Expository Talks and Writings
 Building Cryptography for Big Data. Invited talk at Women in Computing seminar, University of Michigan. Here are the slides.
 Recent Progress and Challenges in Lattice Based Cryptography. Invited talk at Latincrypt, 2021. Here are the slides.
 Mentoring videos (about all aspects of research including gender issues) as part of a larger mentoring event at Crypto, 2021.
 Cryptography: The Jugalbandi (Duet) Of Structure and Randomness. Distinguished lecture at TIFR's Vigyan Vidushi, 2021. Here are the slides.
 Short Overview of Post Quantum Cryptography. Here are the slides.
 iO via Functional Encryption: Techniques and Challenges from LWE.
 Unlikely Friendships: The Fruitful Interplay of Cryptographic Assumptions. Invited Talk at Asiacrypt, 2020.
 The Unlikely Friendship of Lattices and Elliptic Curves.
 Lattice Trapdoors: A Survey.
 How to Use Lattice Trapdoors: IBE, ABE and More.
 Post Quantum Cryptography: A Very Gentle Introduction (Book Chapter).
 Keeping secrets in a quantum world and going beyond. Layperson's article about post quantum cryptography.
 Post Quantum Cryptography: Challenges, Opportunities and Beyond. Outreach talk to college students.
Publications and Preprints
 kSUM in the Sparse Regime.
Shweta Agrawal, Sagnik Saha, Nikolaj Schwartzbach, Akhil Vanukuri, Prashant Nalini Vasudevan.
Manuscript. 
CASE: A new frontier in PublicKey Authenticated Encryption.
Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath and Jayesh Singla.
In Proceedings of TCC, 2023.

AttributeBased MultiInput FE (and more) for AttributeWeighted Sums.
Shweta Agrawal, Anshu Yadav and Junichi Tomida.
In Proceedings of Crypto, 2023.

Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE.
Shweta Agrawal, Melissa Rossi, Anshu Yadav and Shota Yamada.
In Proceedings of Crypto, 2023.

Quadratic Functional Encryption for Secure Training in Vertical Federated Learning.
Shuangyi Chen, Anuja Modi, Shweta Agrawal and Ashish Khisti.
In Proceedings of IEEE International Symposium on Information Theory (ISIT), 2023. 
Trace and Revoke with Optimal Parameters from Polynomial Hardness.
Shweta Agrawal, Simran Kumari, Anshu Yadav, and Shota Yamada.
In Proceedings of Eurocrypt, 2023.  Public Key Encryption with Secure Key Leasing
Shweta Agrawal and Fuyuki Kitagawa and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa.
In Proceedings of Eurocrypt, 2023.  MultiInput Quadratic Functional Encryption: Stronger Security, Broader Functionality.
Shweta Agrawal and Rishab Goyal and Junichi Tomida.
In Proceedings of the Theory of Cryptography Conference (TCC), 2022.  Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
Shweta Agrawal and Fuyuki Kitagawa and Anuja Modi and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa.
In Proceedings of the Theory of Cryptography Conference (TCC), 2022.  Practical, RoundOptimal
LatticeBased Blind Signatures.
Shweta Agrawal and Elena Kirshanova and Damien Stehle and Anshu Yadav.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2022.

MultiInput Attribute Based Encryption and Predicate Encryption.
Shweta Agrawal and Anshu Yadav and Shota Yamada.
In Proceedings of Crypto, 2022.
 RoundOptimal LatticeBased Threshold Signatures, Revisited.
Shweta Agrawal and Damien Stehle and Anshu Yadav.
In Proceedings of EATCS International Colloquium on Automata, Languages, and Programming (ICALP), 2022.
 Cryptanalysis of Boyen's AttributeBased Encryption Scheme in TCC 2013.
Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada.
In Designs, Codes and Cryptography, 2022 .  Multiparty Functional Encryption.
Shweta Agrawal and Rishab Goyal and Junichi Tomida.
In Proceedings of Theory of Cryptography Conference (TCC), 2021.  Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.
Shweta Agrawal and Monosij Maitra and Narasimha Sai Vempati and Shota Yamada.
In Proceedings of Crypto, 2021.  Deniable Fully Homomorphic Encryption from LWE.
Shweta Agrawal and Shafi Goldwasser and Saleet Mossel.
In Proceedings of Crypto, 2021.  MultiInput Quadratic Functional Encryption from Pairings.
Shweta Agrawal and Rishab Goyal and Junichi Tomida.
In Proceedings of Crypto, 2021.  Secure Computation from OneWay Noisy Communication, or, AntiCorrelation via AntiConcentration.
Shweta Agrawal and Yuval Ishai and Eyal Kushilevitz and Varun Narayanan and Manoj Prabhakaran and Vinod M. Prabhakaran and Alon Rosen.
In Proceedings of Crypto, 2021.  CPABE for Circuits (and more) in the Symmetric Key Setting.
Shweta Agrawal and Shota Yamada.
In Proceedings of Theory of Cryptography Conference (TCC), 2020. 
Optimal Broadcast Encryption from Pairings and LWE in the Standard Model.
Shweta Agrawal and Daniel Wichs and Shota Yamada.
In Proceedings of Theory of Cryptography Conference (TCC), 2020.  Cryptography from OneWay Communication: On Completeness of Finite Channels.
Shweta Agrawal and Yuval Ishai and Eyal Kushilevitz and Varun Narayanan and Manoj M. Prabhakaran and Vinod M. Prabhakaran and Alon Rosen.
In proceedings of Asiacrypt, 2020.  A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing.
Rachit Garg, Nishant Kumar, Shweta Agrawal and Manoj Prabhakaran.
In proceedings of European Symposium on Research in Computer Security (ESORICS), 2020.  Optimal Broadcast Encryption from Pairings and LWE.
Shweta Agrawal and Shota Yamada.
In proceedings of Eurocrypt, 2020.
Best Paper Award.  Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE.
Shweta Agrawal and Alice PelletMary.
In proceedings of Eurocrypt, 2020.  Adaptive Simulation Security for Inner Product Functional Encryption.
Shweta Agrawal, Benoit Libert, Monosij Maitra and Radu Titiu.
In proceedings of Public Key Cryptography (PKC), 2020.  Ad hoc MultiInput Functional Encryption.
Shweta Agrawal, Michael Clear, Ophir Frieder, Sanjam Garg, Adam O'Neill and Justin Thaler.
In Proceedings of Innovations in Theoretical Computer Science (ITCS), 2020.  Attribute Based Encryption for Deterministic Finite Automata from DLIN.
Shweta Agrawal, Monosij Maitra and Shota Yamada.
In proceedings of Theory of Cryptography Conference (TCC), 2019.  Attribute Based Encryption (and more) for Nondeterministic Finite Automata from Learning With Errors.
Shweta Agrawal, Monosij Maitra and Shota Yamada.
In proceedings of Crypto, 2019.  Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation.
Shweta Agrawal.
In proceedings of Eurocrypt 2019.  Post Quantum Cryptography: A Very Gentle Introduction (Book Chapter).
Shweta Agrawal.
In Directions, 2019, IIT Kanpur Press.  Functional Encryption and Indistinguishability Obfuscation for Turing Machines from minimal assumptions.
Shweta Agrawal and Monosij Maitra.
In proceedings of Theory of Cryptography Conference (TCC), 2018.  Wiretap Polar Codes in Encryption Schemes Based on Learning with Errors Problem.
Aswin Rajagopalan, Andrew Thangaraj and Shweta Agrawal.
In Proceedings of IEEE International Symposium of Information Theory (ISIT), 2018.  Functional Encryption for Bounded Collusions, Revisited.
Shweta Agrawal and Alon Rosen.
In Proceedings of the Theory of Cryptography Conference (TCC), 2017.  Efficient Public TraceandRevoke from Standard Assumptions.
Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehle and Shota Yamada.
In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2017.  Stronger Security for Reusable Garbled Circuits, New Definitions and Attacks.
Shweta Agrawal.
In Proceedings of Crypto, 2017.  Reusable Garbled Deterministic Finite Automata from Learning with Errors.
Shweta Agrawal and Ishaan Preet Singh.
In Proceedings of ICALP, 2017.  Privacy and Security of Aadhaar.
Shweta Agrawal, Subhashis Banerjee and Subodh Sharma.
In Economic and Political Weekly, 2017. This article received some press coverage, see this and this. The Wire also carried a summary of this work.
 Fully Secure Functional Encryption for Linear Functions from Standard Assumptions.
Shweta Agrawal, Benoit Libert and Damien Stehle.
In Proceedings of Crypto, 2016.  Adaptive protocols for Interactive Communication.
Shweta Agrawal, Ran Gelles and Amit Sahai.
In Proceedings of International Symposium of Information Theory (ISIT), 2016.  Statistical Randomized Encodings: A Complexity Theoretic View.
Shweta Agrawal, Yuval Ishai, Dakshita Khurana and Anat PaskinCherniavsky.
In Proceedings of ICALP, 2015.  Towards a Unified Theory of Cryptographic Agents.
Shashank Agrawal, Shweta Agrawal and Manoj Prabhakaran.
In Proceedings of Eurocrypt, 2015.  On the Practical Security of Inner Product Functional Encryption.
Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran and Amit Sahai.
In Proceedings of Public Key Cryptography (PKC), 2015.  Sampling Discrete Gaussians Efficiently and Obliviously.
Shweta Agrawal, Craig Gentry, Shai Halevi and Amit Sahai.
In Proceedings of Asiacrypt, 2013.  Functional Encryption: New Perspectives and Lower Bounds.
Shweta Agrawal, Sergey Gorbunov, Vinod Vaikuntanathan and Hoeteck Wee.
In Proceedings of Crypto, 2013.  On Continual Leakage of Discrete Log Representations.
Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs.
In Proceedings of Asiacrypt, 2013.  Broad New Impossibility Results for Secure Concurrent Composition.
Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai.
In Proceedings of Crypto 2012.  Fuzzy Identity Based Encryption from Lattices.
Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris and Hoeteck Wee.
In Proceedings of Public Key Cryptography (PKC) 2012.  Functional Encryption for Inner Product Predicates from Learning with Errors.
Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan.
In Proceedings of Asiacrypt 2011.  Secrecy using Compressive Sensing.
Shweta Agrawal, Sriram Vishwanath.
In Proceedings of Information Theory Workshop, 2011.  Lattice Basis Delegation in Fixed Dimension and Shorter Ciphertext HIBE.
Shweta Agrawal, Dan Boneh, Xavier Boyen.
In Proceedings of Crypto 2010.  Efficient Lattice (H)IBE in the Standard Model.
Shweta Agrawal, Dan Boneh, Xavier Boyen.
In Proceedings of Eurocrypt, 2010.  Lattice IBE in the Standard Model.
Shweta Agrawal and Xavier Boyen.
Tech. Report.  On Traceback in Dynamic Networks.
Abhik Das, Shweta Agrawal, Sriram Vishwanath.
In Proceedings of International Symposium of Information Theory, 2010.  Preventing Pollution Attacks in MultiSource Network Coding.
Shweta Agrawal, Dan Boneh, Xavier Boyen and David Freeman.
In Proceedings of Public Key Cryptography (PKC), 2010.  Homomorphic MACs: MACBased Integrity for Network Coding.
Shweta Agrawal, Dan Boneh.
In Proceedings of Applied Cryptography and Network Security, 2009.  On the Secrecy Rate of Interference Networks using structured codes.
Shweta Agrawal, Sriram Vishwanath.
In Proceedings of International Symposium of Information Theory, 2009.  Network Coding using Unital Modules over Rings.
Shweta Agrawal, Sriram Vishwanath.
In Proceedings of Allerton, 2008.
Miscellaneous
Information about grants
If only for my own sake, I put together some useful pointers to travel and collaboration grants that professors in India can apply for. Here is the link.