Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice (Q2678984): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10623-022-01093-5 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W3204244463 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Study of Pair Encodings: Predicate Encryption in Prime Order Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simplifying Design and Analysis of Complex Predicate Encryption Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic negation of pair encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unbounded dynamic predicate compositions in attribute-based encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute Based Encryption with Direct Efficiency Tradeoff / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conjunctive Broadcast and Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unbounded dynamic predicate compositions in ABE from standard assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Updating key size estimations for pairings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4414287 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pairing-Friendly Elliptic Curves of Prime Order / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249633 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3840150 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical Identity Based Encryption with Constant Size Ciphertext / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conjunctive, Subset, and Range Queries on Encrypted Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Uber-Assumption Family / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-Based Functional Encryption on Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279677 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The random oracle methodology, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-authority Attribute Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another look at tightness. II: Practical issues in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Dual System ABE in Prime-Order Groups via Predicate Encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: ABE with tag made easy. Concise framework and new instantiations in prime-order groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unbounded ABE via bilinear entropy expansion, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully, (Almost) Tightly Secure IBE and Dual System Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Analysis of the Strong Diffie-Hellman Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Removing Escrow from Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Server-aided revocable attribute-based encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure integration of asymmetric and symmetric encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pairings for cryptographers / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-Based Encryption for Circuits from Multilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-Based Encryption for Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Proxy Re-encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A short-list of pairing-friendly curves resistant to special TNFS at the 128-bit security level / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant Size Ciphertexts in Threshold Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-Based Encryption with Fast Decryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Online/Offline Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: The random oracle model: a twenty-year retrospective / rank
 
Normal rank
Property / cites work
 
Property / cites work: Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bilinear Entropy Expansion from the Decisional Linear Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Making \textit{any} attribute-based encryption accountable, efficiently / rank
 
Normal rank
Property / cites work
 
Property / cites work: How Risky Is the Random-Oracle Model? / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decentralizing Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unbounded HIBE and Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques / rank
 
Normal rank
Property / cites work
 
Property / cites work: Why Proving HIBE Systems Secure Is Difficult / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority / rank
 
Normal rank
Property / cites work
 
Property / cites work: Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Succinct and adaptively secure ABE for ABP from \(k\)-Lin / rank
 
Normal rank
Property / cites work
 
Property / cites work: Time-based direct revocable ciphertext-policy attribute-based encryption with short revocation List / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decentralized policy-hiding ABE with receiver privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4736430 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Unbounded Inner-Product and Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decentralized Attribute-Based Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035737 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast, Compact, and Expressive Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption via Predicate Encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption / rank
 
Normal rank

Latest revision as of 07:52, 31 July 2024

scientific article
Language Label Description Also known as
English
Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
scientific article

    Statements

    Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice (English)
    0 references
    0 references
    0 references
    0 references
    18 January 2023
    0 references
    attribute-based encryption
    0 references
    access control
    0 references
    systematization of knowledge
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers