarasubramanian, ...
Cryptology ePrint Archive, 2013
Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
S Agrawal
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
Discrete gaussian leftover hash lemma over infinite domains
S Agrawal, C Gentry, S Halevi, A Sahai
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
Privacy and security of Aadhaar: a computer science perspective
S Agrawal, S Banerjee, S Sharma
Economic and Political Weekly 52 (37), 93-102, 2017
Stronger security for reusable garbled circuits, general definitions and attacks
S Agrawal
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
Adaptive protocols for interactive communication
S Agrawal, R Gelles, A Sahai
2016 IEEE International Symposium on Information Theory (ISIT), 595-599, 2016
Optimal broadcast encryption from pairings and LWE
S Agrawal, S Yamada
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
On continual leakage of discrete log representations
S Agrawal, Y Dodis, V Vaikuntanathan, D Wichs
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
Efficient public trace and revoke from standard assumptions
S Agrawal, S Bhattacherjee, DH Phan, D Stehlé, S Yamada
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Functional encryption for bounded collusions, revisited
S Agrawal, A Rosen
Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017
Fuzzy identity based encryption from lattices
S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee
Cryptology ePrint Archive, 2011
The system can't perform the operation now. Try again later.
Articles 1–20