Publications

2024

  • A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors
    By Brent Waters
    STOC 2024
    Download (pdf)

  • Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation
    By Brent Waters and David Wu
    STOC 2024
    Download (pdf)

    2023

  • Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory
    By Rachit Garg, George Lu, Brent Waters and David Wu
    CCS 2023
    Download (pdf)

  • Security-Preserving Distributed Samplers: How to Generate Any CRS in One Round Without Random Oracles
    By Damiano Abram, Brent Waters and Mark Zhandry
    CRYPTO 2023
    Download (pdf)

  • Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM
    By Brent Waters and Daniel Wichs
    CRYPTO 2023
    Download (pdf)

  • How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More
    By Cody Freitag, Brent Waters and David Wu
    CRYPTO 2023
    Download (pdf)

  • On Non-uniform Security for Black-box Non-Interactive CCA Commitments
    By Rachit Garg, Dakshita Khurana, George Lu and Brent Waters
    Eurocrypt 2023
    Download (pdf)

  • Registered Attribute-Based Encryption
    By Susan Hohenberger, George Lu, Brent Waters and David Wu
    Eurocrypt 2023
    Download (pdf)

  • Fully Adaptive Decentralized Multi-Authority ABE
    By Pratish Datta, Ilan Komargodski and Brent Waters
    Eurocrypt 2023
    Download (pdf)

  • Decentralized Multi-authority ABE for NC1 from BDH
    By Pratish Datta, Ilan Komargodski and Brent Waters
    Journal of Cryptology 2023
    Download (pdf)

  • Non-Interactive Publicly-Verifiable Delegation of Committed Programs
    By Riddhi Ghosal, Amit Sahai and Brent Waters
    PKC 2023
    Download (pdf)

    2022

  • How to Sample a Discrete Gaussian (and more) from a Random Oracle
    By George Lu and Brent Waters
    TCC 2022
    Download (pdf)

  • Multi-authority ABE from Lattices Without Random Oracles
    By Brent Waters, Hoeteck Wee and David J. Wu
    TCC 2022
    Download (pdf)

  • Fully Succinct Batch Arguments for NP from Indistinguishability Obfuscation
    By Rachit Garg, Kristin Sheridan, Brent Waters and David J. Wu
    TCC 2022
    Download (pdf)

  • Adaptive Multiparty NIKE
    By Venkata Koppula, Brent Waters and Mark Zhandry
    TCC 2022
    Download (pdf)

  • Batch Arguments for NP and More from Standard Bilinear Group Assumptions
    By Brent Waters and David J. Wu
    CRYPTO 2022
    Download (pdf)

  • Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption
    By Rachit Garg, Rishab Goyal, George Lu and Brent Waters
    Eurocrypt 2022
    Download (pdf)

    2021

  • Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
    By Rishab Goyal, Sam Kim, Brent Waters and David J. Wu
    Asiacrypt 2021
    Download (pdf)

  • Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
    By Rishab Goyal, Jiahui Liu and Brent Water
    Asiacrypt 2021
    Download (pdf)

  • Bounded Collusion ABE for TMs from IBE
    By Rishab Goyal, Ridwan Syed and Brent Waters
    Asiacrypt 2021
    Download (pdf)

  • Targeted Lossy Functions and Applications
    By Willy Quach, Brent Waters and Daniel Wichs
    CRYPTO 2021
    Download (pdf)

  • On the CCA Compatibility of Public-Key Infrastructure
    By Dakshita Khurana and Brent Waters
    PKC 2021
    Download (pdf)

  • Decentralized Multi-Authority ABE for DNFs from LWE
    By Pratish Datta, Ilan Komargodski and Brent Waters
    EUROCRYPT 2021
    Download (pdf)

  • Black-Box Non-Interactive Non-Malleable Commitments
    By Rachit Garg, Dakshita Khurana, George Lu and Brent Waters
    EUROCRYPT 2021
    Download (pdf)

    2020

  • On Perfect Correctness in (Lockable) Obfuscation
    By Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters
    TCC 2020
    Download (pdf)

  • New Techniques in Replica Encodings with Client Setup
    By Rachit Garg, George Lu and Brent Waters
    TCC 2020
    Download (pdf)

  • Chosen Ciphertext Security from Injective Trapdoor Functions
    By Susan Hohenberger, Venkata Koppula and Brent Waters
    CRYPTO 2020
    Download (pdf)
    Best Paper Award

  • New Constructions of Hinting PRGs, OWFs with Encryption, and More
    By Rishab Goyal, Satyanarayana Vusirikala and Brent Waters
    CRYPTO 2020
    Download (pdf)

  • PPE Circuits: Formal Definition to Software Automation
    By Susan Hohenberger, Satyanarayana Vusirikala and Brent Waters
    CCS 2020

  • New Methods and Abstractions for RSA-Based Forward Secure Signatures
    By By Susan Hohenberger and Brent Waters
    ACNS 2020
    Download (pdf)

    2019

  • Output Compression, MPC, and iO for Turing Machines
    By Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai and Brent Waters
    ASIACRYPT 2019
    Download (pdf)

  • Watermarking Public-Key Cryptographic Primitives
    By Rishab Goyal, Sam Kim, Nathan Manohar, Brent Waters and David J. Wu
    CRYPTO 2019
    Download (pdf)

  • Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
    By Venkata Koppula and Brent Waters
    CRYPTO 2019
    Download (pdf)

  • ABE for DFA from k-Lin
    By Junqing Gong, Brent Waters and Hoeteck Wee
    CRYPTO 2019
    Download (pdf)

  • Broadcast and Trace with N^e Ciphertext Size from Standard Assumptions
    By Rishab Goyal, Willy Quach, Brent Waters and Daniel Wichs
    CRYPTO 2019
    Download (pdf)

  • Adaptively Secure Constrained Pseudorandom Functions
    By Dennis Hofheinz, Akshay Kamath, Venkata Koppula and Brent Waters
    Financial Cryptography 2019
    Download (pdf)

  • Collusion Resistant Broadcast and Trace from Positional Witness Encryption
    By Rishab Goyal, Satyanarayana Vusirikala and Brent Waters
    PKC 2019
    Download (pdf)

  • New Approaches to Traitor Tracing with Embedded Identities
    By Rishab Goyal, Venkata Koppula and Brent Waters
    TCC 2019
    Download (pdf)

    2018

  • Risky Traitor Tracing and New Differential Privacy Negative Results
    By Rishab Goyal, Venkata Koppula, Andrew Russell and Brent Waters
    CRYPTO 2018
    Download (pdf)

  • Traitor-Tracing from LWE Made Simple and Attribute-Based
    By Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs
    TCC 2018
    Download (pdf)

  • Upgrading to Functional Encryption
    By Saikrishna Badrinarayanan, Dakshita Khurana, Amit Sahai and Brent Waters
    TCC 2018
    Download (pdf)

  • Impossibility of Simulation Secure Functional Encryption Even with Random Oracles
    By Shashank Agrawal, Venkata Koppula and Brent Waters
    TCC 2018
    Download (pdf)

  • Collusion Resistant Traitor Tracing from Learning with Errors
    By Rishab Goyal, Venkata Koppula and Brent Waters
    STOC 2018
    Download (pdf)

  • Synchronized Aggregate Signatures from the RSA Assumption
    By Susan Hohenberger and Brent Waters
    Eurocrypt 2018
    Download (pdf)

    2017

  • Lockable Obfuscation
    By Rishab Goyal, Venkata Koppula and Brent Waters
    FOCS 2017
    Download (pdf)

  • A Generic Approach to Constructing and Proving Verifiable Random Functions
    By Rishab Goyal, Susan Hohenberger, Venkata Koppula and Brent Waters
    TCC 2017
    Download (pdf)

  • Signature Schemes with Randomized Verification
    By Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran and Brent Waters
    ACNS 2017
    Download (pdf)

  • Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption
    By Rishab Goyal, Venkata Koppula and Brent Waters
    Eurocrypt 2017
    Download (pdf)

  • Separating IND-CPA and Circular Security for Unbounded Length Key Cycles
    By Rishab Goyal, Venkata Koppula and Brent Waters
    PKC 2017
    Download (pdf)

  • Universal Samplers with Fast Verification
    By Venkata Koppula, Andrew Poelstra and Brent Waters
    PKC 2017
    Download (pdf)

    2016

  • How to Generate and use Universal Samplers
    By Dennis Hofheinz, Tibor Jager, Dakshita Khurana, Amit Sahai, Brent Waters and Mark Zhandry
    Asiacrypt 2016
    Download (pdf)

  • Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy
    By Rishab Goyal, Venkata Koppula and Brent Waters
    TCC 2016-B
    Download (pdf)

  • Circular Security Separations for Arbitrary Length Cycles from LWE
    By Venkata Koppula and Brent Waters
    CRYPTO 2016
    Download (pdf)

  • Deterministic Public-Key Encryption Under Continual Leakage
    By Venkata Koppula, Omkant Pandey, Yannis Rouselakis and Brent Waters
    ACNS 2016
    Download (pdf)

  • Constrained Pseudorandom Functions for Unconstrained Inputs
    By Apoorvaa Deshpande, Venkata Koppula and Brent Waters
    Eurocrypt 2016
    Download (pdf)

  • New Negative Results on Differing-Inputs Obfuscation
    By Mihir Bellare and Igors Stepanovs and Brent Waters
    Eurocrypt 2016
    Download (pdf)

  • Time-Lock Puzzles from Randomized Encodings
    By Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan and Brent Waters
    ITCS 2016
    Download (pdf)

    2015

  • Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
    By Susan Hohenberger and Venkata Koppula and Brent Waters
    Asiacrypt 2015
    Download (pdf)

  • New Circular Security Counterexamples from Decision Linear and Learning with Errors
    By Allison Bishop and Susan Hohenberger and Brent Waters
    Asiacrypt 2015
    Download (pdf)

  • New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
    By Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs
    Asiacrypt 2015
    Download (pdf)

  • Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption
    By Craig Gentry, Allison Lewko, Amit Sahai and Brent Waters
    FOCS 2015
    Download (pdf)

  • A Punctured Programming Approach to Adaptively Secure Functional Encryption
    By Brent Waters
    CRYPTO 2015
    Download (pdf)

  • Indistinguishability Obfuscation for Turing Machines with Unbounded Memory
    By Venkata Koppula, Allison Lewko and Brent Waters
    STOC 2015
    Download (pdf)

  • Universal Signature Aggregators
    By Susan Hohenberger, Venkata Koppula and Brent Waters
    Eurocrypt 2015
    Download (pdf)

  • Separations in Circular Security for Arbitrary Length Key Cycles.
    By Venkata Koppula, Kim Ramchen and Brent Waters
    TCC 2015
    Download (pdf)

  • Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
    By Yannis Rouselakis and Brent Waters
    Financial Cryptography 2015
    Download (pdf)

    2014

  • Fully Secure and Fast Signing from Obfuscation
    By Kim Ramchen and Brent Waters
    CCS 2014
    Download (pdf)

  • Low Overhead Broadcast Encryption from Multilinear Maps
    By Dan Boneh, Brent Waters and Mark Zhandry
    Crypto 2014
    Download (pdf)

  • Witness Encryption from Instance Independent Assumptions
    By Craig Gentry, Allison Bishop Lewko and Brent Waters
    Crypto 2014
    Download (pdf)

  • Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions
    By Theresa Calderon and Sarah Meiklejohn and Hovav Shacham and Brent Waters
    CT-RSA 2014
    Download (pdf)

  • Why Proving HIBE Systems Secure is Difficult
    By Allison Bishop Lewko and Brent Waters
    Eurocrypt 2014
    Download (pdf)

  • Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
    By Susan Hohenberger, Amit Sahai and Brent Waters
    Eurocrypt 2014
    Download (pdf)

  • Online/Offline Attribute-based Encryption
    By Susan Hohenberger and Brent Waters
    PKC 2014
    Download (pdf)

  • Relaxed Two-to-One Recoding Schemes
    By Omkant Pandey and Kim Ramchen and Brent Waters
    SCN 2014
    Download (pdf)

  • How to Use Indistinguishability Obfuscation: Deniable Encryption, and More
    By Amit Sahai and Brent Waters
    STOC 2014
    Download (pdf)

    2013

  • Constrained Pseudorandom Functions and Their Applications
    By Dan Boneh and Brent Waters
    Asiacrypt 2013
    Download (pdf)

  • New Constructions and Proof Methods for Large Universe Attribute-Based Encryption
    By Yannis Rouselakis and Brent Waters
    CCS 2013
    Download (pdf)

  • Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
    Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai and Brent Waters
    FOCS 2013
    Download (pdf)

  • Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Identity-Based
    By Craig Gentry, Amit Sahai Brent Waters
    CRYPTO 2013
    Download (pdf)

  • Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
    By Susan Hohenberger, Amit Sahai and Brent Waters
    CRYPTO 2013
    Download (pdf)

  • Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys
    Benny Applebaum, Yuval Ishai, Eyal Kushilevitz and Brent Waters
    CRYPTO 2013
    Download (pdf)

  • Attribute-Based Encryption for Circuits from Multilinear Maps
    By Sanjam Garg, Craig Gentry, Shai Halevi, Amit Sahai and Brent Waters
    CRYPTO 2013
    Download (pdf)

  • Witness Encryption and its Applications
    By Sanjam Garg, Craig Gentry, Amit Sahai and Brent Waters
    STOC 2013
    Download (pdf)

  • Anon-Pass: Practical Anonymous Subscriptions
    By Michael Z. Lee, Alan M. Dunn, Jonathan Katz, Brent Waters, and Emmett Witchel
    Proceedings of 2013 IEEE Symposium on Security and Privacy
    Download (pdf)

  • The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions
    By Karyn Benson, Hovav Shacham and Brent Waters
    CT-RSA 2013
    Download (pdf)

  • Attribute-Based Encryption with Fast Decryption
    By Susan Hohenberger and Brent Waters
    PKC 2013
    Download (pdf)

  • Reconstructing a Fragmented Face from a Cryptographic Identification Protocol
    By Andy Luong, Michael Gerbush, Brent Waters and Kristen Grauman
    WACV 2013
    Download (pdf)

    2012

  • Dual Form Signatures: An Approach for Proving Security from Static Assumptions
    By Michael Gerbush, Allison Lewko, Adam O'Neill and Brent Waters
    Asiacrypt 2012
    Download (pdf)

  • Functional Encryption for Regular Languages
    By Brent Waters
    CRYPTO 2012
    Download (pdf)

  • Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
    By Amit Sahai, Hakan Seyalioglu and Brent Waters
    CRYPTO 2012

  • New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
    By Allison Lewko and Brent Waters
    CRYPTO 2012
    Download (pdf)

  • Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security
    By Susan Hohenberger, Allison Lewko and Brent Waters
    Eurocrypt 2012
    Download (pdf)

  • Identity-Based (Lossy) Trapdoor Functions and Applications
    By Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters
    Eurocrypt 2012
    Download (pdf)

  • Standard Security Does Not Imply Security Against Selective-Opening
    By Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek
    Eurocrypt 2012
    Download (pdf)

  • Computing on Authenticated Data
    By Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters
    TCC 2012
    Download (pdf)

  • Targeted Malleability: Homomorphic Encryption for Restricted Computations
    By Dan Boneh and Gil Segev and Brent Waters
    Innovations in Theoretical Computer Science (ITCS) 2012
    Download (pdf)

    2011

  • Storing Secrets on Continually Leaky Devices
    By Yevgeniy Dodis, Allison Lewko, Brent Waters and Daniel Wichs
    FOCS 2011
    Download (pdf)

  • Outsourcing the Decryption of ABE Ciphertexts
    By Matthew Green, Susan Hohenberger and Brent Waters
    USENIX Security 2011
    Download (pdf)

  • Cloaking Malware with the Trusted Platform Module
    By Alan Dunn, Owen Hofmann, Brent Waters and Emmett Witchel
    USENIX Security 2011
    Download (pdf)

  • How to Leak on Key Updates
    By Allison Lewko, Mark Lewko and Brent Waters
    STOC 2011
    Download (pdf)

  • Unbounded HIBE and Attribute-Based Encryption
    By Allison Lewko and Brent Waters
    Eurocrypt 2011
    Download (pdf)

  • Decentralizing Attribute-Based Encryption
    By Allison Lewko and Brent Waters
    Eurocrypt 2011
    Download (pdf)

  • Achieving Leakage Resilience Through Dual System Encryption
    By Allison Lewko, Yannis Rouselakis, and Brent Waters
    TCC 2011
    Download (pdf)

  • Functional Encryption: Definitions and Challenges
    By Dan Boneh, Amit Sahai, and Brent Waters
    TCC 2011
    Download (pdf)

  • Identity-Based Encryption Secure Against Selective Opening Attack
    By Mihir Bellare, Brent Waters, and Scott Yilek
    TCC 2011
    Download (pdf)

  • Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
    By Brent Waters
    PKC 2011
    Download (pdf)

    2010

  • On the Insecurity of Parallel Repetition for Leakage Resilience
    By Allison Lewko and Brent Waters
    FOCS 2010
    Download (pdf)

  • Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
    By Sherman S.M. Chow, Yevgeniy Dodis, Yannis Rouselakis and Brent Waters
    CCS 2010
    Download (pdf)

  • Building Efficient Fully Collusion-Resilient Traitor Tracing and Revocation Schemes
    By Sanjam Garg, Abishek Kumarasubramanian, Amit Sahai and Brent Waters
    CCS 2010
    Download (pdf)

  • Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions
    By Xavier Boyen and Brent Waters
    ACNS 2010
    Download (pdf)

  • Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
    By Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, and Brent Waters
    Eurocrypt 2010
    Download (pdf)

  • Constructing Verifiable Random Functions with Large Input Spaces
    By Susan Hohenberger and Brent Waters
    Eurocrypt 2010
    Download (pdf)

  • Revocation Systems with Very Small Private Keys
    By Allison, Lewko, Amit Sahai and Brent Waters
    Proceedings of 2010 IEEE Symposium on Security and Privacy
    Download (pdf)

  • Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs
    By Scott Wolchok, Owen S. Hofmann, Nadia Heninger, J. Alex Halderman, Christopher J. Rossbach, Edward W. Felten, Brent Waters, and Emmett Witchel
    NDSS 2010
    Download (pdf)

  • Fully Secure HIBE with Short Ciphertexts
    By Allison Lewko and Brent Waters
    TCC 2010
    Download (pdf)

    2009

  • Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants
    By Allison Lewko and Brent Waters
    CCS 2009
    Download (pdf)

  • Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
    By Brent Waters
    Crypto 2009
    Download (pdf)

  • Short and Stateless Signatures from the RSA Assumption
    By Susan Hohenberger and Brent Waters
    Crypto 2009
    Download (pdf)

  • Realizing Hash-and-Sign Signatures under Standard Assumptions
    By Susan Hohenberger and Brent Waters
    Eurocrypt 2009
    Download (pdf)

  • Adaptive Security in Broadcast Encryption Systems
    By Craig Gentry and Brent Waters
    Eurocrypt 2009
    Download (pdf)

  • Predicate Privacy in Encryption Systems
    By Emily Shen, Elaine Shi, and Brent Waters
    TCC 2009
    Download (pdf)

  • Signing a Linear Subspace: Signature Schemes for Network Coding
    By Dan Boneh, David Freeman, Jonathan Katz, and Brent Waters
    PKC 2009
    Download (pdf)

    2008

  • Compact Proofs of Retrievability
    By Hovav Shacham and Brent Waters
    Asiacrypt 2008
    Download (pdf)

  • Accountable Authority Identity-Based Encryption
    By Vipul Goyal, Steve Lu, Amit Sahai, and Brent Waters
    CCS 2008

  • On The Impossibility of Basing Identity Based Encryption on Trapdoor Permutations
    By Dan Boneh, Periklis Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, and Brent Waters
    FOCS 2008
    Download (pdf)

  • Delegating Capabilities in Predicate Encryption Systems
    By Elaine Shi and Brent Waters
    ICALP (Cryptographer's Track) 2008
    Download (pdf)

  • A Framework for Efficient and Composable Oblivious Transfer
    By Chris Peikert and Vinod Vaikuntanathan and Brent Waters
    Crypto 2008
    Download (pdf)

  • Lossy Trapdoor Functions and their Applications
    By Chris Peikert and Brent Waters
    STOC 2008
    Download (pdf)

  • Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
    By Jonathan Katz and Amit Sahai and Brent Waters
    Eurocrypt 2008
    Download (pdf)

  • Analysis-Resistant Malware
    By John Bethencourt, Dawn Song and Brent Waters
    The 15th Annual Network & Distributed System Security Conference (NDSS 2008)
    Download (pdf)

    2007

  • Harvesting Verifiable Challenges from Oblivious Online Sources
    By Alex Halderman and Brent Waters
    Proceedings of 14th ACM Conference on Computer and Communications Security (CCS 2007)
    Download (pdf)

  • Attribute-Based Encryption with Non-Monotonic Access Structures
    By Rafail Ostrovsky, Amit Sahai, and Brent Waters
    Proceedings of 14th ACM Conference on Computer and Communications Security (CCS 2007)
    Download (pdf)

  • Ciphertext-Policy Attribute-Based Encryption
    By John Bethencourt, Amit Sahai, and Brent Waters
    Proceedings of 2007 IEEE Symposium on Security and Privacy
    Download (pdf)

  • Full-Domain Subgroup Hiding and Constant-Size Group Signatures
    By Xavier Boyen and Brent Waters
    Proceedings of 10th Workshop in Practice and Theory of Public Key Cryptography (PKC 2007)
    Awarded Best Paper
    Download (pdf)

  • Efficient Ring Signatures without Random Oracles
    By Hovav Shacham and Brent Waters
    Proceedings of 10th Workshop in Practice and Theory of Public Key Cryptography (PKC 2007)
    Download (pdf)

  • Cryptographic Methods for Storing Ballots on a Voting Machine
    By John Bethencourt, Dan Boneh and Brent Waters
    The 14th Annual Network & Distributed System Security Conference (NDSS 2007)
    Download (pdf)

  • Conjunctive, Subset, and Range Queries on Encrypted Data
    By Dan Boneh and Brent Waters
    The Fourth Theory of Cryptography Conference (TCC 2007)
    Download (pdf)

    2006

  • Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
    By Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters
    Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
    Download (pdf)

  • Forward Secure Signatures with Untrusted Update
    By Xavier Boyen, Hovav Shacham, Emily Shen, and Brent Waters
    Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
    Download (pdf)

  • Secure Attribute-Based Systems
    By Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters
    Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
    Download (pdf)

  • A Fully Collusion Resistant Broadcast, Trace and Revoke System
    By Dan Boneh and Brent Waters
    Proceedings of 13th ACM Conference on Computer and Communications Security (CCS 2006)
    Download (pdf)

  • Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
    By Xavier Boyen and Brent Waters
    Proceeding of Crypto 2006
    Download (pdf)

  • Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
    By Dan Boneh, Amit Sahai, and Brent Waters
    Proceeding of Eurocrypt 2006
    Download (pdf)

  • Sequential Aggregate Signatures and Multisignatures Without Random Oracles
    By Steve Lu, Rafail Ostrovsky, Amit Sahai, Hovav Shacham, Brent Waters
    Proceeding of Eurocrypt 2006
    Download (pdf)

  • Compact Group Signatures Without Random Oracles
    By Xavier Boyen and Brent Waters
    Proceeding of Eurocrypt 2006
    Download (pdf)

  • New Constructions and Practical Applications for Private Stream Searching (Extended Abstract)
    By John Bethencourt, Dawn Song, and Brent Waters
    Proceeding of 2006 IEEE Symposium on Security and Privacy
    Download (pdf)

  • Strongly Unforgeable Signatures Based on Computational Difie-Hellman
    By Dan Boneh, Emily Shen, and Brent Waters
    Proceedings of 9th Workshop in Practice and Theory of Public Key Cryptography (PKC 2006)
    Download (pdf)

  • Private encrypted content distribution using private broadcast encryptions
    By Adam Barth, Dan Boneh, and Brent Waters
    10th Financial Cryptography and Data Security Conference (FC 06)
    Download (pdf)

    2005

  • Direct Chosen Ciphertext Security from Identity-Based Techniques
    By Xavier Boyen, Qixiang Mei, and Brent Waters
    Proceedings of 12th ACM Conference on Computer and Communications Security (CCS 2005)
    Download (pdf)

  • Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
    By Dan Boneh, Craig Gentry, and Brent Waters
    Proceedings of Crypto 2005
    Download (pdf)

  • Fuzzy Identity Based Encryption
    By Amit Sahai and Brent Waters
    Proceedings of Eurocrypt 2005
    Download (pdf)

  • Efficient Identity-Based Encryption Without Random Oracles
    By Brent Waters
    Proceedings of Eurocrypt 2005
    Download (pdf)

  • A Convenient Method for Securely Managing Passwords
    By By J. Alex Halderman, Brent Waters, and Edward W. Felten
    Proceedings of The 14th International World Wide Web Conference 2005
    Download (pdf)

    2004

  • New Client Puzzle Outsourcing Techniques for DoS Resistance
    By Brent Waters, Ari Juels, J. Alex Halderman, and Edward W. Felten
    The 11th ACM Conference on Computer and Communications Security (CCS 2004)
    Download (pdf)

  • Privacy Management for Portable Recording Devices
    By J. Alex Halderman, Brent Waters, and Edward W. Felten
    The 3rd Workshop on Privacy in Electronic Society (WPES 2004)
    Download (pdf)

  • Secure Conjunctive Keyword Search over Encrypted Data
    By Philippe Golle, Jessica Staddon, and Brent Waters
    Applied Cryptography and Network Security (ACNS 2004)
    Download (pdf)

  • Building an Encrypted and Searchable Audit Log
    By Brent R. Waters, Dirk Balfanz, Glenn Durfee, and D.K. Smetters
    The 11th Annual Network and Distributed System Security Symposium (NDSS 2004)
    Download (pdf)
    Talk (ppt)

    2003

  • Receiver Anonymity via Incomparable Public Keys
    By Brent R. Waters, Edward W. Felten and Amit Sahai
    10th ACM Conference on Computer and Communications Security (CCS 2003)
    Download (pdf)
    Talk (ppt)

  • Secure, Private Proofs of Location
    By Brent R. Waters and Edward W. Felten
    Princeton Computer Science TR-667-03
    Download (pdf)
    Link to Technical Report