Hierarchical Predicate Encryption for Inner-Products

From MaRDI portal
Revision as of 06:25, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3650694

DOI10.1007/978-3-642-10366-7_13zbMath1267.94089OpenAlexW1511513446MaRDI QIDQ3650694

Tatsuaki Okamoto, Katsuyuki Takashima

Publication date: 15 December 2009

Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_13




Related Items (52)

Adaptive Simulation Security for Inner Product Functional EncryptionGeneralized closest substring encryptionPredicate encryption supporting disjunctions, polynomial equations, and inner productsEfficient revocable identity-based encryption via subset difference methodsAchieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryptionEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsSpatial encryption supporting non-monotone access structureShorter identity-based encryption via asymmetric pairingsMulti-authority ABE for non-monotonic access structuresFunctional encryption for computational hiding in prime order groups via pair encodingsReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded settingIdentity-based matchmaking encryption from standard assumptionsA survey on functional encryptionSpatial encryption revisited: from delegatable multiple inner product encryption and morePublic key encryption with hierarchical authorized keyword searchShorter quasi-adaptive NIZK proofs for linear subspacesInner-product encryption under standard assumptionsImproved hidden vector encryption with short ciphertexts and tokensRevocable hierarchical identity-based encryption via history-free approachFully secure unbounded zero inner product encryption with short ciphertexts and keysAdaptively simulation-secure attribute-hiding predicate encryptionThe relation and transformation between hierarchical inner product encryption and spatial encryptionTransforming Hidden Vector Encryption Schemes from Composite to Prime Order GroupsCompact (Targeted Homomorphic) Inner Product Encryption from LWEEfficient Inner Product Encryption with Simulation-Based SecuritySome Key Techniques on Pairing Vector SpacesSelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyVerifiability-based conversion from CPA to CCA-secure predicate encryptionLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsRevocable Identity-Based Encryption Revisited: Security Model and ConstructionImproved (Hierarchical) Inner-Product Encryption from LatticesAnonymous HIBE with short ciphertexts: full security in prime order groupsProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsPredicate signatures from pair encodings via dual system proof techniqueFully secure functional encryption with a large class of relations from the decisional linear assumptionRevocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short CiphertextsConverting pairing-based cryptosystems from composite to prime order setting -- a comparative analysisCiphertext-policy hierarchical attribute-based encryption with short ciphertextsDéjà Q: Encore! Un Petit IBEFully Secure IBE with Tighter Reduction in Prime Order Bilinear GroupsMatch me if you can: matchmaking encryption and its applicationsSecret Handshakes with Dynamic Expressive Matching PolicyCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionMore Efficient Constructions for Inner-Product EncryptionAnonymous Encryption with Partial-Order Subset Delegation FunctionalityA Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order GroupsNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysEfficient fully CCA-secure predicate encryptions from pair encodingsA new approach to practical function-private inner product encryptionCiphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting







This page was built for publication: Hierarchical Predicate Encryption for Inner-Products