| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2012 | New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation | crypto | 443-460 |
| 2 | 2012 | Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices | pkc | 280-297 |
| 3 | 2011 | Functional Encryption for Inner Product Predicates from Learning with Errors | asiacrypt | 21-40 |
| 4 | 2010 | Preventing Pollution Attacks in Multi-Source Network Coding | eprint | online |
| 5 | 2010 | Preventing Pollution Attacks in Multi-source Network Coding | pkc | 161-176 |
| 6 | 2010 | Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE | crypto | 98-115 |
| 7 | 2010 | Efficient Lattice (H)IBE in the Standard Model | eurocrypt | 553-572 |
Coauthors of Shweta Agrawal |