Publications

Reverse chronological order

2013

  • Constrained Pseudorandom Functions and Their Applications
    By Dan Boneh and Brent Waters
    Asiacrypt 2013
    Download (pdf)

  • New Constructions and Proof Methods for Large Universe Attribute-Based Encryption
    By Yannis Rouselakis and Brent Waters
    CCS 2013
    Download (pdf)

  • Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
    Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai and Brent Waters
    FOCS 2013
    Download (pdf)

  • Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Identity-Based
    By Craig Gentry, Amit Sahai Brent Waters
    CRYPTO 2013
    Download (pdf)

  • Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
    By Susan Hohenberger, Amit Sahai and Brent Waters
    CRYPTO 2013
    Download (pdf)

  • Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
    Benny Applebaum, Yuval Ishai, Eyal Kushilevitz and Brent Waters
    CRYPTO 2013
    Download (pdf)

  • Attribute-Based Encryption for Circuits from Multilinear Maps
    By Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai and Brent Waters
    CRYPTO 2013
    Download (pdf)

  • Witness Encryption and its Applications
    By Sanjam Garg, Craig Gentry, Amit Sahai and Brent Waters
    STOC 2013
    Download (pdf)

  • Anon-Pass: Practical Anonymous Subscriptions
    By Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, and Emmett Witchel
    Proceedings of 2013 IEEE Symposium on Security and Privacy
    Download (pdf)

  • The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
    By Karyn Benson, Hovav Shacham and Brent Waters
    CT-RSA 2013
    Download (pdf)

  • Attribute-Based Encryption with Fast Decryption
    By Susan Hohenberger and Brent Waters
    PKC 2013
    Download (pdf)

  • Reconstructing a Fragmented Face from a Cryptographic Identification Protocol
    By Andy Luong, Michael Gerbush, Brent Waters and Kristen Grauman
    WACV 2013
    Download (pdf)

    2012

  • Dual Form Signatures: An Approach for Proving Security from Static Assumptions
    By Michael Gerbush, Allison Lewko, Adam O'Neill and Brent Waters
    Asiacrypt 2012
    Download (pdf)

  • Functional Encryption for Regular Languages
    By Brent Waters
    CRYPTO 2012
    Download (pdf)

  • Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
    By Amit Sahai, Hakan Seyalioglu and Brent Waters
    CRYPTO 2012

  • New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
    By Allison Lewko and Brent Waters
    CRYPTO 2012
    Download (pdf)

  • Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
    By Susan Hohenberger, Allison Lewko and Brent Waters
    Eurocrypt 2012
    Download (pdf)

  • Identity-Based (Lossy) Trapdoor Functions and Applications
    By Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters
    Eurocrypt 2012
    Download (pdf)

  • Standard Security Does Not Imply Security Against Selective-Opening
    By Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek
    Eurocrypt 2012
    Download (pdf)

  • Computing on Authenticated Data
    By Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters
    TCC 2012
    Download (pdf)

  • Targeted Malleability: Homomorphic Encryption for Restricted Computations
    By Dan Boneh and Gil Segev and Brent Waters
    Innovations in Theoretical Computer Science (ITCS) 2012
    Download (pdf)

    2011

  • Storing Secrets on Continually Leaky Devices
    By Yevgeniy Dodis, Allison Lewko, Brent Waters and Daniel Wichs
    FOCS 2011
    Download (pdf)

  • Outsourcing the Decryption of ABE Ciphertexts
    By Matthew Green, Susan Hohenberger and Brent Waters
    USENIX Security 2011
    Download (pdf)

  • Cloaking Malware with the Trusted Platform Module
    By Alan Dunn, Owen Hofmann, Brent Waters and Emmett Witchel
    USENIX Security 2011
    Download (pdf)

  • How to Leak on Key Updates
    By Allison Lewko, Mark Lewko and Brent Waters
    STOC 2011
    Download (pdf)

  • Unbounded HIBE and Attribute-Based Encryption
    By Allison Lewko and Brent Waters
    Eurocrypt 2011
    Download (pdf)

  • Decentralizing Attribute-Based Encryption
    By Allison Lewko and Brent Waters
    Eurocrypt 2011
    Download (pdf)

  • Achieving Leakage Resilience Through Dual System Encryption
    By Allison Lewko, Yannis Rouselakis, and Brent Waters
    TCC 2011
    Download (pdf)

  • Functional Encryption: Definitions and Challenges
    By Dan Boneh, Amit Sahai, and Brent Waters
    TCC 2011
    Download (pdf)

  • Identity-Based Encryption Secure Against Selective Opening Attack
    By Mihir Bellare, Brent Waters, and Scott Yilek
    TCC 2011
    Download (pdf)

  • Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
    By Brent Waters
    PKC 2011
    Download (pdf)

    2010

  • On the Insecurity of Parallel Repetition for Leakage Resilience
    By Allison Lewko and Brent Waters
    FOCS 2010
    Download (pdf)

  • Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
    By Sherman S.M. Chow, Yevgeniy Dodis, Yannis Rouselakis and Brent Waters
    CCS 2010
    Download (pdf)

  • Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
    By Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai and Brent Waters
    CCS 2010
    Download (pdf)

  • Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
    By Xavier Boyen and Brent Waters
    ACNS 2010
    Download (pdf)

  • Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    By Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters
    Eurocrypt 2010
    Download (pdf)

  • Constructing Verifiable Random Functions with Large Input Spaces
    By Susan Hohenberger and Brent Waters
    Eurocrypt 2010
    Download (pdf)

  • Revocation Systems with Very Small Private Keys
    By Allison, Lewko, Amit Sahai and Brent Waters
    Proceedings of 2010 IEEE Symposium on Security and Privacy
    Download (pdf)

  • Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
    By Scott Wolchok, Owen S. Hofmann, Nadia Heninger, J. Alex Halderman, Christopher J. Rossbach, Edward W. Felten, Brent Waters, and Emmett Witchel
    NDSS 2010
    Download (pdf)

  • Fully Secure HIBE with Short Ciphertexts
    By Allison Lewko and Brent Waters
    TCC 2010
    Download (pdf)

    2009

  • Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants
    By Allison Lewko and Brent Waters
    CCS 2009
    Download (pdf)

  • Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
    By Brent Waters
    Crypto 2009
    Download (pdf)

  • Short and Stateless Signatures from the RSA Assumption
    By Susan Hohenberger and Brent Waters
    Crypto 2009
    Download (pdf)

  • Realizing Hash-and-Sign Signatures under Standard Assumptions
    By Susan Hohenberger and Brent Waters
    Eurocrypt 2009
    Download (pdf)

  • Adaptive Security in Broadcast Encryption Systems
    By Craig Gentry and Brent Waters
    Eurocrypt 2009
    Download (pdf)

  • Predicate Privacy in Encryption Systems
    By Emily Shen, Elaine Shi, and Brent Waters
    TCC 2009
    Download (pdf)

  • Signing a Linear Subspace: Signature Schemes for Network Coding
    By Dan Boneh, David Freeman, Jonathan Katz, and Brent Waters
    PKC 2009
    Download (pdf)

    2008

  • Compact Proofs of Retrievability
    By Hovav Shacham and Brent Waters
    Asiacrypt 2008
    Download (pdf)

  • Accountable Authority Identity-Based Encryption
    By Vipul Goyal, Steve Lu, Amit Sahai, and Brent Waters
    CCS 2008

  • On The Impossibility of Basing Identity Based Encryption on Trapdoor Permutations
    By Dan Boneh, Periklis Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, and Brent Waters
    FOCS 2008
    Download (pdf)

  • Delegating Capabilities in Predicate Encryption Systems
    By Elaine Shi and Brent Waters
    ICALP (Cryptographer's Track) 2008
    Download (pdf)

  • A Framework for Efficient and Composable Oblivious Transfer
    By Chris Peikert and Vinod Vaikuntanathan and Brent Waters
    Crypto 2008
    Download (pdf)

  • Lossy Trapdoor Functions and their Applications
    By Chris Peikert and Brent Waters
    STOC 2008
    Download (pdf)

  • Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
    By Jonathan Katz and Amit Sahai and Brent Waters
    Eurocrypt 2008
    Download (pdf)

  • Analysis-Resistant Malware
    By John Bethencourt, Dawn Song and Brent Waters
    The 15th Annual Network & Distributed System Security Conference (NDSS 2008)
    Download (pdf)

    2007

  • Harvesting Verifiable Challenges from Oblivious Online Sources
    By Alex Halderman and Brent Waters
    Proceedings of 14th ACM Conference on Computer and Communications Security (CCS 2007)
    Download (pdf)

  • Attribute-Based Encryption with Non-Monotonic Access Structures
    By Rafail Ostrovsky, Amit Sahai, and Brent Waters
    Proceedings of 14th ACM Conference on Computer and Communications Security (CCS 2007)
    Download (pdf)

  • Ciphertext-Policy Attribute-Based Encryption
    By John Bethencourt, Amit Sahai, and Brent Waters
    Proceedings of 2007 IEEE Symposium on Security and Privacy
    Download (pdf)

  • Full-Domain Subgroup Hiding and Constant-Size Group Signatures
    By Xavier Boyen and Brent Waters
    Proceedings of 10th Workshop in Practice and Theory of Public Key Cryptography (PKC 2007)
    Awarded Best Paper
    Download (pdf)

  • Efficient Ring Signatures without Random Oracles
    By Hovav Shacham and Brent Waters
    Proceedings of 10th Workshop in Practice and Theory of Public Key Cryptography (PKC 2007)
    Download (pdf)

  • Cryptographic Methods for Storing Ballots on a Voting Machine
    By John Bethencourt, Dan Boneh and Brent Waters
    The 14th Annual Network & Distributed System Security Conference (NDSS 2007)
    Download (pdf)

  • Conjunctive, Subset, and Range Queries on Encrypted Data
    By Dan Boneh and Brent Waters
    The Fourth Theory of Cryptography Conference (TCC 2007)
    Download (pdf)

    2006

  • Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
    By Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters
    Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
    Download (pdf)

  • Forward Secure Signatures with Untrusted Update
    By Xavier Boyen, Hovav Shacham, Emily Shen, and Brent Waters
    Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
    Download (pdf)

  • Secure Attribute-Based Systems
    By Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters
    Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
    Download (pdf)

  • A Fully Collusion Resistant Broadcast, Trace and Revoke System
    By Dan Boneh and Brent Waters
    Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
    Download (pdf)

  • Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
    By Xavier Boyen and Brent Waters
    Proceeding of Crypto 2006
    Download (pdf)

  • Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
    By Dan Boneh, Amit Sahai, and Brent Waters
    Proceeding of Eurocrypt 2006
    Download (pdf)

  • Sequential Aggregate Signatures and Multisignatures Without Random Oracles
    By Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
    Proceeding of Eurocrypt 2006
    Download (pdf)

  • Compact Group Signatures Without Random Oracles
    By Xavier Boyen and Brent Waters
    Proceeding of Eurocrypt 2006
    Download (pdf)

  • New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)
    By John Bethencourt, Dawn Song, and Brent Waters
    Proceeding of 2006 IEEE Symposium on Security and Privacy
    Download (pdf)

  • Strongly Unforgeable Signatures Based on Computational Difie-Hellman
    By Dan Boneh, Emily Shen, and Brent Waters
    Proceedings of 9th Workshop in Practice and Theory of Public Key Cryptography (PKC 2006)
    Download (pdf)

  • Private encrypted content distribution using private broadcast encryptions
    By Adam Barth, Dan Boneh, and Brent Waters
    10th Financial Cryptography and Data Security Conference (FC 06)
    Download (pdf)

    2005

  • Direct Chosen Ciphertext Security from Identity-Based Techniques
    By Xavier Boyen, Qixiang Mei, and Brent Waters
    Proceedings of 12th ACM Conference on Computer and Communications Security (CCS 2005)
    Download (pdf)

  • Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
    By Dan Boneh, Craig Gentry, and Brent Waters
    Proceedings of Crypto 2005
    Download (pdf)

  • Fuzzy Identity Based Encryption
    By Amit Sahai and Brent Waters
    Proceedings of Eurocrypt 2005
    Download (pdf)

  • Efficient Identity-Based Encryption Without Random Oracles
    By Brent Waters
    Proceedings of Eurocrypt 2005
    Download (pdf)

  • A Convenient Method for Securely Managing Passwords
    By By J. Alex Halderman, Brent Waters, and Edward W. Felten
    Proceedings of The 14th International World Wide Web Conference 2005
    Download (pdf)

    2004

  • New Client Puzzle Outsourcing Techniques for DoS Resistance
    By Brent Waters, Ari Juels, J. Alex Halderman, and Edward W. Felten
    The 11th ACM Conference on Computer and Communications Security (CCS 2004)
    Download (pdf)

  • Privacy Management for Portable Recording Devices
    By J. Alex Halderman, Brent Waters, and Edward W. Felten
    The 3rd Workshop on Privacy in Electronic Society (WPES 2004)
    Download (pdf)

  • Secure Conjunctive Keyword Search over Encrypted Data
    By Philippe Golle, Jessica Staddon, and Brent Waters
    Applied Cryptography and Network Security (ACNS 2004)
    Download (pdf)

  • Building an Encrypted and Searchable Audit Log
    By Brent R. Waters, Dirk Balfanz, Glenn Durfee, and D.K. Smetters
    The 11th Annual Network and Distributed System Security Symposium (NDSS 2004)
    Download (pdf)
    Talk (ppt)

    2003

  • Receiver Anonymity via Incomparable Public Keys
    By Brent R. Waters, Edward W. Felten and Amit Sahai
    10th ACM Conference on Computer and Communications Security (CCS 2003)
    Download (pdf)
    Talk (ppt)

  • Secure, Private Proofs of Location
    By Brent R. Waters and Edward W. Felten
    Princeton Computer Science TR-667-03
    Download (pdf)
    Link to Technical Report