Generalized Identity Based and Broadcast Encryption Schemes

From MaRDI portal
Revision as of 04:47, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3600391


DOI10.1007/978-3-540-89255-7_28zbMath1206.94054MaRDI QIDQ3600391

Mike Hamburg, Dan Boneh

Publication date: 10 February 2009

Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_28


94A60: Cryptography


Related Items

Improved (Hierarchical) Inner-Product Encryption from Lattices, ACE with Compact Ciphertext Size and Decentralized Sanitizers, Minicrypt primitives with algebraic structure and applications, Spatial encryption supporting non-monotone access structure, Attribute-based encryption schemes with constant-size ciphertexts, Anonymous spatial encryption under affine space delegation functionality with full security, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Optimal subset-difference broadcast encryption with free riders, Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol, Identity-based broadcast encryption with continuous leakage resilience, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Efficient subtree-based encryption for fuzzy-entity data sharing, Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Generic negation of pair encodings, Efficient fully CCA-secure predicate encryptions from pair encodings, CCA-secure ABE using tag and pair encoding, Generic constructions for fully secure revocable attribute-based encryption, Attribute based encryption for deterministic finite automata from DLIN, Efficient traceable ring signature scheme without pairings, Forward-secure ID based digital signature scheme with forward-secure private key generator, Doubly spatial encryption from DBDH, Anonymous HIBE with short ciphertexts: full security in prime order groups, Computing on authenticated data, Wildcarded identity-based encryption, The relation and transformation between hierarchical inner product encryption and spatial encryption, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Attribute Based Encryption with Direct Efficiency Tradeoff, Attribute-Based Encryption for Range Attributes, Short Attribute-Based Signatures for Threshold Predicates, Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps, Traceable Identity-Based Group Signature, Anonymous Encryption with Partial-Order Subset Delegation Functionality, Conjunctive Broadcast and Attribute-Based Encryption, Adaptive-ID Secure Revocable Identity-Based Encryption, Asymmetric Group Key Agreement



Cites Work