Follow
Allison Lewko
Allison Lewko
Assistant Professor, Columbia University
Verified email at cs.columbia.edu - Homepage
Title
Cited by
Cited by
Year
Decentralizing attribute-based encryption
A Lewko, B Waters
Annual international conference on the theory and applications of …, 2011
17172011
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
A Lewko, T Okamoto, A Sahai, K Takashima, B Waters
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
17052010
New techniques for dual system encryption and fully secure HIBE with short ciphertexts
A Lewko, B Waters
Theory of Cryptography, 455-479, 2010
6762010
New proof methods for attribute-based encryption: Achieving full security through selective techniques
A Lewko, B Waters
Annual Cryptology Conference, 180-198, 2012
4272012
Unbounded HIBE and attribute-based encryption
A Lewko, B Waters
Annual International Conference on the Theory and Applications of …, 2011
3892011
Revocation systems with very small private keys
A Lewko, A Sahai, B Waters
2010 IEEE Symposium on Security and Privacy, 273-285, 2010
3602010
Tools for simulating features of composite order bilinear groups in the prime order setting
A Lewko
Annual International Conference on the Theory and Applications of …, 2012
2972012
Achieving leakage resilience through dual system encryption
A Lewko, Y Rouselakis, B Waters
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
2042011
Indistinguishability obfuscation from the multilinear subgroup elimination assumption
C Gentry, AB Lewko, A Sahai, B Waters
2015 IEEE 56th Annual Symposium on Foundations of Computer Science, 151-170, 2015
1822015
Indistinguishability obfuscation for turing machines with unbounded memory
V Koppula, AB Lewko, B Waters
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing …, 2015
1722015
Witness encryption from instance independent assumptions
C Gentry, A Lewko, B Waters
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
1202014
Storing secrets on continually leaky devices
Y Dodis, A Lewko, B Waters, D Wichs
Foundations of Computer Science (FOCS), 2011 IEEE 52nd Annual Symposium on …, 2011
832011
How to leak on key updates
A Lewko, M Lewko, B Waters
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
832011
Efficient pseudorandom functions from the decisional linear assumption and weaker variants
AB Lewko, B Waters
Proceedings of the 16th ACM conference on Computer and communications …, 2009
652009
Dual form signatures: An approach for proving security from static assumptions
M Gerbush, A Lewko, A O’Neill, B Waters
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
642012
Why proving HIBE systems secure is difficult
A Lewko, B Waters
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
612014
Detecting dangerous queries: a new approach for chosen ciphertext security
S Hohenberger, A Lewko, B Waters
Advances in Cryptology–EUROCRYPT 2012, 663-681, 2012
562012
Interactive coding for multiparty protocols
A Jain, YT Kalai, AB Lewko
Proceedings of the 2015 Conference on Innovations in Theoretical Computer …, 2015
372015
Bilinear entropy expansion from the decisional linear assumption
L Kowalczyk, AB Lewko
Annual Cryptology Conference, 524-541, 2015
362015
Bounded-collusion IBE from key homomorphism
S Goldwasser, A Lewko, DA Wilson
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012
322012
The system can't perform the operation now. Try again later.
Articles 1–20