Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation

From MaRDI portal
Revision as of 02:52, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3562910

DOI10.1007/978-3-642-13013-7_23zbMath1281.94013OpenAlexW1769443955MaRDI QIDQ3562910

Benoît Libert, Nuttapong Attrapadung

Publication date: 28 May 2010

Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_23



Related Items

Public-Key Puncturable Encryption: Modular and Compact Constructions, Towards semantically secure outsourcing of association rule mining on categorical data, Cross-domain attribute-based access control encryption, Generic constructions for fully secure revocable attribute-based encryption, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Spatial encryption supporting non-monotone access structure, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Attribute-based signatures for range of inner product and its applications, Attribute-based encryption schemes with constant-size ciphertexts, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts, Direct computation of branching programs and its applications to more efficient lattice-based cryptography, The relation and transformation between hierarchical inner product encryption and spatial encryption, Compact (Targeted Homomorphic) Inner Product Encryption from LWE, Anonymous spatial encryption under affine space delegation functionality with full security, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Doubly spatial encryption from DBDH, Improved (Hierarchical) Inner-Product Encryption from Lattices, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, Simplifying Design and Analysis of Complex Predicate Encryption Schemes, Predicate signatures from pair encodings via dual system proof technique, Leakage-Resilient Functional Encryption via Pair Encodings, Optimal broadcast encryption from pairings and LWE, More Efficient Constructions for Inner-Product Encryption, Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost, Anonymous Encryption with Partial-Order Subset Delegation Functionality, Generic negation of pair encodings, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Attribute-Based Encryption for Range Attributes, Efficient fully CCA-secure predicate encryptions from pair encodings, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting