750 results on '"Waters, Brent"'
Search Results
2. Adaptive Security in SNARGs via iO and Lossy Functions
3. Reducing the CRS Size in Registered ABE Systems
4. Non-Interactive Anonymous Router with Quasi-Linear Router Computation
5. Security-Preserving Distributed Samplers: How to Generate Any CRS in One Round Without Random Oracles
6. How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More
7. Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM
8. Non-Interactive Publicly-Verifiable Delegation of Committed Programs
9. On Non-uniform Security for Black-Box Non-interactive CCA Commitments
10. Fully Adaptive Decentralized Multi-Authority ABE
11. Registered Attribute-Based Encryption
12. Remaining Focused
13. Registered Attribute-Based Encryption
14. On Non-uniform Security for Black-Box Non-interactive CCA Commitments
15. Fully Adaptive Decentralized Multi-Authority ABE
16. How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More
17. Security-Preserving Distributed Samplers: How to Generate Any CRS in One Round Without Random Oracles
18. Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM
19. Non-Interactive Anonymous Router with Quasi-Linear Router Computation
20. How to Sample a Discrete Gaussian (and more) from a Random Oracle
21. Adaptive Multiparty NIKE
22. Multi-authority ABE from Lattices Without Random Oracles
23. Fully Succinct Batch Arguments for from Indistinguishability Obfuscation
24. Batch Arguments for and More from Standard Bilinear Group Assumptions
25. Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption
26. Decentralized Multi-authority ABE for NC1 from BDH
27. Resurrection of the Body
28. Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions
29. Bounded Collusion ABE for TMs from IBE
30. Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
31. Targeted Lossy Functions and Applications
32. Black-Box Non-interactive Non-malleable Commitments
33. Decentralized Multi-authority ABE for DNFs from LWE
34. On the CCA Compatibility of Public-Key Infrastructure
35. A New Approach for Non-Interactive Zero-Knowledge from Learning with Errors
36. Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation
37. New Techniques in Replica Encodings with Client Setup
38. On Perfect Correctness in (Lockable) Obfuscation
39. New Methods and Abstractions for RSA-Based Forward Secure Signatures
40. Chosen Ciphertext Security from Injective Trapdoor Functions
41. New Constructions of Hinting PRGs, OWFs with Encryption, and More
42. Common Callings and Ordinary Virtues: Christian Ethics for Everyday Life
43. How to Sample a Discrete Gaussian (and more) from a Random Oracle
44. Batch Arguments for $$\textsf{NP}$$ and More from Standard Bilinear Group Assumptions
45. Fully Succinct Batch Arguments for $$\textsf{NP}$$ from Indistinguishability Obfuscation
46. Adaptive Multiparty NIKE
47. Multi-authority ABE from Lattices Without Random Oracles
48. Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption
49. New Approaches to Traitor Tracing with Embedded Identities
50. Output Compression, MPC, and iO for Turing Machines
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.