More Efficient Constructions for Inner-Product Encryption (Q2822673): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Hierarchical) Identity-Based Encryption from Affine Message Authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-Based Functional Encryption on Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18--22, 2013. Proceedings, Part II / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Dual System ABE in Prime-Order Groups via Predicate Encodings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-Based Encryption for Circuits from Multilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-based encryption for circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual-System Simulation-Soundness with Applications to UC-PAKE and More / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques / rank
 
Normal rank
Property / cites work
 
Property / cites work: Homomorphic Encryption and Signatures from Vector Decomposition / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical Predicate Encryption for Inner-Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: More Efficient Constructions for Inner-Product Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient (Anonymous) Compact HIBE from Standard Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Dual System Encryption via Predicate Encodings / rank
 
Normal rank

Latest revision as of 16:18, 12 July 2024

scientific article
Language Label Description Also known as
English
More Efficient Constructions for Inner-Product Encryption
scientific article

    Statements

    More Efficient Constructions for Inner-Product Encryption (English)
    0 references
    0 references
    4 October 2016
    0 references
    0 references
    inner-product encryption
    0 references
    attribute-hiding
    0 references
    constant-size ciphertexts
    0 references
    quasi-adaptive non-interactive zero knowledge proofs
    0 references
    0 references