Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption

From MaRDI portal
Revision as of 02:59, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3582755

DOI10.1007/978-3-642-14623-7_11zbMath1280.94086OpenAlexW2161214158MaRDI QIDQ3582755

Katsuyuki Takashima, Tatsuaki Okamoto

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_11




Related Items (only showing first 100 items - show all)

Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of ComputationFast, Compact, and Expressive Attribute-Based EncryptionAdaptive Simulation Security for Inner Product Functional EncryptionGeneralized closest substring encryptionPredicate encryption supporting disjunctions, polynomial equations, and inner productsA New Functional Encryption for Multidimensional Range Query (Short Paper)Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size CiphertextsRevocable Decentralized Multi-Authority Functional EncryptionCommunication Complexity of Conditional Disclosure of Secrets and Attribute-Based EncryptionPredicate Encryption for Circuits from LWEBilinear Entropy Expansion from the Decisional Linear AssumptionSemi-adaptive Security and Bundling Functionalities Made Generic and EasyUnbounded ABE via bilinear entropy expansion, revisitedOn the security of joint signature and encryption revisitedGeneric constructions for fully secure revocable attribute-based encryptionAnonymous and leakage resilient IBE and IPEAttribute based encryption for deterministic finite automata from DLINRerandomizable signatures under standard assumptionAchieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryptionEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionCryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-LinCompact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-LinFully adaptive decentralized multi-authority \textsf{ABE}Unbounded quadratic functional encryption and more from pairingsMulti-key and multi-input predicate encryption from learning with errorsHierarchical identity-based inner product functional encryptionPattern matching in encrypted stream from inner product encryptionVerifiable Functional EncryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceSpatial encryption supporting non-monotone access structureShorter identity-based encryption via asymmetric pairingsA practical compiler for attribute-based encryption: new decentralized constructions and more(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyUnbounded predicate inner product functional encryption from pairingsFunctional encryption for computational hiding in prime order groups via pair encodingsAutomated analysis of cryptographic assumptions in generic group modelsABE for circuits with constant-size secret keys and adaptive securityReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded settingAttribute-based encryption schemes with constant-size ciphertextsUnbounded dynamic predicate compositions in ABE from standard assumptionsComplexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting)Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHFully secure unbounded zero inner product encryption with short ciphertexts and keysEfficient attribute-based signature for monotone predicatesAdaptively simulation-secure attribute-hiding predicate encryptionImproved inner-product encryption with adaptive security and full attribute-hidingThe relation and transformation between hierarchical inner product encryption and spatial encryptionExpanded Framework for Dual System Encryption and Its ApplicationCompact (Targeted Homomorphic) Inner Product Encryption from LWEEfficient Inner Product Encryption with Simulation-Based SecurityFast, compact, and expressive attribute-based encryptionCost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward SecuritySome Key Techniques on Pairing Vector SpacesStrongly full-hiding inner product encryptionComputational friendly attribute-based encryptions with short ciphertextAn algebraic framework for Diffie-Hellman assumptionsVerifiability-based conversion from CPA to CCA-secure predicate encryptionFunctional Encryption: Origins and Recent DevelopmentsDecentralized Attribute-Based SignaturesAttribute-Based Encryption with Fast DecryptionImproved (Hierarchical) Inner-Product Encryption from LatticesAnonymous HIBE with short ciphertexts: full security in prime order groupsDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsTightly Secure IBE Under Constant-Size Master Public KeyFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsFully secure functional encryption with a large class of relations from the decisional linear assumptionDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsUnbounded inner product functional encryption from bilinear mapsPractical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large UniverseAn expressive and provably secure ciphertext-policy attribute-based encryptionCiphertext-policy hierarchical attribute-based encryption with short ciphertextsUnbounded inner product functional encryption from bilinear mapsA Study of Pair Encodings: Predicate Encryption in Prime Order GroupsAlgebraic Attacks Against Several Weak Variants of GVW’13 ABEImplementing, and keeping in check, a DSL used in E-learningPost-Quantum Constant-Round Group Key Exchange from Static AssumptionsLeakage-Resilient Functional Encryption via Pair EncodingsChosen Ciphertext Secure Attribute-Based Encryption with Outsourced DecryptionAccountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access StructuresCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Tightly CCA-secure inner product functional encryption schemeMore Efficient Constructions for Inner-Product EncryptionAttribute Based Encryption with Direct Efficiency TradeoffEfficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-CostA Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order GroupsNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysAttribute-Based Encryption for Range AttributesCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityEfficient fully CCA-secure predicate encryptions from pair encodingsA new approach to practical function-private inner product encryptionAttribute-based encryption with adaptive policyCiphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user SettingConstant-size ciphertexts in threshold attribute-based encryption without dummy attributesHeuristic counting of Kachisa-Schaefer-Scott curvesAttribute-based signatures for range of inner product and its applications







This page was built for publication: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption