Shweta Agrawal
University of Texas at Austin
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Shweta Agrawal.
applied cryptography and network security | 2009
Shweta Agrawal; Dan Boneh
Network coding has been shown to improve the capacity and robustness in networks. However, since intermediate nodes modify packets en-route, integrity of data cannot be checked using traditional MACs and checksums. In addition, network coded systems are vulnerable to pollution attacks where a single malicious node can flood the network with bad packets and prevent the receiver from decoding the packets correctly. Signature schemes have been proposed to thwart such attacks, but they tend to be too slow for online per-packet integrity. Here we propose a homomorphic MAC which allows checking the integrity of network coded data. Our homomorphic MAC is designed as a drop-in replacement for traditional MACs (such as HMAC) in systems using network coding.
international cryptology conference | 2010
Shweta Agrawal; Dan Boneh; Xavier Boyen
We present a technique for delegating a short lattice basis that has the advantage of keeping the lattice dimension unchanged upon delegation. Building on this result, we construct two new hierarchical identity-based encryption (HIBE) schemes, with and without random oracles. The resulting systems are very different from earlier lattice-based HIBEs and in some cases result in shorter ciphertexts and private keys. We prove security from classic lattice hardness assumptions.
international conference on the theory and application of cryptology and information security | 2011
Shweta Agrawal; David Mandell Freeman; Vinod Vaikuntanathan
We propose a lattice-based functional encryption scheme for inner product predicates whose security follows from the difficulty of the learning with errors (LWE) problem. This construction allows us to achieve applications such as range and subset queries, polynomial evaluation, and CNF/DNF formulas on encrypted data. Our scheme supports inner products over small fields, in contrast to earlier works based on bilinear maps. Our construction is the first functional encryption scheme based on lattice techniques that goes beyond basic identity-based encryption. The main technique in our scheme is a novel twist to the identity-based encryption scheme of Agrawal, Boneh and Boyen (Eurocrypt 2010). Our scheme is weakly attribute hiding in the standard model.
international cryptology conference | 2013
Shweta Agrawal; Sergey Gorbunov; Vinod Vaikuntanathan; Hoeteck Wee
Functional encryption is an emerging paradigm for public-key encryption that enables fine-grained control of access to encrypted data. In this work, we present new lower bounds and impossibility results on functional encryption, as well as new perspectives on security definitions. Our main contributions are as follows: We show that functional encryption schemes that satisfy even a weak (non-adaptive) simulation-based security notion are impossible to construct in general. This is the first impossibility result that exploits unbounded collusions in an essential way. In particular, we show that there are no such functional encryption schemes for the class of weak pseudo-random functions (and more generally, for any class of incompressible functions). More quantitatively, our technique also gives us a lower bound for functional encryption schemes secure against bounded collusions. To be secure against q collusions, we show that the ciphertext in any such scheme must have size Ω(q). We put forth and discuss a simulation-based notion of security for functional encryption, with an unbounded simulator (called USIM). We show that this notion interpolates indistinguishability and simulation-based security notions, and is inspired by results and barriers in the zero-knowledge and multi-party computation literature.
international cryptology conference | 2016
Shweta Agrawal; Benoît Libert; Damien Stehlé
Functional encryption is a modern public-key paradigm where a master secret key can be used to derive sub-keys
information theory workshop | 2011
Shweta Agrawal; Sriram Vishwanath
international symposium on information theory | 2009
Shweta Agrawal; Sriram Vishwanath
SK_F
international symposium on information theory | 2016
Shweta Agrawal; Ran Gelles; Amit Sahai
international conference on the theory and application of cryptology and information security | 2013
Shweta Agrawal; Yevgeniy Dodis; Vinod Vaikuntanathan; Daniel Wichs
associated with certain functions F in such a way that the decryption operation reveals FM, if M is the encrypted message, and nothing else. Recently, Abdalla et al. gave simple and efficient realizations of the primitive for the computation of linear functions on encrypted data: given an encryption of a vector
public key cryptography | 2015
Shashank Agrawal; Shweta Agrawal; Saikrishna Badrinarayanan; Abishek Kumarasubramanian; Manoj Prabhakaran; Amit Sahai