Publications
Reverse chronological order
2013
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Identity-Based
By Craig Gentry, Amit Sahai Brent Waters
CRYPTO 2013
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
By Susan Hohenberger, Amit Sahai and Brent Waters
CRYPTO 2013
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz and Brent Waters
CRYPTO 2013
Download (pdf)
Attribute-Based Encryption for Circuits from Multilinear Maps
By Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai and Brent Waters
CRYPTO 2013
Download (pdf)
Witness Encryption and its Applications
By Sanjam Garg, Craig Gentry, Amit Sahai and Brent Waters
STOC 2013
Download (pdf)
Anon-Pass: Practical Anonymous Subscriptions
By Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, and Emmett Witchel
Proceedings of 2013 IEEE Symposium on Security and Privacy
Download (pdf)
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
By Karyn Benson, Hovav Shacham and Brent Waters
CT-RSA 2013
Download (pdf)
Attribute-Based Encryption with Fast Decryption
By Susan Hohenberger and Brent Waters
PKC 2013
Download (pdf)
Reconstructing a Fragmented Face from a Cryptographic Identification Protocol
By Andy Luong, Michael Gerbush, Brent Waters and Kristen Grauman
WACV 2013
Download (pdf)
2012
Dual Form Signatures: An Approach for Proving Security from Static Assumptions
By Michael Gerbush, Allison Lewko, Adam O'Neill and Brent Waters
Asiacrypt 2012
Download (pdf)
Functional Encryption for Regular Languages
By Brent Waters
CRYPTO 2012
Download (pdf)
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
By Amit Sahai, Hakan Seyalioglu and Brent Waters
CRYPTO 2012
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
By Allison Lewko and Brent Waters
CRYPTO 2012
Download (pdf)
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
By Susan Hohenberger, Allison Lewko and Brent Waters
Eurocrypt 2012
Download (pdf)
Identity-Based (Lossy) Trapdoor Functions and Applications
By Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters
Eurocrypt 2012
Download (pdf)
Standard Security Does Not Imply Security Against Selective-Opening
By Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek
Eurocrypt 2012
Download (pdf)
Computing on Authenticated Data
By Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters
TCC 2012
Download (pdf)
Targeted Malleability: Homomorphic Encryption for Restricted Computations
By Dan Boneh and Gil Segev and Brent Waters
Innovations in Theoretical Computer Science (ITCS) 2012
Download (pdf)
2011
Storing Secrets on Continually Leaky Devices
By Yevgeniy Dodis, Allison Lewko, Brent Waters and Daniel Wichs
FOCS 2011
Download (pdf)
Outsourcing the Decryption of ABE Ciphertexts
By Matthew Green, Susan Hohenberger and Brent Waters
USENIX Security 2011
Download (pdf)
Cloaking Malware with the Trusted Platform Module
By Alan Dunn, Owen Hofmann, Brent Waters and Emmett Witchel
USENIX Security 2011
Download (pdf)
How to Leak on Key Updates
By Allison Lewko, Mark Lewko and Brent Waters
STOC 2011
Download (pdf)
Unbounded HIBE and Attribute-Based Encryption
By Allison Lewko and Brent Waters
Eurocrypt 2011
Download (pdf)
Decentralizing Attribute-Based Encryption
By Allison Lewko and Brent Waters
Eurocrypt 2011
Download (pdf)
Achieving Leakage Resilience Through Dual System Encryption
By Allison Lewko, Yannis Rouselakis, and Brent Waters
TCC 2011
Download (pdf)
Functional Encryption: Definitions and Challenges
By Dan Boneh, Amit Sahai, and Brent Waters
TCC 2011
Download (pdf)
Identity-Based Encryption Secure Against Selective Opening Attack
By Mihir Bellare, Brent Waters, and Scott Yilek
TCC 2011
Download (pdf)
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
By Brent Waters
PKC 2011
Download (pdf)
2010
On the Insecurity of Parallel Repetition for Leakage Resilience
By Allison Lewko and Brent Waters
FOCS 2010
Download (pdf)
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
By Sherman S.M. Chow, Yevgeniy Dodis, Yannis Rouselakis and Brent Waters
CCS 2010
Download (pdf)
Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
By Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai and Brent Waters
CCS 2010
Download (pdf)
Shrinking the Keys of Discrete-Log-Type Lossy
Trapdoor Functions
By Xavier Boyen
and Brent Waters
ACNS 2010
Download (pdf)
Fully Secure Functional Encryption: Attribute-Based Encryption and
(Hierarchical) Inner Product Encryption
By Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima,
and Brent Waters
Eurocrypt 2010
Download (pdf)
Constructing Verifiable Random Functions with Large Input Spaces
By Susan Hohenberger and Brent Waters
Eurocrypt 2010
Download (pdf)
Revocation Systems with Very Small Private Keys
By Allison, Lewko, Amit Sahai and Brent Waters
Proceedings of 2010 IEEE Symposium on Security and Privacy
Download (pdf)
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
By Scott Wolchok, Owen S. Hofmann, Nadia Heninger,
J. Alex Halderman, Christopher J. Rossbach, Edward W. Felten, Brent Waters, and Emmett Witchel
NDSS 2010
Download (pdf)
Fully Secure HIBE with Short Ciphertexts
By Allison Lewko and Brent Waters
TCC 2010
Download (pdf)
2009
Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants
By Allison Lewko and Brent Waters
CCS 2009
Download (pdf)
Dual System Encryption: Realizing Fully Secure IBE and HIBE under
Simple Assumptions
By Brent Waters
Crypto 2009
Download (pdf)
Short and Stateless Signatures from the RSA Assumption
By Susan Hohenberger and Brent Waters
Crypto 2009
Download (pdf)
Realizing Hash-and-Sign Signatures under Standard Assumptions
By Susan Hohenberger and Brent Waters
Eurocrypt 2009
Download (pdf)
Adaptive Security in Broadcast Encryption Systems
By Craig Gentry and Brent Waters
Eurocrypt 2009
Download (pdf)
Predicate Privacy in Encryption Systems
By Emily Shen, Elaine Shi, and Brent Waters
TCC 2009
Download (pdf)
Signing a Linear Subspace: Signature Schemes for Network Coding
By Dan Boneh, David Freeman, Jonathan Katz, and Brent Waters
PKC 2009
Download (pdf)
2008
Compact Proofs of Retrievability
By Hovav Shacham and Brent Waters
Asiacrypt 2008
Download (pdf)
Accountable Authority Identity-Based Encryption
By Vipul Goyal, Steve Lu, Amit Sahai, and Brent Waters
CCS 2008
On The Impossibility of Basing Identity Based Encryption on
Trapdoor Permutations
By Dan Boneh, Periklis Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, and Brent Waters
FOCS 2008
Download (pdf)
Delegating Capabilities in Predicate Encryption Systems
By Elaine Shi and Brent Waters
ICALP (Cryptographer's Track) 2008
Download (pdf)
A Framework for Efficient and Composable Oblivious Transfer
By Chris Peikert and Vinod Vaikuntanathan and Brent Waters
Crypto 2008
Download (pdf)
Lossy Trapdoor Functions and their Applications
By Chris Peikert and Brent Waters
STOC 2008
Download (pdf)
Predicate Encryption Supporting Disjunctions,
Polynomial Equations, and Inner Products
By Jonathan Katz and Amit Sahai and Brent Waters
Eurocrypt 2008
Download (pdf)
Analysis-Resistant Malware
By John Bethencourt, Dawn Song and Brent Waters
The 15th Annual Network & Distributed System Security Conference (NDSS 2008)
Download
(pdf)
2007
Harvesting Verifiable Challenges from Oblivious Online Sources
By Alex Halderman and Brent Waters
Proceedings of 14th ACM Conference on Computer and Communications Security (CCS 2007)
Download (pdf)
Attribute-Based Encryption with Non-Monotonic Access Structures
By Rafail Ostrovsky, Amit Sahai, and Brent Waters
Proceedings of 14th ACM Conference on Computer and Communications Security (CCS 2007)
Download (pdf)
Ciphertext-Policy Attribute-Based Encryption
By John Bethencourt, Amit Sahai, and Brent Waters
Proceedings of 2007 IEEE Symposium on Security and Privacy
Download (pdf)
Full-Domain Subgroup Hiding and Constant-Size Group Signatures
By Xavier Boyen and Brent Waters
Proceedings of 10th Workshop in Practice and Theory of
Public Key Cryptography (PKC 2007)
Awarded Best Paper
Download (pdf)
Efficient Ring Signatures without Random Oracles
By Hovav Shacham and Brent Waters
Proceedings of 10th Workshop in Practice and Theory of
Public Key Cryptography (PKC 2007)
Download (pdf)
Cryptographic Methods for Storing Ballots on a Voting Machine
By John Bethencourt, Dan Boneh and Brent Waters
The 14th Annual Network & Distributed System Security Conference (NDSS 2007)
Download (pdf)
Conjunctive, Subset, and Range Queries on Encrypted Data
By Dan Boneh and Brent Waters
The Fourth Theory of Cryptography Conference (TCC 2007)
Download (pdf)
2006
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
By Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters
Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
Download (pdf)
Forward Secure Signatures with Untrusted Update
By Xavier Boyen, Hovav Shacham, Emily Shen, and Brent Waters
Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
Download (pdf)
Secure Attribute-Based Systems
By Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters
Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
Download (pdf)
A Fully Collusion Resistant Broadcast, Trace and Revoke System
By Dan Boneh and Brent Waters
Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
Download (pdf)
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
By Xavier Boyen and Brent Waters
Proceeding of Crypto 2006
Download (pdf)
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
By Dan Boneh, Amit Sahai, and Brent Waters
Proceeding of Eurocrypt 2006
Download (pdf)
Sequential Aggregate Signatures and Multisignatures Without Random Oracles
By Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
Proceeding of Eurocrypt 2006
Download (pdf)
Compact Group Signatures Without Random Oracles
By Xavier Boyen and Brent Waters
Proceeding of Eurocrypt 2006
Download (pdf)
New Constructions and Practical
Applications for Private Stream Searching (Extended Abstract)
By John Bethencourt, Dawn Song, and Brent Waters
Proceeding of 2006 IEEE Symposium on Security and Privacy
Download (pdf)
Strongly Unforgeable Signatures Based on Computational Difie-Hellman
By Dan Boneh, Emily Shen, and Brent Waters
Proceedings of 9th Workshop in Practice and Theory of
Public Key Cryptography (PKC 2006)
Download (pdf)
Private encrypted content distribution using private broadcast encryptions
By Adam Barth, Dan Boneh, and Brent Waters
10th Financial Cryptography and Data Security Conference (FC 06)
Download (pdf)
2005
Direct Chosen Ciphertext Security from Identity-Based Techniques
By Xavier Boyen, Qixiang Mei, and Brent Waters
Proceedings of 12th ACM Conference on Computer and Communications Security (CCS 2005)
Download (pdf)
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
By Dan Boneh, Craig Gentry, and Brent Waters
Proceedings of Crypto 2005
Download (pdf)
Fuzzy Identity Based Encryption
By Amit Sahai and Brent Waters
Proceedings of Eurocrypt 2005
Download (pdf)
Efficient Identity-Based Encryption Without Random Oracles
By Brent Waters
Proceedings of Eurocrypt 2005
Download (pdf)
A Convenient Method for Securely Managing Passwords
By By J. Alex Halderman, Brent Waters, and Edward W. Felten
Proceedings of The 14th International World Wide Web Conference 2005
Download (pdf)
2004
New Client Puzzle Outsourcing Techniques for DoS Resistance
By Brent Waters, Ari Juels, J. Alex Halderman, and Edward W. Felten
The 11th ACM Conference on Computer and Communications Security (CCS 2004)
Download (pdf)
Privacy Management for Portable Recording Devices
By J. Alex Halderman, Brent Waters, and Edward W. Felten
The 3rd Workshop on Privacy in Electronic Society (WPES 2004)
Download (pdf)
Secure Conjunctive Keyword Search over Encrypted Data
By Philippe Golle, Jessica Staddon, and Brent Waters
Applied Cryptography and Network Security (ACNS 2004)
Download (pdf)
Building an Encrypted and Searchable Audit Log
By Brent R. Waters, Dirk Balfanz, Glenn Durfee, and D.K. Smetters
The 11th Annual Network and Distributed System Security Symposium
(NDSS 2004)
Download (pdf)
Talk (ppt)
2003
Receiver Anonymity via Incomparable Public Keys
By Brent R. Waters, Edward W. Felten and Amit Sahai
10th ACM Conference on Computer and Communications Security (CCS 2003)
Download (pdf)
Talk (ppt)
Secure, Private Proofs of Location
By Brent R. Waters and Edward W. Felten
Princeton Computer Science TR-667-03
Download (pdf)
Link to
Technical Report