Shweta Agrawal

Orcid: 0000-0002-0372-6128

According to our database1, Shweta Agrawal authored at least 76 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Pseudorandom Multi-Input Functional Encryption and Applications.
IACR Cryptol. ePrint Arch., 2024

Compact Pseudorandom Functional Encryption from Evasive LWE.
IACR Cryptol. ePrint Arch., 2024

Pre-Constrained Cryptography: Broad Definitions, New Constructions, Unbounded Security.
IACR Cryptol. ePrint Arch., 2024

k-SUM in the Sparse Regime: Complexity and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Attribute Based Encryption for Turing Machines from Lattices.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Attribute-Based Multi-Input FE (and more) for Attribute-Weighted Sums.
IACR Cryptol. ePrint Arch., 2023

Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE.
IACR Cryptol. ePrint Arch., 2023

Public Key Encryption with Secure Key Leasing.
IACR Cryptol. ePrint Arch., 2023

CASE: A New Frontier in Public-Key Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2023

k-SUM in the Sparse Regime.
Electron. Colloquium Comput. Complex., 2023

Quadratic Functional Encryption for Secure Training in Vertical Federated Learning.
Proceedings of the IEEE International Symposium on Information Theory, 2023

Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Analysis of Citrus Diseases and Classification Based on Deep Learning Models.
J. Uncertain Syst., 2022

BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system.
J. Cloud Comput., 2022

Cloud-based bug tracking software defects analysis using deep learning.
J. Cloud Comput., 2022

Multi-Input Attribute Based Encryption and Predicate Encryption.
IACR Cryptol. ePrint Arch., 2022

Round-Optimal Lattice-Based Threshold Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2022

Trace and Revoke with Optimal Parameters from Polynomial Hardness.
IACR Cryptol. ePrint Arch., 2022

Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
IACR Cryptol. ePrint Arch., 2022

Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality.
IACR Cryptol. ePrint Arch., 2022

Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013.
Des. Codes Cryptogr., 2022

Practical, Round-Optimal Lattice-Based Blind Signatures.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.
IACR Cryptol. ePrint Arch., 2021

Can Round-Optimal Lattice-Based Blind Signatures be Practical?
IACR Cryptol. ePrint Arch., 2021

Multi-Party Functional Encryption.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Multi-input Quadratic Functional Encryption from Pairings.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Deniable Fully Homomorphic Encryption from Learning with Errors.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
CP-ABE for Circuits (and more) in the Symmetric Key Setting.
IACR Cryptol. ePrint Arch., 2020

Optimal Broadcast Encryption from Pairings and LWE.
IACR Cryptol. ePrint Arch., 2020

Optimal Broadcast Encryption from LWE and Pairings in the Standard Model.
IACR Cryptol. ePrint Arch., 2020

Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE.
IACR Cryptol. ePrint Arch., 2020

Adaptive Simulation Security for Inner Product Functional Encryption.
IACR Cryptol. ePrint Arch., 2020

Deniable Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2020

Multi-Party Functional Encryption.
IACR Cryptol. ePrint Arch., 2020

Cryptography from One-Way Communication: On Completeness of Finite Channels.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Attribute Based Encryption for Deterministic Finite Automata from DLIN.
IACR Cryptol. ePrint Arch., 2019

Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE.
IACR Cryptol. ePrint Arch., 2019

A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing.
IACR Cryptol. ePrint Arch., 2019

Ad Hoc Multi-Input Functional Encryption.
IACR Cryptol. ePrint Arch., 2019

Attribute Based Encryption for Deterministic Finite Automata from \mathsfDLIN.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
FE and iO for Turing Machines from Minimal Assumptions.
IACR Cryptol. ePrint Arch., 2018

New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation.
IACR Cryptol. ePrint Arch., 2018

Wiretap Polar Codes in Encryption Schemes Based on Learning with Errors Problem.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Efficient Public Trace and Revoke from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2017

Functional Encryption for Bounded Collusions, Revisited.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Reusable Garbled Deterministic Finite Automata from Learning With Errors.
Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, 2017

Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Online-Offline Functional Encryption for Bounded Collusions.
IACR Cryptol. ePrint Arch., 2016

Interpolating Predicate and Functional Encryption from Learning With Errors.
IACR Cryptol. ePrint Arch., 2016

Adaptive protocols for interactive communication.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Fully Secure Functional Encryption for Inner Products, from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
On the Practical Security of Inner Product Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Statistical Randomized Encodings: A Complexity Theoretic View.
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015

Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Towards a Unified Theory of Cryptographic Agents.
IACR Cryptol. ePrint Arch., 2014

2013
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results.
IACR Cryptol. ePrint Arch., 2013

Discrete Gaussian Leftover Hash Lemma over Infinite Domains.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Functional Encryption: New Perspectives and Lower Bounds.
IACR Cryptol. ePrint Arch., 2012

Sampling Discrete Gaussians Efficiently and Obliviously.
IACR Cryptol. ePrint Arch., 2012

New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation.
IACR Cryptol. ePrint Arch., 2012

On Continual Leakage of Discrete Log Representations.
IACR Cryptol. ePrint Arch., 2012

Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
Functional Encryption for Inner Product Predicates from Learning with Errors.
IACR Cryptol. ePrint Arch., 2011

Fuzzy Identity Based Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2011

Secrecy using compressive sensing.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

2010
Preventing Pollution Attacks in Multi-Source Network Coding.
IACR Cryptol. ePrint Arch., 2010

On algebraic traceback in dynamic networks.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Efficient Lattice (H)IBE in the Standard Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.
Proceedings of the Advances in Cryptology, 2010

A design framework of Orchestrator for computing systems.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

2009
On the secrecy rate of interference networks using structured codes.
Proceedings of the IEEE International Symposium on Information Theory, 2009

Homomorphic MACs: MAC-Based Integrity for Network Coding.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2004
Construction of a Coherency Preserving Dynamic Data Dissemination Network.
Proceedings of the 25th IEEE Real-Time Systems Symposium (RTSS 2004), 2004


  Loading...