BibTeX records: Shweta Agrawal

download as .bib file

@inproceedings{DBLP:conf/crypto/AgrawalSSVV24,
  author       = {Shweta Agrawal and
                  Sagnik Saha and
                  Nikolaj I. Schwartzbach and
                  Akhil Vanukuri and
                  Prashant Nalini Vasudevan},
  editor       = {Leonid Reyzin and
                  Douglas Stebila},
  title        = {k-SUM in the Sparse Regime: Complexity and Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14921},
  pages        = {315--351},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-68379-4\_10},
  doi          = {10.1007/978-3-031-68379-4\_10},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalSSVV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalKY24,
  author       = {Shweta Agrawal and
                  Simran Kumari and
                  Shota Yamada},
  editor       = {Leonid Reyzin and
                  Douglas Stebila},
  title        = {Attribute Based Encryption for Turing Machines from Lattices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2024 - 44th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2024,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14922},
  pages        = {352--386},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-68382-4\_11},
  doi          = {10.1007/978-3-031-68382-4\_11},
  timestamp    = {Tue, 20 Aug 2024 16:20:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalKN24,
  author       = {Shweta Agrawal and
                  Simran Kumari and
                  Ryo Nishimaki},
  title        = {Pre-Constrained Cryptography: Broad Definitions, New Constructions,
                  Unbounded Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1294},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1294},
  timestamp    = {Sun, 01 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalKN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalTY23,
  author       = {Shweta Agrawal and
                  Junichi Tomida and
                  Anshu Yadav},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Attribute-Based Multi-input {FE} (and More) for Attribute-Weighted
                  Sums},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {464--497},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_15},
  doi          = {10.1007/978-3-031-38551-3\_15},
  timestamp    = {Mon, 14 Aug 2023 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalRYY23,
  author       = {Shweta Agrawal and
                  M{\'{e}}lissa Rossi and
                  Anshu Yadav and
                  Shota Yamada},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Constant Input Attribute Based (and Predicate) Encryption from Evasive
                  and Tensor {LWE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {532--564},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_17},
  doi          = {10.1007/978-3-031-38551-3\_17},
  timestamp    = {Mon, 14 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalRYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgrawalKNYY23,
  author       = {Shweta Agrawal and
                  Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Public Key Encryption with Secure Key Leasing},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14004},
  pages        = {581--610},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30545-0\_20},
  doi          = {10.1007/978-3-031-30545-0\_20},
  timestamp    = {Thu, 20 Apr 2023 11:35:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AgrawalKNYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgrawalKYY23,
  author       = {Shweta Agrawal and
                  Simran Kumari and
                  Anshu Yadav and
                  Shota Yamada},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Broadcast, Trace and Revoke with Optimal Parameters from Polynomial
                  Hardness},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14006},
  pages        = {605--636},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30620-4\_20},
  doi          = {10.1007/978-3-031-30620-4\_20},
  timestamp    = {Thu, 20 Apr 2023 11:35:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AgrawalKYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/ChenMAK23,
  author       = {Shuangyi Chen and
                  Anuja Modi and
                  Shweta Agrawal and
                  Ashish Khisti},
  title        = {Quadratic Functional Encryption for Secure Training in Vertical Federated
                  Learning},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2023,
                  Taipei, Taiwan, June 25-30, 2023},
  pages        = {60--65},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ISIT54713.2023.10206955},
  doi          = {10.1109/ISIT54713.2023.10206955},
  timestamp    = {Mon, 28 Aug 2023 17:20:14 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/ChenMAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalAPRS23,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Manoj Prabhakaran and
                  Rajeev Raghunath and
                  Jayesh Singla},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {{CASE:} {A} New Frontier in Public-Key Authenticated Encryption},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14370},
  pages        = {189--219},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48618-0\_7},
  doi          = {10.1007/978-3-031-48618-0\_7},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalAPRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-11663,
  author       = {Shweta Agrawal and
                  Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Public Key Encryption with Secure Key Leasing},
  journal      = {CoRR},
  volume       = {abs/2302.11663},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.11663},
  doi          = {10.48550/ARXIV.2302.11663},
  eprinttype    = {arXiv},
  eprint       = {2302.11663},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-11663.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-01787,
  author       = {Shweta Agrawal and
                  Sagnik Saha and
                  Nikolaj I. Schwartzbach and
                  Akhil Vanukuri and
                  Prashant Nalini Vasudevan},
  title        = {k-SUM in the Sparse Regime},
  journal      = {CoRR},
  volume       = {abs/2304.01787},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.01787},
  doi          = {10.48550/ARXIV.2304.01787},
  eprinttype    = {arXiv},
  eprint       = {2304.01787},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-01787.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-08358,
  author       = {Shuangyi Chen and
                  Anuja Modi and
                  Shweta Agrawal and
                  Ashish Khisti},
  title        = {Quadratic Functional Encryption for Secure Training in Vertical Federated
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2305.08358},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.08358},
  doi          = {10.48550/ARXIV.2305.08358},
  eprinttype    = {arXiv},
  eprint       = {2305.08358},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-08358.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/SahaSV23,
  author       = {Shweta Agrawal and
                  Sagnik Saha and
                  Nikolaj I. Schwartzbach and
                  Akhil Vanukuri and
                  Prashant Nalini Vasudevan},
  title        = {k-SUM in the Sparse Regime},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR23-060}},
  year         = {2023},
  url          = {https://eccc.weizmann.ac.il/report/2023/060},
  eprinttype    = {ECCC},
  eprint       = {TR23-060},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/SahaSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalKNYY23,
  author       = {Shweta Agrawal and
                  Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Public Key Encryption with Secure Key Leasing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/264},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalKNYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SahaSV23,
  author       = {Shweta Agrawal and
                  Sagnik Saha and
                  Nikolaj I. Schwartzbach and
                  Akhil Vanukuri and
                  Prashant Nalini Vasudevan},
  title        = {k-SUM in the Sparse Regime},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/488},
  timestamp    = {Thu, 25 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SahaSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalRYY23,
  author       = {Shweta Agrawal and
                  Melissa Rossi and
                  Anshu Yadav and
                  Shota Yamada},
  title        = {Constant Input Attribute Based (and Predicate) Encryption from Evasive
                  and Tensor {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {941},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/941},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalRYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalTY23,
  author       = {Shweta Agrawal and
                  Junichi Tomida and
                  Anshu Yadav},
  title        = {Attribute-Based Multi-Input {FE} (and more) for Attribute-Weighted
                  Sums},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1191},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1191},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalAPRS23,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Manoj Prabhakaran and
                  Rajeev Raghunath and
                  Jayesh Singla},
  title        = {{CASE:} {A} New Frontier in Public-Key Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1786},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1786},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalAPRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AgrawalBNXXY22,
  author       = {Shweta Agrawal and
                  Rajarshi Biswas and
                  Ryo Nishimaki and
                  Keita Xagawa and
                  Xiang Xie and
                  Shota Yamada},
  title        = {Cryptanalysis of Boyen's attribute-based encryption scheme in {TCC}
                  2013},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2301--2318},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01076-6},
  doi          = {10.1007/S10623-022-01076-6},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AgrawalBNXXY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/HaiZSJYA22,
  author       = {Tao Hai and
                  Jincheng Zhou and
                  S. R. Srividhya and
                  Sanjiv Kumar Jain and
                  Praise Young and
                  Shweta Agrawal},
  title        = {{BVFLEMR:} an integrated federated learning and blockchain technology
                  for cloud-based medical records recommendation system},
  journal      = {J. Cloud Comput.},
  volume       = {11},
  pages        = {22},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13677-022-00294-6},
  doi          = {10.1186/S13677-022-00294-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcloudc/HaiZSJYA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcloudc/HaiZLJAD22,
  author       = {Tao Hai and
                  Jincheng Zhou and
                  Ning Li and
                  Sanjiv Kumar Jain and
                  Shweta Agrawal and
                  Imed Ben Dhaou},
  title        = {Cloud-based bug tracking software defects analysis using deep learning},
  journal      = {J. Cloud Comput.},
  volume       = {11},
  pages        = {32},
  year         = {2022},
  url          = {https://doi.org/10.1186/s13677-022-00311-8},
  doi          = {10.1186/S13677-022-00311-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcloudc/HaiZLJAD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jus/GondalAK22,
  author       = {Shailesh Gondal and
                  Shweta Agrawal and
                  Anil Kumar},
  title        = {Analysis of Citrus Diseases and Classification Based on Deep Learning
                  Models},
  journal      = {J. Uncertain Syst.},
  volume       = {15},
  number       = {3},
  pages        = {2241010:1--2241010:17},
  year         = {2022},
  url          = {https://doi.org/10.1142/S1752890922410100},
  doi          = {10.1142/S1752890922410100},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jus/GondalAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AgrawalKSY22,
  author       = {Shweta Agrawal and
                  Elena Kirshanova and
                  Damien Stehl{\'{e}} and
                  Anshu Yadav},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Practical, Round-Optimal Lattice-Based Blind Signatures},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {39--53},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560650},
  doi          = {10.1145/3548606.3560650},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AgrawalKSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalYY22,
  author       = {Shweta Agrawal and
                  Anshu Yadav and
                  Shota Yamada},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Multi-input Attribute Based Encryption and Predicate Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {590--621},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_21},
  doi          = {10.1007/978-3-031-15802-5\_21},
  timestamp    = {Wed, 19 Oct 2022 17:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AgrawalSY22,
  author       = {Shweta Agrawal and
                  Damien Stehl{\'{e}} and
                  Anshu Yadav},
  editor       = {Mikolaj Bojanczyk and
                  Emanuela Merelli and
                  David P. Woodruff},
  title        = {Round-Optimal Lattice-Based Threshold Signatures, Revisited},
  booktitle    = {49th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2022, July 4-8, 2022, Paris, France},
  series       = {LIPIcs},
  volume       = {229},
  pages        = {8:1--8:20},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2022.8},
  doi          = {10.4230/LIPICS.ICALP.2022.8},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/AgrawalSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalKMNYY22,
  author       = {Shweta Agrawal and
                  Fuyuki Kitagawa and
                  Anuja Modi and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Bounded Functional Encryption for Turing Machines: Adaptive Security
                  from General Assumptions},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13747},
  pages        = {618--647},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22318-1\_22},
  doi          = {10.1007/978-3-031-22318-1\_22},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalKMNYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalGT22,
  author       = {Shweta Agrawal and
                  Rishab Goyal and
                  Junichi Tomida},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Multi-Input Quadratic Functional Encryption: Stronger Security, Broader
                  Functionality},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13747},
  pages        = {711--740},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22318-1\_25},
  doi          = {10.1007/978-3-031-22318-1\_25},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalGT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2022-1,
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13791},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22963-3},
  doi          = {10.1007/978-3-031-22963-3},
  isbn         = {978-3-031-22962-6},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2022-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2022-2,
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13792},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22966-4},
  doi          = {10.1007/978-3-031-22966-4},
  isbn         = {978-3-031-22965-7},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2022-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2022-3,
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5},
  doi          = {10.1007/978-3-031-22969-5},
  isbn         = {978-3-031-22968-8},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2022-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2022-4,
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13794},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22972-5},
  doi          = {10.1007/978-3-031-22972-5},
  isbn         = {978-3-031-22971-8},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2022-4.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalKMNYY22,
  author       = {Shweta Agrawal and
                  Fuyuki Kitagawa and
                  Anuja Modi and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Bounded Functional Encryption for Turing Machines: Adaptive Security
                  from General Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/316},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalKMNYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalSY22,
  author       = {Shweta Agrawal and
                  Damien Stehl{\'{e}} and
                  Anshu Yadav},
  title        = {Round-Optimal Lattice-Based Threshold Signatures, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/634},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalY022,
  author       = {Shweta Agrawal and
                  Anshu Yadav and
                  Shota Yamada},
  title        = {Multi-Input Attribute Based Encryption and Predicate Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1024},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1024},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalY022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGT22,
  author       = {Shweta Agrawal and
                  Rishab Goyal and
                  Junichi Tomida},
  title        = {Multi-Input Quadratic Functional Encryption: Stronger Security, Broader
                  Functionality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1168},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1168},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalKYY22,
  author       = {Shweta Agrawal and
                  Simran Kumari and
                  Anshu Yadav and
                  Shota Yamada},
  title        = {Trace and Revoke with Optimal Parameters from Polynomial Hardness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1347},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1347},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalKYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalIKNPPR21,
  author       = {Shweta Agrawal and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Varun Narayanan and
                  Manoj Prabhakaran and
                  Vinod M. Prabhakaran and
                  Alon Rosen},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Secure Computation from One-Way Noisy Communication, or: Anti-correlation
                  via Anti-concentration},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {124--154},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_5},
  doi          = {10.1007/978-3-030-84245-1\_5},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalIKNPPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalGT21,
  author       = {Shweta Agrawal and
                  Rishab Goyal and
                  Junichi Tomida},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Multi-input Quadratic Functional Encryption from Pairings},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {208--238},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_8},
  doi          = {10.1007/978-3-030-84259-8\_8},
  timestamp    = {Mon, 16 Aug 2021 09:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalMVY21,
  author       = {Shweta Agrawal and
                  Monosij Maitra and
                  Narasimha Sai Vempati and
                  Shota Yamada},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Functional Encryption for Turing Machines with Dynamic Bounded Collusion
                  from {LWE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12828},
  pages        = {239--269},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84259-8\_9},
  doi          = {10.1007/978-3-030-84259-8\_9},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalMVY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalGM21,
  author       = {Shweta Agrawal and
                  Shafi Goldwasser and
                  Saleet Mossel},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Deniable Fully Homomorphic Encryption from Learning with Errors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {641--670},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_22},
  doi          = {10.1007/978-3-030-84245-1\_22},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalGT21,
  author       = {Shweta Agrawal and
                  Rishab Goyal and
                  Junichi Tomida},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Multi-Party Functional Encryption},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13043},
  pages        = {224--255},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90453-1\_8},
  doi          = {10.1007/978-3-030-90453-1\_8},
  timestamp    = {Mon, 08 Nov 2021 11:43:29 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalGT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBNXXY21,
  author       = {Shweta Agrawal and
                  Rajarshi Biswas and
                  Ryo Nishimaki and
                  Keita Xagawa and
                  Xiang Xie and
                  Shota Yamada},
  title        = {Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in {TCC}
                  2013},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/505},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBNXXY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalMVY21,
  author       = {Shweta Agrawal and
                  Monosij Maitra and
                  Narasimha Sai Vempati and
                  Shota Yamada},
  title        = {Functional Encryption for Turing Machines with Dynamic Bounded Collusion
                  from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {848},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/848},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalMVY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalKSY21,
  author       = {Shweta Agrawal and
                  Elena Kirshanova and
                  Damien Stehl{\'{e}} and
                  Anshu Yadav},
  title        = {Can Round-Optimal Lattice-Based Blind Signatures be Practical?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1565},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1565},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalKSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AgrawalIKNPPR20,
  author       = {Shweta Agrawal and
                  Yuval Ishai and
                  Eyal Kushilevitz and
                  Varun Narayanan and
                  Manoj Prabhakaran and
                  Vinod M. Prabhakaran and
                  Alon Rosen},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Cryptography from One-Way Communication: On Completeness of Finite
                  Channels},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {653--685},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_22},
  doi          = {10.1007/978-3-030-64840-4\_22},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AgrawalIKNPPR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AgrawalGKP20,
  author       = {Shweta Agrawal and
                  Rachit Garg and
                  Nishant Kumar and
                  Manoj Prabhakaran},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {A Practical Model for Collaborative Databases: Securely Mixing, Searching
                  and Computing},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {42--63},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_3},
  doi          = {10.1007/978-3-030-58951-6\_3},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AgrawalGKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Agrawal020,
  author       = {Shweta Agrawal and
                  Shota Yamada},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Optimal Broadcast Encryption from Pairings and {LWE}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {13--43},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_2},
  doi          = {10.1007/978-3-030-45721-1\_2},
  timestamp    = {Mon, 04 May 2020 14:27:11 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Agrawal020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgrawalP20,
  author       = {Shweta Agrawal and
                  Alice Pellet{-}Mary},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Indistinguishability Obfuscation Without Maps: Attacks and Fixes for
                  Noisy Linear {FE}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {110--140},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_5},
  doi          = {10.1007/978-3-030-45721-1\_5},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AgrawalP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/AgrawalCFGOT20,
  author       = {Shweta Agrawal and
                  Michael Clear and
                  Ophir Frieder and
                  Sanjam Garg and
                  Adam O'Neill and
                  Justin Thaler},
  editor       = {Thomas Vidick},
  title        = {Ad Hoc Multi-Input Functional Encryption},
  booktitle    = {11th Innovations in Theoretical Computer Science Conference, {ITCS}
                  2020, January 12-14, 2020, Seattle, Washington, {USA}},
  series       = {LIPIcs},
  volume       = {151},
  pages        = {40:1--40:41},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITCS.2020.40},
  doi          = {10.4230/LIPICS.ITCS.2020.40},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/AgrawalCFGOT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalLMT20,
  author       = {Shweta Agrawal and
                  Beno{\^{\i}}t Libert and
                  Monosij Maitra and
                  Radu Titiu},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Adaptive Simulation Security for Inner Product Functional Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {34--64},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_2},
  doi          = {10.1007/978-3-030-45374-9\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalLMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Agrawal020,
  author       = {Shweta Agrawal and
                  Shota Yamada},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {{CP-ABE} for Circuits (and More) in the Symmetric Key Setting},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {117--148},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_5},
  doi          = {10.1007/978-3-030-64375-1\_5},
  timestamp    = {Tue, 15 Dec 2020 11:52:09 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Agrawal020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalW020,
  author       = {Shweta Agrawal and
                  Daniel Wichs and
                  Shota Yamada},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Optimal Broadcast Encryption from {LWE} and Pairings in the Standard
                  Model},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {149--178},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_6},
  doi          = {10.1007/978-3-030-64375-1\_6},
  timestamp    = {Tue, 15 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalW020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalLMT20,
  author       = {Shweta Agrawal and
                  Beno{\^{\i}}t Libert and
                  Monosij Maitra and
                  Radu Titiu},
  title        = {Adaptive Simulation Security for Inner Product Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalLMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalY20,
  author       = {Shweta Agrawal and
                  Shota Yamada},
  title        = {Optimal Broadcast Encryption from Pairings and {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {228},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/228},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalP20,
  author       = {Shweta Agrawal and
                  Alice Pellet{-}Mary},
  title        = {Indistinguishability Obfuscation Without Maps: Attacks and Fixes for
                  Noisy Linear {FE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {415},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/415},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalWY20,
  author       = {Shweta Agrawal and
                  Daniel Wichs and
                  Shota Yamada},
  title        = {Optimal Broadcast Encryption from {LWE} and Pairings in the Standard
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1179},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1179},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGM20,
  author       = {Shweta Agrawal and
                  Rishab Goyal and
                  Fabrice Mouhartem},
  title        = {Multi-Party Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1266},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1266},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalY20a,
  author       = {Shweta Agrawal and
                  Shota Yamada},
  title        = {{CP-ABE} for Circuits (and more) in the Symmetric Key Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1432},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1432},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalY20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGM20a,
  author       = {Shweta Agrawal and
                  Shafi Goldwasser and
                  Saleet Mossel},
  title        = {Deniable Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1588},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1588},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGM20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalM019,
  author       = {Shweta Agrawal and
                  Monosij Maitra and
                  Shota Yamada},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Attribute Based Encryption (and more) for Nondeterministic Finite
                  Automata from {LWE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {765--797},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_26},
  doi          = {10.1007/978-3-030-26951-7\_26},
  timestamp    = {Fri, 09 Aug 2019 14:22:41 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Agrawal19,
  author       = {Shweta Agrawal},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Indistinguishability Obfuscation Without Multilinear Maps: New Methods
                  for Bootstrapping and Instantiation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11476},
  pages        = {191--225},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17653-2\_7},
  doi          = {10.1007/978-3-030-17653-2\_7},
  timestamp    = {Tue, 14 May 2019 13:47:56 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Agrawal19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalM019,
  author       = {Shweta Agrawal and
                  Monosij Maitra and
                  Shota Yamada},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Attribute Based Encryption for Deterministic Finite Automata from
                  {\textbackslash}mathsfDLIN},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11892},
  pages        = {91--117},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36033-7\_4},
  doi          = {10.1007/978-3-030-36033-7\_4},
  timestamp    = {Mon, 25 Nov 2019 13:59:31 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalCFGOT19,
  author       = {Shweta Agrawal and
                  Michael Clear and
                  Ophir Frieder and
                  Sanjam Garg and
                  Adam O'Neill and
                  Justin Thaler},
  title        = {Ad Hoc Multi-Input Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/356},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalCFGOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalM019,
  author       = {Shweta Agrawal and
                  Monosij Maitra and
                  Shota Yamada},
  title        = {Attribute Based Encryption (and more) for Nondeterministic Finite
                  Automata from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {629},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/629},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalM019a,
  author       = {Shweta Agrawal and
                  Monosij Maitra and
                  Shota Yamada},
  title        = {Attribute Based Encryption for Deterministic Finite Automata from
                  {DLIN}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {645},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/645},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalM019a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGKP19,
  author       = {Shweta Agrawal and
                  Rachit Garg and
                  Nishant Kumar and
                  Manoj Prabhakaran},
  title        = {A Practical Model for Collaborative Databases: Securely Mixing, Searching
                  and Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1262},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1262},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/RajagopalanTA18,
  author       = {Aswin Rajagopalan and
                  Andrew Thangaraj and
                  Shweta Agrawal},
  title        = {Wiretap Polar Codes in Encryption Schemes Based on Learning with Errors
                  Problem},
  booktitle    = {2018 {IEEE} International Symposium on Information Theory, {ISIT}
                  2018, Vail, CO, USA, June 17-22, 2018},
  pages        = {1146--1150},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ISIT.2018.8437896},
  doi          = {10.1109/ISIT.2018.8437896},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/RajagopalanTA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalM18,
  author       = {Shweta Agrawal and
                  Monosij Maitra},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {{FE} and iO for Turing Machines from Minimal Assumptions},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11240},
  pages        = {473--512},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03810-6\_18},
  doi          = {10.1007/978-3-030-03810-6\_18},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Agrawal18,
  author       = {Shweta Agrawal},
  title        = {New Methods for Indistinguishability Obfuscation: Bootstrapping and
                  Instantiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {633},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/633},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Agrawal18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalM18,
  author       = {Shweta Agrawal and
                  Monosij Maitra},
  title        = {{FE} and iO for Turing Machines from Minimal Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {908},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/908},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AgrawalBPS017,
  author       = {Shweta Agrawal and
                  Sanjay Bhattacherjee and
                  Duong Hieu Phan and
                  Damien Stehl{\'{e}} and
                  Shota Yamada},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Efficient Public Trace and Revoke from Standard Assumptions: Extended
                  Abstract},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2277--2293},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134041},
  doi          = {10.1145/3133956.3134041},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AgrawalBPS017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Agrawal17,
  author       = {Shweta Agrawal},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Stronger Security for Reusable Garbled Circuits, General Definitions
                  and Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {3--35},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_1},
  doi          = {10.1007/978-3-319-63688-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Agrawal17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AgrawalS17,
  author       = {Shweta Agrawal and
                  Ishaan Preet Singh},
  editor       = {Ioannis Chatzigiannakis and
                  Piotr Indyk and
                  Fabian Kuhn and
                  Anca Muscholl},
  title        = {Reusable Garbled Deterministic Finite Automata from Learning With
                  Errors},
  booktitle    = {44th International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2017, July 10-14, 2017, Warsaw, Poland},
  series       = {LIPIcs},
  volume       = {80},
  pages        = {36:1--36:13},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2017},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2017.36},
  doi          = {10.4230/LIPICS.ICALP.2017.36},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/AgrawalS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalR17,
  author       = {Shweta Agrawal and
                  Alon Rosen},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Functional Encryption for Bounded Collusions, Revisited},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {173--205},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_7},
  doi          = {10.1007/978-3-319-70500-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBPSY17,
  author       = {Shweta Agrawal and
                  Sanjay Bhattacherjee and
                  Duong Hieu Phan and
                  Damien Stehl{\'{e}} and
                  Shota Yamada},
  title        = {Efficient Public Trace and Revoke from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBPSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalLS16,
  author       = {Shweta Agrawal and
                  Beno{\^{\i}}t Libert and
                  Damien Stehl{\'{e}}},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Fully Secure Functional Encryption for Inner Products, from Standard
                  Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {333--362},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_12},
  doi          = {10.1007/978-3-662-53015-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/AgrawalGS16,
  author       = {Shweta Agrawal and
                  Ran Gelles and
                  Amit Sahai},
  title        = {Adaptive protocols for interactive communication},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2016,
                  Barcelona, Spain, July 10-15, 2016},
  pages        = {595--599},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ISIT.2016.7541368},
  doi          = {10.1109/ISIT.2016.7541368},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/AgrawalGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalR16,
  author       = {Shweta Agrawal and
                  Alon Rosen},
  title        = {Online-Offline Functional Encryption for Bounded Collusions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Agrawal16,
  author       = {Shweta Agrawal},
  title        = {Interpolating Predicate and Functional Encryption from Learning With
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {654},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/654},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Agrawal16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgrawalAP15,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Manoj Prabhakaran},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted
                  Data},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {501--531},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_17},
  doi          = {10.1007/978-3-662-46803-6\_17},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AgrawalAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AgrawalIKP15,
  author       = {Shweta Agrawal and
                  Yuval Ishai and
                  Dakshita Khurana and
                  Anat Paskin{-}Cherniavsky},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Kazuo Iwama and
                  Naoki Kobayashi and
                  Bettina Speckmann},
  title        = {Statistical Randomized Encodings: {A} Complexity Theoretic View},
  booktitle    = {Automata, Languages, and Programming - 42nd International Colloquium,
                  {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9134},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47672-7\_1},
  doi          = {10.1007/978-3-662-47672-7\_1},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/AgrawalIKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalABKPS15,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Saikrishna Badrinarayanan and
                  Abishek Kumarasubramanian and
                  Manoj Prabhakaran and
                  Amit Sahai},
  editor       = {Jonathan Katz},
  title        = {On the Practical Security of Inner Product Functional Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {777--798},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_35},
  doi          = {10.1007/978-3-662-46447-2\_35},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalABKPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalAP14,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Manoj Prabhakaran},
  title        = {Towards a Unified Theory of Cryptographic Agents},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/480},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalAP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AgrawalGHS13,
  author       = {Shweta Agrawal and
                  Craig Gentry and
                  Shai Halevi and
                  Amit Sahai},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Discrete Gaussian Leftover Hash Lemma over Infinite Domains},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {97--116},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_6},
  doi          = {10.1007/978-3-642-42033-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AgrawalGHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AgrawalDVW13,
  author       = {Shweta Agrawal and
                  Yevgeniy Dodis and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {On Continual Leakage of Discrete Log Representations},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {401--420},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_21},
  doi          = {10.1007/978-3-642-42045-0\_21},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AgrawalDVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalGVW13,
  author       = {Shweta Agrawal and
                  Sergey Gorbunov and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {Functional Encryption: New Perspectives and Lower Bounds},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {500--518},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_28},
  doi          = {10.1007/978-3-642-40084-1\_28},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalGVW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AgrawalGS13,
  author       = {Shweta Agrawal and
                  Ran Gelles and
                  Amit Sahai},
  title        = {Adaptive Protocols for Interactive Communication},
  journal      = {CoRR},
  volume       = {abs/1312.4182},
  year         = {2013},
  url          = {http://arxiv.org/abs/1312.4182},
  eprinttype    = {arXiv},
  eprint       = {1312.4182},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AgrawalGS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalABKPS13,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Saikrishna Badrinarayanan and
                  Abishek Kumarasubramanian and
                  Manoj Prabhakaran and
                  Amit Sahai},
  title        = {Function Private Functional Encryption and Property Preserving Encryption
                  : New Definitions and Positive Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {744},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/744},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalABKPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalGJPS12,
  author       = {Shweta Agrawal and
                  Vipul Goyal and
                  Abhishek Jain and
                  Manoj Prabhakaran and
                  Amit Sahai},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {New Impossibility Results for Concurrent Composition and a Non-interactive
                  Completeness Theorem for Secure Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {443--460},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_26},
  doi          = {10.1007/978-3-642-32009-5\_26},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalGJPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalBVVW12,
  author       = {Shweta Agrawal and
                  Xavier Boyen and
                  Vinod Vaikuntanathan and
                  Panagiotis Voulgaris and
                  Hoeteck Wee},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Functional Encryption for Threshold Functions (or Fuzzy {IBE)} from
                  Lattices},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {280--297},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_17},
  doi          = {10.1007/978-3-642-30057-8\_17},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalBVVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalDVW12,
  author       = {Shweta Agrawal and
                  Yevgeniy Dodis and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  title        = {On Continual Leakage of Discrete Log Representations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {367},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/367},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalDVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGVW12,
  author       = {Shweta Agrawal and
                  Sergey Gorbunov and
                  Vinod Vaikuntanathan and
                  Hoeteck Wee},
  title        = {Functional Encryption: New Perspectives and Lower Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/468},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGVW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalG0PS12,
  author       = {Shweta Agrawal and
                  Vipul Goyal and
                  Abhishek Jain and
                  Manoj Prabhakaran and
                  Amit Sahai},
  title        = {New Impossibility Results for Concurrent Composition and a Non-Interactive
                  Completeness Theorem for Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {555},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/555},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalG0PS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGHS12,
  author       = {Shweta Agrawal and
                  Craig Gentry and
                  Shai Halevi and
                  Amit Sahai},
  title        = {Sampling Discrete Gaussians Efficiently and Obliviously},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {714},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/714},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AgrawalFV11,
  author       = {Shweta Agrawal and
                  David Mandell Freeman and
                  Vinod Vaikuntanathan},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Functional Encryption for Inner Product Predicates from Learning with
                  Errors},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {21--40},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_2},
  doi          = {10.1007/978-3-642-25385-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AgrawalFV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/AgrawalV11,
  author       = {Shweta Agrawal and
                  Sriram Vishwanath},
  title        = {Secrecy using compressive sensing},
  booktitle    = {2011 {IEEE} Information Theory Workshop, {ITW} 2011, Paraty, Brazil,
                  October 16-20, 2011},
  pages        = {563--567},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ITW.2011.6089519},
  doi          = {10.1109/ITW.2011.6089519},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/AgrawalV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalFV11,
  author       = {Shweta Agrawal and
                  David Mandell Freeman and
                  Vinod Vaikuntanathan},
  title        = {Functional Encryption for Inner Product Predicates from Learning with
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {410},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/410},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalFV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBVVW11,
  author       = {Shweta Agrawal and
                  Xavier Boyen and
                  Vinod Vaikuntanathan and
                  Panagiotis Voulgaris and
                  Hoeteck Wee},
  title        = {Fuzzy Identity Based Encryption from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {414},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/414},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBVVW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisim/KamalA10,
  author       = {Raj Kamal and
                  Shweta Agrawal},
  title        = {A design framework of Orchestrator for computing systems},
  booktitle    = {2010 International Conference on Computer Information Systems and
                  Industrial Management Applications, CISIM, Krakow, Poland, October
                  8-10, 2010},
  pages        = {410--413},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CISIM.2010.5643506},
  doi          = {10.1109/CISIM.2010.5643506},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisim/KamalA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalBB10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen},
  editor       = {Tal Rabin},
  title        = {Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext
                  Hierarchical {IBE}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {98--115},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_6},
  doi          = {10.1007/978-3-642-14623-7\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgrawalBB10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen},
  editor       = {Henri Gilbert},
  title        = {Efficient Lattice {(H)IBE} in the Standard Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Monaco / French Riviera, May 30 - June 3, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6110},
  pages        = {553--572},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13190-5\_28},
  doi          = {10.1007/978-3-642-13190-5\_28},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AgrawalBB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/DasAV10,
  author       = {Abhik Kumar Das and
                  Shweta Agrawal and
                  Sriram Vishwanath},
  title        = {On algebraic traceback in dynamic networks},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2010,
                  June 13-18, 2010, Austin, Texas, USA, Proceedings},
  pages        = {1903--1907},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIT.2010.5513409},
  doi          = {10.1109/ISIT.2010.5513409},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/DasAV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalBBF10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen and
                  David Mandell Freeman},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Preventing Pollution Attacks in Multi-source Network Coding},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_10},
  doi          = {10.1007/978-3-642-13013-7\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalBBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBBF10,
  author       = {Shweta Agrawal and
                  Dan Boneh and
                  Xavier Boyen and
                  David Mandell Freeman},
  title        = {Preventing Pollution Attacks in Multi-Source Network Coding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {183},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/183},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBBF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AgrawalB09,
  author       = {Shweta Agrawal and
                  Dan Boneh},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Homomorphic MACs: MAC-Based Integrity for Network Coding},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {292--305},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_18},
  doi          = {10.1007/978-3-642-01957-9\_18},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AgrawalB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/AgrawalV09,
  author       = {Shweta Agrawal and
                  Sriram Vishwanath},
  title        = {On the secrecy rate of interference networks using structured codes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2009,
                  June 28 - July 3, 2009, Seoul, Korea, Proceedings},
  pages        = {2091--2095},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISIT.2009.5205275},
  doi          = {10.1109/ISIT.2009.5205275},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/AgrawalV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0905-2159,
  author       = {Shweta Agrawal and
                  Sriram Vishwanath},
  title        = {On the Secrecy Rate of Interference Networks using structured codes},
  journal      = {CoRR},
  volume       = {abs/0905.2159},
  year         = {2009},
  url          = {http://arxiv.org/abs/0905.2159},
  eprinttype    = {arXiv},
  eprint       = {0905.2159},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0905-2159.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0908-0078,
  author       = {Abhik Kumar Das and
                  Shweta Agrawal and
                  Sriram Vishwanath},
  title        = {Algebraic Traceback for Dynamic Networks},
  journal      = {CoRR},
  volume       = {abs/0908.0078},
  year         = {2009},
  url          = {http://arxiv.org/abs/0908.0078},
  eprinttype    = {arXiv},
  eprint       = {0908.0078},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0908-0078.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rtss/AgrawalRS04,
  author       = {Shweta Agrawal and
                  Krithi Ramamritham and
                  Shetal Shah},
  title        = {Construction of a Coherency Preserving Dynamic Data Dissemination
                  Network},
  booktitle    = {Proceedings of the 25th {IEEE} Real-Time Systems Symposium {(RTSS}
                  2004), 5-8 December 2004, Lisbon, Portugal},
  pages        = {286--295},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/REAL.2004.16},
  doi          = {10.1109/REAL.2004.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rtss/AgrawalRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}