|
Search the dblp DataBase
Brent Waters:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Xavier Boyen, Qixiang Mei, Brent Waters
Direct chosen ciphertext security from identity-based techniques. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:320-329 [Conf]
- Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten
New client puzzle outsourcing techniques for DoS resistance. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:246-256 [Conf]
- Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters
Attribute-based encryption for fine-grained access control of encrypted data. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:89-98 [Conf]
- Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Brent Waters
Secure attribute-based systems. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:99-112 [Conf]
- Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters
Forward-secure signatures with untrusted update. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:191-200 [Conf]
- Dan Boneh, Brent Waters
A fully collusion resistant broadcast, trace, and revoke system. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:211-220 [Conf]
- Dan Boneh, Craig Gentry, Brent Waters
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:258-275 [Conf]
- Xavier Boyen, Brent Waters
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). [Citation Graph (0, 0)][DBLP] CRYPTO, 2006, pp:290-307 [Conf]
- Dan Boneh, Amit Sahai, Brent Waters
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2006, pp:573-592 [Conf]
- Xavier Boyen, Brent Waters
Compact Group Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2006, pp:427-444 [Conf]
- Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
Sequential Aggregate Signatures and Multisignatures Without Random Oracles. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2006, pp:465-485 [Conf]
- Amit Sahai, Brent Waters
Fuzzy Identity-Based Encryption. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:457-473 [Conf]
- Brent Waters
Efficient Identity-Based Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:114-127 [Conf]
- Adam Barth, Dan Boneh, Brent Waters
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2006, pp:52-64 [Conf]
- Dan Boneh, Emily Shen, Brent Waters
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2006, pp:229-240 [Conf]
- John Bethencourt, Dawn Xiaodong Song, Brent Waters
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:132-139 [Conf]
- John Bethencourt, Amit Sahai, Brent Waters
Ciphertext-Policy Attribute-Based Encryption. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2007, pp:321-334 [Conf]
- Dan Boneh, Brent Waters
Conjunctive, Subset, and Range Queries on Encrypted Data. [Citation Graph (0, 0)][DBLP] TCC, 2007, pp:535-554 [Conf]
- J. Alex Halderman, Brent Waters, Edward W. Felten
A convenient method for securely managing passwords. [Citation Graph (0, 0)][DBLP] WWW, 2005, pp:471-479 [Conf]
- Hovav Shacham, Brent Waters
Efficient Ring Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:166-180 [Conf]
- Xavier Boyen, Brent Waters
Full-Domain Subgroup Hiding and Constant-Size Group Signatures. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:1-15 [Conf]
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions. [Citation Graph (, )][DBLP]
Compact Proofs of Retrievability. [Citation Graph (, )][DBLP]
Attribute-based encryption with non-monotonic access structures. [Citation Graph (, )][DBLP]
Harvesting verifiable challenges from oblivious online sources. [Citation Graph (, )][DBLP]
Black-box accountable authority identity-based encryption. [Citation Graph (, )][DBLP]
Efficient pseudorandom functions from the decisional linear assumption and weaker variants. [Citation Graph (, )][DBLP]
A Framework for Efficient and Composable Oblivious Transfer. [Citation Graph (, )][DBLP]
Short and Stateless Signatures from the RSA Assumption. [Citation Graph (, )][DBLP]
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions. [Citation Graph (, )][DBLP]
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products. [Citation Graph (, )][DBLP]
Realizing Hash-and-Sign Signatures under Standard Assumptions. [Citation Graph (, )][DBLP]
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts). [Citation Graph (, )][DBLP]
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption. [Citation Graph (, )][DBLP]
Constructing Verifiable Random Functions with Large Input Spaces. [Citation Graph (, )][DBLP]
On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations. [Citation Graph (, )][DBLP]
Delegating Capabilities in Predicate Encryption Systems. [Citation Graph (, )][DBLP]
Cryptographic Methods for Storing Ballots on a Voting Machine. [Citation Graph (, )][DBLP]
Analysis-Resistant Malware. [Citation Graph (, )][DBLP]
Signing a Linear Subspace: Signature Schemes for Network Coding. [Citation Graph (, )][DBLP]
Revocation Systems with Very Small Private Keys. [Citation Graph (, )][DBLP]
Lossy trapdoor functions and their applications. [Citation Graph (, )][DBLP]
Predicate Privacy in Encryption Systems. [Citation Graph (, )][DBLP]
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts. [Citation Graph (, )][DBLP]
Lossy Trapdoor Functions and Their Applications. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|