Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption A Lewko, T Okamoto, A Sahai, K Takashima, B Waters Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010 | 1535 | 2010 |

Decentralizing attribute-based encryption A Lewko, B Waters Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011 | 1480 | 2011 |

New techniques for dual system encryption and fully secure HIBE with short ciphertexts A Lewko, B Waters Theory of Cryptography, 455-479, 2010 | 616 | 2010 |

New proof methods for attribute-based encryption: Achieving full security through selective techniques A Lewko, B Waters Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012 | 386 | 2012 |

Unbounded HIBE and Attribute-Based Encryption. AB Lewko, B Waters Eurocrypt 6632, 547-567, 2011 | 340 | 2011 |

Revocation systems with very small private keys A Lewko, A Sahai, B Waters 2010 IEEE Symposium on Security and Privacy, 273-285, 2010 | 328 | 2010 |

Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting. AB Lewko Eurocrypt 7237, 318-335, 2012 | 262 | 2012 |

Achieving leakage resilience through dual system encryption A Lewko, Y Rouselakis, B Waters Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011 | 195 | 2011 |

Indistinguishability obfuscation from the multilinear subgroup elimination assumption C Gentry, AB Lewko, A Sahai, B Waters 2015 IEEE 56th Annual Symposium on Foundations of Computer Science, 151-170, 2015 | 167 | 2015 |

Indistinguishability obfuscation for turing machines with unbounded memory V Koppula, AB Lewko, B Waters Proceedings of the forty-seventh annual ACM symposium on Theory of Computing …, 2015 | 147 | 2015 |

Witness encryption from instance independent assumptions C Gentry, A Lewko, B Waters Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 105 | 2014 |

Storing secrets on continually leaky devices Y Dodis, A Lewko, B Waters, D Wichs Foundations of Computer Science (FOCS), 2011 IEEE 52nd Annual Symposium on …, 2011 | 84 | 2011 |

How to leak on key updates A Lewko, M Lewko, B Waters Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011 | 82 | 2011 |

Efficient pseudorandom functions from the decisional linear assumption and weaker variants AB Lewko, B Waters Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 62 | 2009 |

Dual form signatures: An approach for proving security from static assumptions M Gerbush, A Lewko, A O’Neill, B Waters Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 54 | 2012 |

Detecting dangerous queries: a new approach for chosen ciphertext security S Hohenberger, A Lewko, B Waters Advances in Cryptology–EUROCRYPT 2012, 663-681, 2012 | 50 | 2012 |

Why proving HIBE systems secure is difficult A Lewko, B Waters Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 48 | 2014 |

Interactive coding for multiparty protocols A Jain, YT Kalai, AB Lewko Proceedings of the 2015 Conference on Innovations in Theoretical Computer …, 2015 | 31 | 2015 |

Endpoint restriction estimates for the paraboloid over finite fields A Lewko, M Lewko Proc. Amer. Math. Soc 140, 2013-2028, 2012 | 30 | 2012 |

Bilinear entropy expansion from the decisional linear assumption L Kowalczyk, AB Lewko Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 24 | 2015 |