default search action
BibTeX records: Shweta Agrawal
@inproceedings{DBLP:conf/crypto/AgrawalSSVV24, author = {Shweta Agrawal and Sagnik Saha and Nikolaj I. Schwartzbach and Akhil Vanukuri and Prashant Nalini Vasudevan}, editor = {Leonid Reyzin and Douglas Stebila}, title = {k-SUM in the Sparse Regime: Complexity and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14921}, pages = {315--351}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-68379-4\_10}, doi = {10.1007/978-3-031-68379-4\_10}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalSSVV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalKY24, author = {Shweta Agrawal and Simran Kumari and Shota Yamada}, editor = {Leonid Reyzin and Douglas Stebila}, title = {Attribute Based Encryption for Turing Machines from Lattices}, booktitle = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14922}, pages = {352--386}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-68382-4\_11}, doi = {10.1007/978-3-031-68382-4\_11}, timestamp = {Tue, 20 Aug 2024 16:20:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalKY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalKN24, author = {Shweta Agrawal and Simran Kumari and Ryo Nishimaki}, title = {Pre-Constrained Cryptography: Broad Definitions, New Constructions, Unbounded Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1294}, year = {2024}, url = {https://eprint.iacr.org/2024/1294}, timestamp = {Sun, 01 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalKN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalTY23, author = {Shweta Agrawal and Junichi Tomida and Anshu Yadav}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Attribute-Based Multi-input {FE} (and More) for Attribute-Weighted Sums}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {464--497}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_15}, doi = {10.1007/978-3-031-38551-3\_15}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalRYY23, author = {Shweta Agrawal and M{\'{e}}lissa Rossi and Anshu Yadav and Shota Yamada}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor {LWE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {532--564}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_17}, doi = {10.1007/978-3-031-38551-3\_17}, timestamp = {Mon, 14 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalRYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalKNYY23, author = {Shweta Agrawal and Fuyuki Kitagawa and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Carmit Hazay and Martijn Stam}, title = {Public Key Encryption with Secure Key Leasing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {581--610}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_20}, doi = {10.1007/978-3-031-30545-0\_20}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalKNYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalKYY23, author = {Shweta Agrawal and Simran Kumari and Anshu Yadav and Shota Yamada}, editor = {Carmit Hazay and Martijn Stam}, title = {Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14006}, pages = {605--636}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30620-4\_20}, doi = {10.1007/978-3-031-30620-4\_20}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalKYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/ChenMAK23, author = {Shuangyi Chen and Anuja Modi and Shweta Agrawal and Ashish Khisti}, title = {Quadratic Functional Encryption for Secure Training in Vertical Federated Learning}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2023, Taipei, Taiwan, June 25-30, 2023}, pages = {60--65}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISIT54713.2023.10206955}, doi = {10.1109/ISIT54713.2023.10206955}, timestamp = {Mon, 28 Aug 2023 17:20:14 +0200}, biburl = {https://dblp.org/rec/conf/isit/ChenMAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalAPRS23, author = {Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran and Rajeev Raghunath and Jayesh Singla}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {{CASE:} {A} New Frontier in Public-Key Authenticated Encryption}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14370}, pages = {189--219}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48618-0\_7}, doi = {10.1007/978-3-031-48618-0\_7}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalAPRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-11663, author = {Shweta Agrawal and Fuyuki Kitagawa and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Public Key Encryption with Secure Key Leasing}, journal = {CoRR}, volume = {abs/2302.11663}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.11663}, doi = {10.48550/ARXIV.2302.11663}, eprinttype = {arXiv}, eprint = {2302.11663}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-11663.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-01787, author = {Shweta Agrawal and Sagnik Saha and Nikolaj I. Schwartzbach and Akhil Vanukuri and Prashant Nalini Vasudevan}, title = {k-SUM in the Sparse Regime}, journal = {CoRR}, volume = {abs/2304.01787}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.01787}, doi = {10.48550/ARXIV.2304.01787}, eprinttype = {arXiv}, eprint = {2304.01787}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-01787.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-08358, author = {Shuangyi Chen and Anuja Modi and Shweta Agrawal and Ashish Khisti}, title = {Quadratic Functional Encryption for Secure Training in Vertical Federated Learning}, journal = {CoRR}, volume = {abs/2305.08358}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.08358}, doi = {10.48550/ARXIV.2305.08358}, eprinttype = {arXiv}, eprint = {2305.08358}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-08358.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/SahaSV23, author = {Shweta Agrawal and Sagnik Saha and Nikolaj I. Schwartzbach and Akhil Vanukuri and Prashant Nalini Vasudevan}, title = {k-SUM in the Sparse Regime}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR23-060}}, year = {2023}, url = {https://eccc.weizmann.ac.il/report/2023/060}, eprinttype = {ECCC}, eprint = {TR23-060}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/SahaSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalKNYY23, author = {Shweta Agrawal and Fuyuki Kitagawa and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Public Key Encryption with Secure Key Leasing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2023}, url = {https://eprint.iacr.org/2023/264}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalKNYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SahaSV23, author = {Shweta Agrawal and Sagnik Saha and Nikolaj I. Schwartzbach and Akhil Vanukuri and Prashant Nalini Vasudevan}, title = {k-SUM in the Sparse Regime}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2023}, url = {https://eprint.iacr.org/2023/488}, timestamp = {Thu, 25 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SahaSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalRYY23, author = {Shweta Agrawal and Melissa Rossi and Anshu Yadav and Shota Yamada}, title = {Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {941}, year = {2023}, url = {https://eprint.iacr.org/2023/941}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalRYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalTY23, author = {Shweta Agrawal and Junichi Tomida and Anshu Yadav}, title = {Attribute-Based Multi-Input {FE} (and more) for Attribute-Weighted Sums}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1191}, year = {2023}, url = {https://eprint.iacr.org/2023/1191}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalAPRS23, author = {Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran and Rajeev Raghunath and Jayesh Singla}, title = {{CASE:} {A} New Frontier in Public-Key Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1786}, year = {2023}, url = {https://eprint.iacr.org/2023/1786}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalAPRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AgrawalBNXXY22, author = {Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada}, title = {Cryptanalysis of Boyen's attribute-based encryption scheme in {TCC} 2013}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2301--2318}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01076-6}, doi = {10.1007/S10623-022-01076-6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AgrawalBNXXY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/HaiZSJYA22, author = {Tao Hai and Jincheng Zhou and S. R. Srividhya and Sanjiv Kumar Jain and Praise Young and Shweta Agrawal}, title = {{BVFLEMR:} an integrated federated learning and blockchain technology for cloud-based medical records recommendation system}, journal = {J. Cloud Comput.}, volume = {11}, pages = {22}, year = {2022}, url = {https://doi.org/10.1186/s13677-022-00294-6}, doi = {10.1186/S13677-022-00294-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcloudc/HaiZSJYA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcloudc/HaiZLJAD22, author = {Tao Hai and Jincheng Zhou and Ning Li and Sanjiv Kumar Jain and Shweta Agrawal and Imed Ben Dhaou}, title = {Cloud-based bug tracking software defects analysis using deep learning}, journal = {J. Cloud Comput.}, volume = {11}, pages = {32}, year = {2022}, url = {https://doi.org/10.1186/s13677-022-00311-8}, doi = {10.1186/S13677-022-00311-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcloudc/HaiZLJAD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jus/GondalAK22, author = {Shailesh Gondal and Shweta Agrawal and Anil Kumar}, title = {Analysis of Citrus Diseases and Classification Based on Deep Learning Models}, journal = {J. Uncertain Syst.}, volume = {15}, number = {3}, pages = {2241010:1--2241010:17}, year = {2022}, url = {https://doi.org/10.1142/S1752890922410100}, doi = {10.1142/S1752890922410100}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jus/GondalAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalKSY22, author = {Shweta Agrawal and Elena Kirshanova and Damien Stehl{\'{e}} and Anshu Yadav}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Practical, Round-Optimal Lattice-Based Blind Signatures}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {39--53}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560650}, doi = {10.1145/3548606.3560650}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalKSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalYY22, author = {Shweta Agrawal and Anshu Yadav and Shota Yamada}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Multi-input Attribute Based Encryption and Predicate Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {590--621}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_21}, doi = {10.1007/978-3-031-15802-5\_21}, timestamp = {Wed, 19 Oct 2022 17:37:44 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AgrawalSY22, author = {Shweta Agrawal and Damien Stehl{\'{e}} and Anshu Yadav}, editor = {Mikolaj Bojanczyk and Emanuela Merelli and David P. Woodruff}, title = {Round-Optimal Lattice-Based Threshold Signatures, Revisited}, booktitle = {49th International Colloquium on Automata, Languages, and Programming, {ICALP} 2022, July 4-8, 2022, Paris, France}, series = {LIPIcs}, volume = {229}, pages = {8:1--8:20}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2022.8}, doi = {10.4230/LIPICS.ICALP.2022.8}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/AgrawalSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalKMNYY22, author = {Shweta Agrawal and Fuyuki Kitagawa and Anuja Modi and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13747}, pages = {618--647}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22318-1\_22}, doi = {10.1007/978-3-031-22318-1\_22}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalKMNYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalGT22, author = {Shweta Agrawal and Rishab Goyal and Junichi Tomida}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13747}, pages = {711--740}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22318-1\_25}, doi = {10.1007/978-3-031-22318-1\_25}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2022-1, editor = {Shweta Agrawal and Dongdai Lin}, title = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13791}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22963-3}, doi = {10.1007/978-3-031-22963-3}, isbn = {978-3-031-22962-6}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2022-2, editor = {Shweta Agrawal and Dongdai Lin}, title = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4}, doi = {10.1007/978-3-031-22966-4}, isbn = {978-3-031-22965-7}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2022-3, editor = {Shweta Agrawal and Dongdai Lin}, title = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5}, doi = {10.1007/978-3-031-22969-5}, isbn = {978-3-031-22968-8}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2022-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2022-4, editor = {Shweta Agrawal and Dongdai Lin}, title = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13794}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22972-5}, doi = {10.1007/978-3-031-22972-5}, isbn = {978-3-031-22971-8}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2022-4.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalKMNYY22, author = {Shweta Agrawal and Fuyuki Kitagawa and Anuja Modi and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2022}, url = {https://eprint.iacr.org/2022/316}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalKMNYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalSY22, author = {Shweta Agrawal and Damien Stehl{\'{e}} and Anshu Yadav}, title = {Round-Optimal Lattice-Based Threshold Signatures, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2022}, url = {https://eprint.iacr.org/2022/634}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalY022, author = {Shweta Agrawal and Anshu Yadav and Shota Yamada}, title = {Multi-Input Attribute Based Encryption and Predicate Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1024}, year = {2022}, url = {https://eprint.iacr.org/2022/1024}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalY022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGT22, author = {Shweta Agrawal and Rishab Goyal and Junichi Tomida}, title = {Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1168}, year = {2022}, url = {https://eprint.iacr.org/2022/1168}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalKYY22, author = {Shweta Agrawal and Simran Kumari and Anshu Yadav and Shota Yamada}, title = {Trace and Revoke with Optimal Parameters from Polynomial Hardness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1347}, year = {2022}, url = {https://eprint.iacr.org/2022/1347}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalKYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalIKNPPR21, author = {Shweta Agrawal and Yuval Ishai and Eyal Kushilevitz and Varun Narayanan and Manoj Prabhakaran and Vinod M. Prabhakaran and Alon Rosen}, editor = {Tal Malkin and Chris Peikert}, title = {Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {124--154}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_5}, doi = {10.1007/978-3-030-84245-1\_5}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalIKNPPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalGT21, author = {Shweta Agrawal and Rishab Goyal and Junichi Tomida}, editor = {Tal Malkin and Chris Peikert}, title = {Multi-input Quadratic Functional Encryption from Pairings}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {208--238}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_8}, doi = {10.1007/978-3-030-84259-8\_8}, timestamp = {Mon, 16 Aug 2021 09:08:12 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalMVY21, author = {Shweta Agrawal and Monosij Maitra and Narasimha Sai Vempati and Shota Yamada}, editor = {Tal Malkin and Chris Peikert}, title = {Functional Encryption for Turing Machines with Dynamic Bounded Collusion from {LWE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {12828}, pages = {239--269}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84259-8\_9}, doi = {10.1007/978-3-030-84259-8\_9}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalMVY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalGM21, author = {Shweta Agrawal and Shafi Goldwasser and Saleet Mossel}, editor = {Tal Malkin and Chris Peikert}, title = {Deniable Fully Homomorphic Encryption from Learning with Errors}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {641--670}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_22}, doi = {10.1007/978-3-030-84245-1\_22}, timestamp = {Mon, 16 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalGT21, author = {Shweta Agrawal and Rishab Goyal and Junichi Tomida}, editor = {Kobbi Nissim and Brent Waters}, title = {Multi-Party Functional Encryption}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13043}, pages = {224--255}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90453-1\_8}, doi = {10.1007/978-3-030-90453-1\_8}, timestamp = {Mon, 08 Nov 2021 11:43:29 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalGT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBNXXY21, author = {Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada}, title = {Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in {TCC} 2013}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2021}, url = {https://eprint.iacr.org/2021/505}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBNXXY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalMVY21, author = {Shweta Agrawal and Monosij Maitra and Narasimha Sai Vempati and Shota Yamada}, title = {Functional Encryption for Turing Machines with Dynamic Bounded Collusion from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {848}, year = {2021}, url = {https://eprint.iacr.org/2021/848}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalMVY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalKSY21, author = {Shweta Agrawal and Elena Kirshanova and Damien Stehl{\'{e}} and Anshu Yadav}, title = {Can Round-Optimal Lattice-Based Blind Signatures be Practical?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1565}, year = {2021}, url = {https://eprint.iacr.org/2021/1565}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalKSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AgrawalIKNPPR20, author = {Shweta Agrawal and Yuval Ishai and Eyal Kushilevitz and Varun Narayanan and Manoj Prabhakaran and Vinod M. Prabhakaran and Alon Rosen}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Cryptography from One-Way Communication: On Completeness of Finite Channels}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {653--685}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_22}, doi = {10.1007/978-3-030-64840-4\_22}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AgrawalIKNPPR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AgrawalGKP20, author = {Shweta Agrawal and Rachit Garg and Nishant Kumar and Manoj Prabhakaran}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {42--63}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_3}, doi = {10.1007/978-3-030-58951-6\_3}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AgrawalGKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Agrawal020, author = {Shweta Agrawal and Shota Yamada}, editor = {Anne Canteaut and Yuval Ishai}, title = {Optimal Broadcast Encryption from Pairings and {LWE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {13--43}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_2}, doi = {10.1007/978-3-030-45721-1\_2}, timestamp = {Mon, 04 May 2020 14:27:11 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Agrawal020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalP20, author = {Shweta Agrawal and Alice Pellet{-}Mary}, editor = {Anne Canteaut and Yuval Ishai}, title = {Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear {FE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12105}, pages = {110--140}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45721-1\_5}, doi = {10.1007/978-3-030-45721-1\_5}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/AgrawalCFGOT20, author = {Shweta Agrawal and Michael Clear and Ophir Frieder and Sanjam Garg and Adam O'Neill and Justin Thaler}, editor = {Thomas Vidick}, title = {Ad Hoc Multi-Input Functional Encryption}, booktitle = {11th Innovations in Theoretical Computer Science Conference, {ITCS} 2020, January 12-14, 2020, Seattle, Washington, {USA}}, series = {LIPIcs}, volume = {151}, pages = {40:1--40:41}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITCS.2020.40}, doi = {10.4230/LIPICS.ITCS.2020.40}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/AgrawalCFGOT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalLMT20, author = {Shweta Agrawal and Beno{\^{\i}}t Libert and Monosij Maitra and Radu Titiu}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Adaptive Simulation Security for Inner Product Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {34--64}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_2}, doi = {10.1007/978-3-030-45374-9\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalLMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Agrawal020, author = {Shweta Agrawal and Shota Yamada}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {{CP-ABE} for Circuits (and More) in the Symmetric Key Setting}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {117--148}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_5}, doi = {10.1007/978-3-030-64375-1\_5}, timestamp = {Tue, 15 Dec 2020 11:52:09 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Agrawal020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalW020, author = {Shweta Agrawal and Daniel Wichs and Shota Yamada}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Optimal Broadcast Encryption from {LWE} and Pairings in the Standard Model}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {149--178}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_6}, doi = {10.1007/978-3-030-64375-1\_6}, timestamp = {Tue, 15 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalLMT20, author = {Shweta Agrawal and Beno{\^{\i}}t Libert and Monosij Maitra and Radu Titiu}, title = {Adaptive Simulation Security for Inner Product Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2020}, url = {https://eprint.iacr.org/2020/209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalLMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalY20, author = {Shweta Agrawal and Shota Yamada}, title = {Optimal Broadcast Encryption from Pairings and {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {228}, year = {2020}, url = {https://eprint.iacr.org/2020/228}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalP20, author = {Shweta Agrawal and Alice Pellet{-}Mary}, title = {Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear {FE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {415}, year = {2020}, url = {https://eprint.iacr.org/2020/415}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalWY20, author = {Shweta Agrawal and Daniel Wichs and Shota Yamada}, title = {Optimal Broadcast Encryption from {LWE} and Pairings in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1179}, year = {2020}, url = {https://eprint.iacr.org/2020/1179}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGM20, author = {Shweta Agrawal and Rishab Goyal and Fabrice Mouhartem}, title = {Multi-Party Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1266}, year = {2020}, url = {https://eprint.iacr.org/2020/1266}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalY20a, author = {Shweta Agrawal and Shota Yamada}, title = {{CP-ABE} for Circuits (and more) in the Symmetric Key Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1432}, year = {2020}, url = {https://eprint.iacr.org/2020/1432}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalY20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGM20a, author = {Shweta Agrawal and Shafi Goldwasser and Saleet Mossel}, title = {Deniable Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1588}, year = {2020}, url = {https://eprint.iacr.org/2020/1588}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGM20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalM019, author = {Shweta Agrawal and Monosij Maitra and Shota Yamada}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Attribute Based Encryption (and more) for Nondeterministic Finite Automata from {LWE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {765--797}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_26}, doi = {10.1007/978-3-030-26951-7\_26}, timestamp = {Fri, 09 Aug 2019 14:22:41 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Agrawal19, author = {Shweta Agrawal}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11476}, pages = {191--225}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17653-2\_7}, doi = {10.1007/978-3-030-17653-2\_7}, timestamp = {Tue, 14 May 2019 13:47:56 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Agrawal19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalM019, author = {Shweta Agrawal and Monosij Maitra and Shota Yamada}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Attribute Based Encryption for Deterministic Finite Automata from {\textbackslash}mathsfDLIN}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11892}, pages = {91--117}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36033-7\_4}, doi = {10.1007/978-3-030-36033-7\_4}, timestamp = {Mon, 25 Nov 2019 13:59:31 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalCFGOT19, author = {Shweta Agrawal and Michael Clear and Ophir Frieder and Sanjam Garg and Adam O'Neill and Justin Thaler}, title = {Ad Hoc Multi-Input Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2019}, url = {https://eprint.iacr.org/2019/356}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalCFGOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalM019, author = {Shweta Agrawal and Monosij Maitra and Shota Yamada}, title = {Attribute Based Encryption (and more) for Nondeterministic Finite Automata from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2019}, url = {https://eprint.iacr.org/2019/629}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalM019a, author = {Shweta Agrawal and Monosij Maitra and Shota Yamada}, title = {Attribute Based Encryption for Deterministic Finite Automata from {DLIN}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {645}, year = {2019}, url = {https://eprint.iacr.org/2019/645}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalM019a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGKP19, author = {Shweta Agrawal and Rachit Garg and Nishant Kumar and Manoj Prabhakaran}, title = {A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1262}, year = {2019}, url = {https://eprint.iacr.org/2019/1262}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGKP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/RajagopalanTA18, author = {Aswin Rajagopalan and Andrew Thangaraj and Shweta Agrawal}, title = {Wiretap Polar Codes in Encryption Schemes Based on Learning with Errors Problem}, booktitle = {2018 {IEEE} International Symposium on Information Theory, {ISIT} 2018, Vail, CO, USA, June 17-22, 2018}, pages = {1146--1150}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ISIT.2018.8437896}, doi = {10.1109/ISIT.2018.8437896}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/RajagopalanTA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalM18, author = {Shweta Agrawal and Monosij Maitra}, editor = {Amos Beimel and Stefan Dziembowski}, title = {{FE} and iO for Turing Machines from Minimal Assumptions}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {473--512}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03810-6\_18}, doi = {10.1007/978-3-030-03810-6\_18}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Agrawal18, author = {Shweta Agrawal}, title = {New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {633}, year = {2018}, url = {https://eprint.iacr.org/2018/633}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Agrawal18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalM18, author = {Shweta Agrawal and Monosij Maitra}, title = {{FE} and iO for Turing Machines from Minimal Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {908}, year = {2018}, url = {https://eprint.iacr.org/2018/908}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalBPS017, author = {Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehl{\'{e}} and Shota Yamada}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2277--2293}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134041}, doi = {10.1145/3133956.3134041}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalBPS017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Agrawal17, author = {Shweta Agrawal}, editor = {Jonathan Katz and Hovav Shacham}, title = {Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10401}, pages = {3--35}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63688-7\_1}, doi = {10.1007/978-3-319-63688-7\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Agrawal17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AgrawalS17, author = {Shweta Agrawal and Ishaan Preet Singh}, editor = {Ioannis Chatzigiannakis and Piotr Indyk and Fabian Kuhn and Anca Muscholl}, title = {Reusable Garbled Deterministic Finite Automata from Learning With Errors}, booktitle = {44th International Colloquium on Automata, Languages, and Programming, {ICALP} 2017, July 10-14, 2017, Warsaw, Poland}, series = {LIPIcs}, volume = {80}, pages = {36:1--36:13}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2017.36}, doi = {10.4230/LIPICS.ICALP.2017.36}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/icalp/AgrawalS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalR17, author = {Shweta Agrawal and Alon Rosen}, editor = {Yael Kalai and Leonid Reyzin}, title = {Functional Encryption for Bounded Collusions, Revisited}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {173--205}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_7}, doi = {10.1007/978-3-319-70500-2\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBPSY17, author = {Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehl{\'{e}} and Shota Yamada}, title = {Efficient Public Trace and Revoke from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2017}, url = {http://eprint.iacr.org/2017/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBPSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalLS16, author = {Shweta Agrawal and Beno{\^{\i}}t Libert and Damien Stehl{\'{e}}}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Fully Secure Functional Encryption for Inner Products, from Standard Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {333--362}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_12}, doi = {10.1007/978-3-662-53015-3\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/AgrawalGS16, author = {Shweta Agrawal and Ran Gelles and Amit Sahai}, title = {Adaptive protocols for interactive communication}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2016, Barcelona, Spain, July 10-15, 2016}, pages = {595--599}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ISIT.2016.7541368}, doi = {10.1109/ISIT.2016.7541368}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/AgrawalGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalR16, author = {Shweta Agrawal and Alon Rosen}, title = {Online-Offline Functional Encryption for Bounded Collusions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2016}, url = {http://eprint.iacr.org/2016/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Agrawal16, author = {Shweta Agrawal}, title = {Interpolating Predicate and Functional Encryption from Learning With Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {654}, year = {2016}, url = {http://eprint.iacr.org/2016/654}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Agrawal16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalAP15, author = {Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {501--531}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_17}, doi = {10.1007/978-3-662-46803-6\_17}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AgrawalIKP15, author = {Shweta Agrawal and Yuval Ishai and Dakshita Khurana and Anat Paskin{-}Cherniavsky}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Kazuo Iwama and Naoki Kobayashi and Bettina Speckmann}, title = {Statistical Randomized Encodings: {A} Complexity Theoretic View}, booktitle = {Automata, Languages, and Programming - 42nd International Colloquium, {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9134}, pages = {1--13}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47672-7\_1}, doi = {10.1007/978-3-662-47672-7\_1}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/AgrawalIKP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalABKPS15, author = {Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai}, editor = {Jonathan Katz}, title = {On the Practical Security of Inner Product Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {777--798}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_35}, doi = {10.1007/978-3-662-46447-2\_35}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalABKPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalAP14, author = {Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran}, title = {Towards a Unified Theory of Cryptographic Agents}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2014}, url = {http://eprint.iacr.org/2014/480}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalAP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AgrawalGHS13, author = {Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai}, editor = {Kazue Sako and Palash Sarkar}, title = {Discrete Gaussian Leftover Hash Lemma over Infinite Domains}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {97--116}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_6}, doi = {10.1007/978-3-642-42033-7\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AgrawalGHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AgrawalDVW13, author = {Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs}, editor = {Kazue Sako and Palash Sarkar}, title = {On Continual Leakage of Discrete Log Representations}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {401--420}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_21}, doi = {10.1007/978-3-642-42045-0\_21}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AgrawalDVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalGVW13, author = {Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee}, editor = {Ran Canetti and Juan A. Garay}, title = {Functional Encryption: New Perspectives and Lower Bounds}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {500--518}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_28}, doi = {10.1007/978-3-642-40084-1\_28}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalGVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AgrawalGS13, author = {Shweta Agrawal and Ran Gelles and Amit Sahai}, title = {Adaptive Protocols for Interactive Communication}, journal = {CoRR}, volume = {abs/1312.4182}, year = {2013}, url = {http://arxiv.org/abs/1312.4182}, eprinttype = {arXiv}, eprint = {1312.4182}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AgrawalGS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalABKPS13, author = {Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai}, title = {Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {744}, year = {2013}, url = {http://eprint.iacr.org/2013/744}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalABKPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalGJPS12, author = {Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {443--460}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_26}, doi = {10.1007/978-3-642-32009-5\_26}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalGJPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalBVVW12, author = {Shweta Agrawal and Xavier Boyen and Vinod Vaikuntanathan and Panagiotis Voulgaris and Hoeteck Wee}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Functional Encryption for Threshold Functions (or Fuzzy {IBE)} from Lattices}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {280--297}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_17}, doi = {10.1007/978-3-642-30057-8\_17}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalBVVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalDVW12, author = {Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs}, title = {On Continual Leakage of Discrete Log Representations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {367}, year = {2012}, url = {http://eprint.iacr.org/2012/367}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalDVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGVW12, author = {Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Functional Encryption: New Perspectives and Lower Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2012}, url = {http://eprint.iacr.org/2012/468}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalG0PS12, author = {Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai}, title = {New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {555}, year = {2012}, url = {http://eprint.iacr.org/2012/555}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalG0PS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGHS12, author = {Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai}, title = {Sampling Discrete Gaussians Efficiently and Obliviously}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {714}, year = {2012}, url = {http://eprint.iacr.org/2012/714}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGHS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AgrawalFV11, author = {Shweta Agrawal and David Mandell Freeman and Vinod Vaikuntanathan}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Functional Encryption for Inner Product Predicates from Learning with Errors}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {21--40}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_2}, doi = {10.1007/978-3-642-25385-0\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AgrawalFV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/AgrawalV11, author = {Shweta Agrawal and Sriram Vishwanath}, title = {Secrecy using compressive sensing}, booktitle = {2011 {IEEE} Information Theory Workshop, {ITW} 2011, Paraty, Brazil, October 16-20, 2011}, pages = {563--567}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ITW.2011.6089519}, doi = {10.1109/ITW.2011.6089519}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/AgrawalV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalFV11, author = {Shweta Agrawal and David Mandell Freeman and Vinod Vaikuntanathan}, title = {Functional Encryption for Inner Product Predicates from Learning with Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {410}, year = {2011}, url = {http://eprint.iacr.org/2011/410}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalFV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBVVW11, author = {Shweta Agrawal and Xavier Boyen and Vinod Vaikuntanathan and Panagiotis Voulgaris and Hoeteck Wee}, title = {Fuzzy Identity Based Encryption from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2011}, url = {http://eprint.iacr.org/2011/414}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBVVW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisim/KamalA10, author = {Raj Kamal and Shweta Agrawal}, title = {A design framework of Orchestrator for computing systems}, booktitle = {2010 International Conference on Computer Information Systems and Industrial Management Applications, CISIM, Krakow, Poland, October 8-10, 2010}, pages = {410--413}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CISIM.2010.5643506}, doi = {10.1109/CISIM.2010.5643506}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisim/KamalA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalBB10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen}, editor = {Tal Rabin}, title = {Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical {IBE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {98--115}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_6}, doi = {10.1007/978-3-642-14623-7\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalBB10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen}, editor = {Henri Gilbert}, title = {Efficient Lattice {(H)IBE} in the Standard Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {553--572}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_28}, doi = {10.1007/978-3-642-13190-5\_28}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/DasAV10, author = {Abhik Kumar Das and Shweta Agrawal and Sriram Vishwanath}, title = {On algebraic traceback in dynamic networks}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2010, June 13-18, 2010, Austin, Texas, USA, Proceedings}, pages = {1903--1907}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIT.2010.5513409}, doi = {10.1109/ISIT.2010.5513409}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/DasAV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalBBF10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Preventing Pollution Attacks in Multi-source Network Coding}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {161--176}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_10}, doi = {10.1007/978-3-642-13013-7\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalBBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBBF10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman}, title = {Preventing Pollution Attacks in Multi-Source Network Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2010}, url = {http://eprint.iacr.org/2010/183}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AgrawalB09, author = {Shweta Agrawal and Dan Boneh}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Homomorphic MACs: MAC-Based Integrity for Network Coding}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {292--305}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_18}, doi = {10.1007/978-3-642-01957-9\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AgrawalB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/AgrawalV09, author = {Shweta Agrawal and Sriram Vishwanath}, title = {On the secrecy rate of interference networks using structured codes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2009, June 28 - July 3, 2009, Seoul, Korea, Proceedings}, pages = {2091--2095}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ISIT.2009.5205275}, doi = {10.1109/ISIT.2009.5205275}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/AgrawalV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0905-2159, author = {Shweta Agrawal and Sriram Vishwanath}, title = {On the Secrecy Rate of Interference Networks using structured codes}, journal = {CoRR}, volume = {abs/0905.2159}, year = {2009}, url = {http://arxiv.org/abs/0905.2159}, eprinttype = {arXiv}, eprint = {0905.2159}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0905-2159.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0908-0078, author = {Abhik Kumar Das and Shweta Agrawal and Sriram Vishwanath}, title = {Algebraic Traceback for Dynamic Networks}, journal = {CoRR}, volume = {abs/0908.0078}, year = {2009}, url = {http://arxiv.org/abs/0908.0078}, eprinttype = {arXiv}, eprint = {0908.0078}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0908-0078.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rtss/AgrawalRS04, author = {Shweta Agrawal and Krithi Ramamritham and Shetal Shah}, title = {Construction of a Coherency Preserving Dynamic Data Dissemination Network}, booktitle = {Proceedings of the 25th {IEEE} Real-Time Systems Symposium {(RTSS} 2004), 5-8 December 2004, Lisbon, Portugal}, pages = {286--295}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/REAL.2004.16}, doi = {10.1109/REAL.2004.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rtss/AgrawalRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.