Generalized Identity Based and Broadcast Encryption Schemes
From MaRDI portal
Publication:3600391
DOI10.1007/978-3-540-89255-7_28zbMath1206.94054MaRDI QIDQ3600391
Publication date: 10 February 2009
Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_28
94A60: Cryptography
Related Items
Improved (Hierarchical) Inner-Product Encryption from Lattices, ACE with Compact Ciphertext Size and Decentralized Sanitizers, Minicrypt primitives with algebraic structure and applications, Spatial encryption supporting non-monotone access structure, Attribute-based encryption schemes with constant-size ciphertexts, Anonymous spatial encryption under affine space delegation functionality with full security, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Optimal subset-difference broadcast encryption with free riders, Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol, Identity-based broadcast encryption with continuous leakage resilience, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Efficient subtree-based encryption for fuzzy-entity data sharing, Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Generic negation of pair encodings, Efficient fully CCA-secure predicate encryptions from pair encodings, CCA-secure ABE using tag and pair encoding, Generic constructions for fully secure revocable attribute-based encryption, Attribute based encryption for deterministic finite automata from DLIN, Efficient traceable ring signature scheme without pairings, Forward-secure ID based digital signature scheme with forward-secure private key generator, Doubly spatial encryption from DBDH, Anonymous HIBE with short ciphertexts: full security in prime order groups, Computing on authenticated data, Wildcarded identity-based encryption, The relation and transformation between hierarchical inner product encryption and spatial encryption, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Attribute Based Encryption with Direct Efficiency Tradeoff, Attribute-Based Encryption for Range Attributes, Short Attribute-Based Signatures for Threshold Predicates, Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps, Traceable Identity-Based Group Signature, Anonymous Encryption with Partial-Order Subset Delegation Functionality, Conjunctive Broadcast and Attribute-Based Encryption, Adaptive-ID Secure Revocable Identity-Based Encryption, Asymmetric Group Key Agreement
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A forward-secure public-key encryption scheme
- Identity-Based Cryptosystems and Signature Schemes
- Conjunctive, Subset, and Range Queries on Encrypted Data
- ID-Based Blind Signature and Ring Signature from Pairings
- Hierarchical ID-Based Cryptography
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products