2015 - ACM Grace Murray Hopper Award For the introduction and development of the concepts of Attribute-Based Encryption and Functional Encryption.
2010 - Fellow of Alfred P. Sloan Foundation
His primary areas of study are Encryption, Theoretical computer science, Attribute-based encryption, Computer security and Functional encryption. Brent Waters regularly ties together related areas like Cryptography in his Encryption studies. The concepts of his Theoretical computer science study are interwoven with issues in Scheme, Homomorphic encryption, Random oracle, Cryptosystem and Standard model.
Brent Waters focuses mostly in the field of Attribute-based encryption, narrowing it down to topics relating to Access structure and, in certain cases, Proxy re-encryption, Generic group model and Computer security model. His studies in Functional encryption integrate themes in fields like Predicate encryption and On-the-fly encryption, Client-side encryption. Brent Waters interconnects Multiple encryption and 40-bit encryption in the investigation of issues within Probabilistic encryption.
His primary areas of investigation include Encryption, Theoretical computer science, Computer security, Public-key cryptography and Ciphertext. His study in Encryption is interdisciplinary in nature, drawing from both Discrete mathematics and Key. His Theoretical computer science research is multidisciplinary, relying on both Cryptography, Random oracle, Pseudorandom number generator, Scheme and Standard model.
His Cryptosystem and Adversary study in the realm of Computer security interacts with subjects such as Collusion. His Probabilistic encryption study combines topics from a wide range of disciplines, such as Multiple encryption and 40-bit encryption. The Ciphertext indistinguishability research Brent Waters does as part of his general Attribute-based encryption study is frequently linked to other disciplines of science, such as Delegation, therefore creating a link between diverse domains of science.
The scientist’s investigation covers issues in Encryption, Discrete mathematics, Theoretical computer science, Ciphertext and Public-key cryptography. Among his Encryption studies, there is a synthesis of other scientific areas such as TRACE and Physics. His work in Discrete mathematics addresses issues such as Construct, which are connected to fields such as Aggregate, Sign, Protocol, Algorithm and Encoding.
His Theoretical computer science research includes elements of Traitor tracing, Learning with errors, Cryptography, Attribute-based encryption and Functional encryption. His Functional encryption research is multidisciplinary, incorporating elements of Random oracle and Plaintext-aware encryption. His study on Public-key cryptography is covered under Computer security.
Brent Waters focuses on Encryption, Ciphertext, Public-key cryptography, Traitor tracing and Discrete mathematics. His work carried out in the field of Encryption brings together such families of science as Theoretical computer science and Cryptography. The Theoretical computer science study combines topics in areas such as Transformation, Pseudorandom generator, Attribute-based encryption and Tracing.
His Cryptography research incorporates elements of Key and Functional encryption. His research integrates issues of Plaintext and Construct in his study of Ciphertext. His Public-key cryptography study introduces a deeper knowledge of Computer security.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data.
Vipul Goyal;Omkant Pandey;Amit Sahai;Brent Waters.
IACR Cryptology ePrint Archive (2006)
Ciphertext-Policy Attribute-Based Encryption
J. Bethencourt;A. Sahai;B. Waters.
ieee symposium on security and privacy (2007)
Attribute-based encryption for fine-grained access control of encrypted data
Vipul Goyal;Omkant Pandey;Amit Sahai;Brent Waters.
computer and communications security (2006)
Fuzzy identity-based encryption
Amit Sahai;Brent Waters.
theory and application of cryptographic techniques (2005)
Efficient identity-based encryption without random oracles
Brent Waters.
theory and application of cryptographic techniques (2005)
Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
Brent Waters.
public key cryptography (2011)
Compact Proofs of Retrievability
Hovav Shacham;Brent Waters.
Journal of Cryptology (2013)
Conjunctive, subset, and range queries on encrypted data
Dan Boneh;Brent Waters.
theory of cryptography conference (2007)
Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
Allison Lewko;Tatsuaki Okamoto;Amit Sahai;Katsuyuki Takashima.
theory and application of cryptographic techniques (2010)
Attribute-Based Encryption with Non-Monotonic Access Structures.
Rafail Ostrovsky;Amit Sahai;Brent Waters.
IACR Cryptology ePrint Archive (2007)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of California, Los Angeles
Johns Hopkins University
Stanford University
The University of Texas at Austin
Algorand Foundation
Queensland University of Technology
University of California, Berkeley
University of Michigan–Ann Arbor
University of California, San Diego
University of Maryland, College Park
ETH Zurich
University of California, Santa Cruz
Finmeccanica (Italy)
TU Dresden
Spanish National Research Council
Beijing University of Technology
Czech Academy of Sciences
Tufts University
North Carolina State University
Samsung Medical Center
Northwest Research Associates
University of Pittsburgh
Peter MacCallum Cancer Centre
McMaster University
Max Planck Society
University of North Carolina at Chapel Hill