##### Professional Activities

Below are some professional activities I am involved in.

#### Organizing Workshops and Conferences.

- Manoj Prabhakaran and I are organizing
TCC, 2018 in gorgeous Goa! Send your best papers!
- Vinod Vaikuntanathan and I organized a workshop called Lattice Algorithms and Cryptography in IIT Kanpur, on 15th Dec 2017.
- I organized a workshop Recent Advances in Cryptography in IIT Delhi on 18th and 19th Dec, 2014.

#### Program Committees.

I have served/ am serving on the following program committees: TCC, 2018, CRYPTO 2018, PKC 2018, STACS 2018, ISC 2017, CRYPTO 2017, Asiacrypt 2017, Indocrypt 2017, CCS 2016, Eurocrypt 2016, SCN 2016, Indocrypt 2015, PKC 2015, ACNS 2015.

##### Publications and Preprints.

- New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation. Shweta Agrawal.

Manuscript, 2018. - Encryption with Untrusted Keys: Security against Chosen Objects Attack. Shashank Agrawal, Shweta Agrawal and Manoj Prabhakaran.

Manuscript, 2018. - Wiretap Polar Codes in Encryption Schemes Based on Learning with Errors Problem. Aswin Rajagopalan, Andrew Thangaraj and Shweta Agrawal.

In Proceedings of IEEE International Symposium of Information Theory (ISIT), 2018. - Functional Encryption for Bounded Collusions, Revisited.
Shweta Agrawal and Alon Rosen.

In Proceedings of the Theory of Cryptography Conference (TCC), 2017. - Efficient Public Trace-and-Revoke from Standard Assumptions. Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle and Shota Yamada. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2017.
- Stronger Security for Reusable Garbled Circuits, New Definitions and Attacks. Shweta Agrawal.

In Proceedings of Crypto, 2017. - Reusable Garbled Deterministic Finite Automata from Learning with Errors.
Shweta Agrawal and Ishaan Preet Singh.

In Proceedings of ICALP, 2017. - Privacy and Security of Aadhaar.
Shweta Agrawal, Subhashis Banerjee and Subodh Sharma.

In Economic and Political Weekly, 2017. This article received some press coverage, see this and this. The Wire also carried a summary of this work.

- Fully Secure Functional Encryption for Linear Functions from Standard Assumptions.
Shweta Agrawal, Benoit Libert and Damien Stehle.

In Proceedings of Crypto, 2016. - Adaptive protocols for Interactive Communication.
Shweta Agrawal, Ran Gelles and Amit Sahai.

In Proceedings of International Symposium of Information Theory (ISIT), 2016. - Statistical Randomized Encodings: A Complexity Theoretic View. Shweta Agrawal, Yuval Ishai, Dakshita Khurana and Anat Paskin-Cherniavsky.

In Proceedings of ICALP, 2015. - Towards a Unified Theory of Cryptographic Agents.
Shashank Agrawal, Shweta Agrawal and Manoj Prabhakaran.

In Proceedings of Eurocrypt, 2015. - On the Practical Security of Inner Product Functional Encryption.
Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran and Amit Sahai.

In Proceedings of Public Key Cryptography (PKC), 2015. - Sampling Discrete Gaussians Efficiently and Obliviously.
Shweta Agrawal, Craig Gentry, Shai Halevi and Amit Sahai.

In Proceedings of Asiacrypt, 2013. - Functional Encryption: New Perspectives and Lower Bounds.
Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan and Hoeteck Wee.

In Proceedings of Crypto, 2013. - On Continual Leakage of Discrete Log Representations. Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs.

In Proceedings of Asiacrypt, 2013. - Broad New Impossibility Results for Secure Concurrent Composition. Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai.

In Proceedings of Crypto 2012. - Fuzzy Identity Based Encryption from Lattices. Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris and Hoeteck Wee.

In Proceedings of Public Key Cryptography (PKC) 2012. - Functional Encryption for Inner Product Predicates from Learning with Errors. Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan.

In Proceedings of Asiacrypt 2011. - Secrecy using Compressive Sensing. Shweta Agrawal, Sriram Vishwanath.

In Proceedings of Information Theory Workshop, 2011. - Lattice Basis Delegation in Fixed Dimension and Shorter Ciphertext HIBE. Shweta Agrawal, Dan Boneh, Xavier Boyen.

In Proceedings of CRYPTO 2010. - Efficient Lattice (H)IBE in the Standard Model. Shweta Agrawal, Dan Boneh,
Xavier Boyen.

In Proceedings of Eurocrypt, 2010. - Lattice IBE in the Standard Model. Shweta Agrawal and Xavier Boyen.

Tech. Report. - On Traceback in Dynamic Networks. Abhik Das, Shweta Agrawal, Sriram Vishwanath.

In Proceedings of International Symposium of Information Theory, 2010. - Preventing Pollution Attacks in Multi-Source Network Coding. Shweta
Agrawal, Dan Boneh, Xavier Boyen and David Freeman.

In Proceedings of Public Key Cryptography (PKC), 2010. - Homomorphic MACs: MAC-Based Integrity for Network Coding. Shweta Agrawal, Dan Boneh.

In Proceedings of Applied Cryptography and Network Security, 2009. - On the Secrecy Rate of Interference Networks using structured codes. Shweta Agrawal, Sriram Vishwanath.

In Proceedings of International Symposium of Information Theory, 2009. - Network Coding using Unital Modules over Rings. Shweta Agrawal, Sriram Vishwanath.

In Proceedings of Allerton, 2008.

##### Miscellaneous

#### Theory Seminar

We are running a seminar series for the Theory group: This is the webpage. Join us if interested!

#### Information about grants

If only for my own sake, I put together some useful pointers to travel and collaboration grants that professors in India can apply for. Here is the link.