Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shweta Agrawal is active.

Publication


Featured researches published by Shweta Agrawal.


applied cryptography and network security | 2009

Homomorphic MACs: MAC-Based Integrity for Network Coding

Shweta Agrawal; Dan Boneh

Network coding has been shown to improve the capacity and robustness in networks. However, since intermediate nodes modify packets en-route, integrity of data cannot be checked using traditional MACs and checksums. In addition, network coded systems are vulnerable to pollution attacks where a single malicious node can flood the network with bad packets and prevent the receiver from decoding the packets correctly. Signature schemes have been proposed to thwart such attacks, but they tend to be too slow for online per-packet integrity. Here we propose a homomorphic MAC which allows checking the integrity of network coded data. Our homomorphic MAC is designed as a drop-in replacement for traditional MACs (such as HMAC) in systems using network coding.


international cryptology conference | 2010

Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE

Shweta Agrawal; Dan Boneh; Xavier Boyen

We present a technique for delegating a short lattice basis that has the advantage of keeping the lattice dimension unchanged upon delegation. Building on this result, we construct two new hierarchical identity-based encryption (HIBE) schemes, with and without random oracles. The resulting systems are very different from earlier lattice-based HIBEs and in some cases result in shorter ciphertexts and private keys. We prove security from classic lattice hardness assumptions.


international conference on the theory and application of cryptology and information security | 2011

Functional encryption for inner product predicates from learning with errors

Shweta Agrawal; David Mandell Freeman; Vinod Vaikuntanathan

We propose a lattice-based functional encryption scheme for inner product predicates whose security follows from the difficulty of the learning with errors (LWE) problem. This construction allows us to achieve applications such as range and subset queries, polynomial evaluation, and CNF/DNF formulas on encrypted data. Our scheme supports inner products over small fields, in contrast to earlier works based on bilinear maps. Our construction is the first functional encryption scheme based on lattice techniques that goes beyond basic identity-based encryption. The main technique in our scheme is a novel twist to the identity-based encryption scheme of Agrawal, Boneh and Boyen (Eurocrypt 2010). Our scheme is weakly attribute hiding in the standard model.


international cryptology conference | 2013

Functional Encryption: New Perspectives and Lower Bounds

Shweta Agrawal; Sergey Gorbunov; Vinod Vaikuntanathan; Hoeteck Wee

Functional encryption is an emerging paradigm for public-key encryption that enables fine-grained control of access to encrypted data. In this work, we present new lower bounds and impossibility results on functional encryption, as well as new perspectives on security definitions. Our main contributions are as follows: We show that functional encryption schemes that satisfy even a weak (non-adaptive) simulation-based security notion are impossible to construct in general. This is the first impossibility result that exploits unbounded collusions in an essential way. In particular, we show that there are no such functional encryption schemes for the class of weak pseudo-random functions (and more generally, for any class of incompressible functions). More quantitatively, our technique also gives us a lower bound for functional encryption schemes secure against bounded collusions. To be secure against q collusions, we show that the ciphertext in any such scheme must have size Ω(q). We put forth and discuss a simulation-based notion of security for functional encryption, with an unbounded simulator (called USIM). We show that this notion interpolates indistinguishability and simulation-based security notions, and is inspired by results and barriers in the zero-knowledge and multi-party computation literature.


international cryptology conference | 2016

Fully Secure Functional Encryption for Inner Products, from Standard Assumptions

Shweta Agrawal; Benoît Libert; Damien Stehlé

Functional encryption is a modern public-key paradigm where a master secret key can be used to derive sub-keys


information theory workshop | 2011

Secrecy using compressive sensing

Shweta Agrawal; Sriram Vishwanath


international symposium on information theory | 2009

On the secrecy rate of interference networks using structured codes

Shweta Agrawal; Sriram Vishwanath

SK_F


international symposium on information theory | 2016

Adaptive protocols for interactive communication

Shweta Agrawal; Ran Gelles; Amit Sahai


international conference on the theory and application of cryptology and information security | 2013

On Continual Leakage of Discrete Log Representations

Shweta Agrawal; Yevgeniy Dodis; Vinod Vaikuntanathan; Daniel Wichs

associated with certain functions F in such a way that the decryption operation reveals FM, if M is the encrypted message, and nothing else. Recently, Abdalla et al. gave simple and efficient realizations of the primitive for the computation of linear functions on encrypted data: given an encryption of a vector


public key cryptography | 2015

On the Practical Security of Inner Product Functional Encryption

Shashank Agrawal; Shweta Agrawal; Saikrishna Badrinarayanan; Abishek Kumarasubramanian; Manoj Prabhakaran; Amit Sahai

Collaboration


Dive into the Shweta Agrawal's collaboration.

Top Co-Authors

Avatar

Amit Sahai

University of California

View shared research outputs
Top Co-Authors

Avatar

Vinod Vaikuntanathan

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Xavier Boyen

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sriram Vishwanath

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Damien Stehlé

École normale supérieure de Lyon

View shared research outputs
Top Co-Authors

Avatar

Hoeteck Wee

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Abhik Kumar Das

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge