Shweta Agrawal
Shweta Agrawal
Verified email at iitm.ac.in - Homepage
Title
Cited by
Cited by
Year
Efficient lattice (H) IBE in the standard model
S Agrawal, D Boneh, X Boyen
Annual International Conference on the Theory and Applications of …, 2010
8502010
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE
S Agrawal, D Boneh, X Boyen
Annual Cryptology Conference, 98-115, 2010
3662010
Homomorphic MACs: MAC-based integrity for network coding
S Agrawal, D Boneh
International Conference on Applied Cryptography and Network Security, 292-305, 2009
3102009
Functional encryption for inner product predicates from learning with errors
S Agrawal, DM Freeman, V Vaikuntanathan
International Conference on the Theory and Application of Cryptology and …, 2011
2082011
Functional encryption: New perspectives and lower bounds
S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee
Annual Cryptology Conference, 500-518, 2013
1582013
Fully secure functional encryption for inner products, from standard assumptions
S Agrawal, B Libert, D Stehlé
Annual International Cryptology Conference, 333-362, 2016
1472016
Functional encryption for threshold functions (or fuzzy IBE) from lattices
S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee
International Workshop on Public Key Cryptography, 280-297, 2012
1272012
Secrecy using compressive sensing
S Agrawal, S Vishwanath
2011 IEEE Information Theory Workshop, 563-567, 2011
572011
Preventing pollution attacks in multi-source network coding
S Agrawal, D Boneh, X Boyen, DM Freeman
International Workshop on Public Key Cryptography, 161-176, 2010
522010
Function Private Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results.
S Agrawal, S Agrawal, S Badrinarayanan, A Kumarasubramanian, ...
IACR Cryptol. ePrint Arch. 2013, 744, 2013
472013
On continual leakage of discrete log representations
S Agrawal, Y Dodis, V Vaikuntanathan, D Wichs
International Conference on the Theory and Application of Cryptology and …, 2013
392013
Privacy and security of Aadhaar: a computer science perspective
SASBS Sharma
Economic and Political Weekly, 2017
382017
Discrete gaussian leftover hash lemma over infinite domains
S Agrawal, C Gentry, S Halevi, A Sahai
International Conference on the Theory and Application of Cryptology and …, 2013
372013
Adaptive protocols for interactive communication
S Agrawal, R Gelles, A Sahai
2016 IEEE International Symposium on Information Theory (ISIT), 595-599, 2016
362016
Fuzzy Identity Based Encryption from Lattices.
S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee
IACR Cryptol. ePrint Arch. 2011, 414, 2011
342011
On the practical security of inner product functional encryption
S Agrawal, S Agrawal, S Badrinarayanan, A Kumarasubramanian, ...
IACR International Workshop on Public Key Cryptography, 777-798, 2015
332015
Identity-based encryption from lattices in the standard model
S Agrawal, X Boyen
Manuscript, July 3, 2009
332009
On the secrecy rate of interference networks using structured codes
S Agrawal, S Vishwanath
2009 IEEE International Symposium on Information Theory, 2091-2095, 2009
332009
Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
S Agrawal
Annual International Conference on the Theory and Applications of …, 2019
242019
Efficient public trace and revoke from standard assumptions
S Agrawal, S Bhattacherjee, DH Phan, D Stehlé, S Yamada
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
242017
The system can't perform the operation now. Try again later.
Articles 1–20