Hierarchical Predicate Encryption for Inner-Products
From MaRDI portal
Publication:3650694
DOI10.1007/978-3-642-10366-7_13zbMath1267.94089OpenAlexW1511513446MaRDI QIDQ3650694
Tatsuaki Okamoto, Katsuyuki Takashima
Publication date: 15 December 2009
Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_13
Related Items (52)
Adaptive Simulation Security for Inner Product Functional Encryption ⋮ Generalized closest substring encryption ⋮ Predicate encryption supporting disjunctions, polynomial equations, and inner products ⋮ Efficient revocable identity-based encryption via subset difference methods ⋮ Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption ⋮ Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption ⋮ Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings ⋮ Spatial encryption supporting non-monotone access structure ⋮ Shorter identity-based encryption via asymmetric pairings ⋮ Multi-authority ABE for non-monotonic access structures ⋮ Functional encryption for computational hiding in prime order groups via pair encodings ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ Identity-based matchmaking encryption from standard assumptions ⋮ A survey on functional encryption ⋮ Spatial encryption revisited: from delegatable multiple inner product encryption and more ⋮ Public key encryption with hierarchical authorized keyword search ⋮ Shorter quasi-adaptive NIZK proofs for linear subspaces ⋮ Inner-product encryption under standard assumptions ⋮ Improved hidden vector encryption with short ciphertexts and tokens ⋮ Revocable hierarchical identity-based encryption via history-free approach ⋮ Fully secure unbounded zero inner product encryption with short ciphertexts and keys ⋮ Adaptively simulation-secure attribute-hiding predicate encryption ⋮ The relation and transformation between hierarchical inner product encryption and spatial encryption ⋮ Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups ⋮ Compact (Targeted Homomorphic) Inner Product Encryption from LWE ⋮ Efficient Inner Product Encryption with Simulation-Based Security ⋮ Some Key Techniques on Pairing Vector Spaces ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Verifiability-based conversion from CPA to CCA-secure predicate encryption ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ Revocable Identity-Based Encryption Revisited: Security Model and Construction ⋮ Improved (Hierarchical) Inner-Product Encryption from Lattices ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps ⋮ Predicate signatures from pair encodings via dual system proof technique ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts ⋮ Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis ⋮ Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts ⋮ Déjà Q: Encore! Un Petit IBE ⋮ Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups ⋮ Match me if you can: matchmaking encryption and its applications ⋮ Secret Handshakes with Dynamic Expressive Matching Policy ⋮ Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) ⋮ Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption ⋮ More Efficient Constructions for Inner-Product Encryption ⋮ Anonymous Encryption with Partial-Order Subset Delegation Functionality ⋮ A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ A new approach to practical function-private inner product encryption ⋮ Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting
This page was built for publication: Hierarchical Predicate Encryption for Inner-Products