Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
From MaRDI portal
Publication:3582755
DOI10.1007/978-3-642-14623-7_11zbMath1280.94086OpenAlexW2161214158MaRDI QIDQ3582755
Katsuyuki Takashima, Tatsuaki Okamoto
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_11
Related Items (only showing first 100 items - show all)
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation ⋮ Fast, Compact, and Expressive Attribute-Based Encryption ⋮ Adaptive Simulation Security for Inner Product Functional Encryption ⋮ Generalized closest substring encryption ⋮ Predicate encryption supporting disjunctions, polynomial equations, and inner products ⋮ A New Functional Encryption for Multidimensional Range Query (Short Paper) ⋮ Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts ⋮ Revocable Decentralized Multi-Authority Functional Encryption ⋮ Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption ⋮ Predicate Encryption for Circuits from LWE ⋮ Bilinear Entropy Expansion from the Decisional Linear Assumption ⋮ Semi-adaptive Security and Bundling Functionalities Made Generic and Easy ⋮ Unbounded ABE via bilinear entropy expansion, revisited ⋮ On the security of joint signature and encryption revisited ⋮ Generic constructions for fully secure revocable attribute-based encryption ⋮ Anonymous and leakage resilient IBE and IPE ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ Rerandomizable signatures under standard assumption ⋮ Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption ⋮ Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption ⋮ Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 ⋮ Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups ⋮ (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin ⋮ Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin ⋮ Fully adaptive decentralized multi-authority \textsf{ABE} ⋮ Unbounded quadratic functional encryption and more from pairings ⋮ Multi-key and multi-input predicate encryption from learning with errors ⋮ Hierarchical identity-based inner product functional encryption ⋮ Pattern matching in encrypted stream from inner product encryption ⋮ Verifiable Functional Encryption ⋮ Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings ⋮ Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ Spatial encryption supporting non-monotone access structure ⋮ Shorter identity-based encryption via asymmetric pairings ⋮ A practical compiler for attribute-based encryption: new decentralized constructions and more ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey ⋮ Unbounded predicate inner product functional encryption from pairings ⋮ Functional encryption for computational hiding in prime order groups via pair encodings ⋮ Automated analysis of cryptographic assumptions in generic group models ⋮ ABE for circuits with constant-size secret keys and adaptive security ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ Attribute-based encryption schemes with constant-size ciphertexts ⋮ Unbounded dynamic predicate compositions in ABE from standard assumptions ⋮ Complexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting) ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ Fully secure unbounded zero inner product encryption with short ciphertexts and keys ⋮ Efficient attribute-based signature for monotone predicates ⋮ Adaptively simulation-secure attribute-hiding predicate encryption ⋮ Improved inner-product encryption with adaptive security and full attribute-hiding ⋮ The relation and transformation between hierarchical inner product encryption and spatial encryption ⋮ Expanded Framework for Dual System Encryption and Its Application ⋮ Compact (Targeted Homomorphic) Inner Product Encryption from LWE ⋮ Efficient Inner Product Encryption with Simulation-Based Security ⋮ Fast, compact, and expressive attribute-based encryption ⋮ Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security ⋮ Some Key Techniques on Pairing Vector Spaces ⋮ Strongly full-hiding inner product encryption ⋮ Computational friendly attribute-based encryptions with short ciphertext ⋮ An algebraic framework for Diffie-Hellman assumptions ⋮ Verifiability-based conversion from CPA to CCA-secure predicate encryption ⋮ Functional Encryption: Origins and Recent Developments ⋮ Decentralized Attribute-Based Signatures ⋮ Attribute-Based Encryption with Fast Decryption ⋮ Improved (Hierarchical) Inner-Product Encryption from Lattices ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits ⋮ Tightly Secure IBE Under Constant-Size Master Public Key ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe ⋮ An expressive and provably secure ciphertext-policy attribute-based encryption ⋮ Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ A Study of Pair Encodings: Predicate Encryption in Prime Order Groups ⋮ Algebraic Attacks Against Several Weak Variants of GVW’13 ABE ⋮ Implementing, and keeping in check, a DSL used in E-learning ⋮ Post-Quantum Constant-Round Group Key Exchange from Static Assumptions ⋮ Leakage-Resilient Functional Encryption via Pair Encodings ⋮ Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption ⋮ Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures ⋮ Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) ⋮ Tightly CCA-secure inner product functional encryption scheme ⋮ More Efficient Constructions for Inner-Product Encryption ⋮ Attribute Based Encryption with Direct Efficiency Tradeoff ⋮ Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost ⋮ A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ Attribute-Based Encryption for Range Attributes ⋮ Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ A new approach to practical function-private inner product encryption ⋮ Attribute-based encryption with adaptive policy ⋮ Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting ⋮ Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes ⋮ Heuristic counting of Kachisa-Schaefer-Scott curves ⋮ Attribute-based signatures for range of inner product and its applications
This page was built for publication: Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption