Fuzzy Identity-Based Encryption

From MaRDI portal
Revision as of 00:58, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5385745

DOI10.1007/11426639_27zbMath1137.94355OpenAlexW1498316612MaRDI QIDQ5385745

Amit Sahai, Brent Waters

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_27




Related Items (only showing first 100 items - show all)

An efficient IBE scheme with tight security reduction in the random oracle modelCryptanalysis of a CP-ABE scheme with policy in normal formsA tighter proof for CCA secure inner product functional encryption: genericity meets efficiencyA bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsOn the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rateUpgrading to functional encryptionImpossibility of simulation secure functional encryption even with random oraclesFE and iO for Turing machines from minimal assumptionsGeneralized closest substring encryptionBroadcast encryption with size \(N^{1/3}\) and more from \(k\)-LinFunctional encryption for Turing machines with dynamic bounded collusion from LWEBlind attribute-based encryption and oblivious transfer with fine-grained access controlAttribute-based access control for inner product functional encryption from LWEServer-aided revocable attribute-based encryption revised: multi-user setting and fully secureOptimizing registration based encryptionCross-domain attribute-based access control encryptionEfficient attribute-based proxy re-encryption with constant size ciphertextsAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceIdentity-based data storage scheme with anonymous key generation in fog computingUnbounded ABE via bilinear entropy expansion, revisitedAnonymous IBE, leakage resilience and circular security from new assumptionsOn the security of joint signature and encryption revisitedA provable secure fuzzy identity based signature schemeA novel model for lattice-based authorized searchable encryption with special keywordA secure ciphertext self-destruction scheme with attribute-based encryptionAchieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryptionSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsFully secure revocable attribute-based encryptionFunctional encryption for computational hiding in prime order groups via pair encodingsAttribute-based encryption schemes with constant-size ciphertextsEfficient bidirectional proxy re-encryption with direct chosen-ciphertext securityRevocable hierarchical identity-based encryption via history-free approachSuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingVerifiable outsourced ciphertext-policy attribute-based encryption in cloud computingMulti-authority attribute-based encryption access control scheme with policy hidden for cloud storageAccountable authority key policy attribute-based encryptionA new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionImproved inner-product encryption with adaptive security and full attribute-hidingDecentralized multi-client functional encryption for inner productPractical fully secure unrestricted inner product functional encryption modulo \(p\)Chosen ciphertext secure fuzzy identity based encryption without ROMAn efficient key-policy attribute-based encryption scheme with constant ciphertext lengthFunctional encryption for cubic polynomials and implementationAdaptable key-policy attribute-based encryption with time intervalFine-grained searchable encryption in multi-user settingAn efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control systemMinimizing locality of one-way functions via semi-private randomized encodingsStrongly full-hiding inner product encryptionSelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyComputational friendly attribute-based encryptions with short ciphertextVerifiability-based conversion from CPA to CCA-secure predicate encryptionResearch on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storageLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsDirectly revocable key-policy attribute-based encryption with verifiable ciphertext delegationFlexible attribute-based proxy re-encryption for efficient data sharingFuzzy matching: multi-authority attribute searchable encryption without central authorityRevocable attribute-based encryption with decryption key exposure resistance and ciphertext delegationEfficient attribute-based encryption with attribute revocation for assured data deletionKey updating technique in identity-based encryptionFully secure functional encryption with a large class of relations from the decisional linear assumptionHidden attribute-based signatures without anonymity revocationFunctional encryption for cascade automataRevocable hierarchical identity-based encryptionSecure threshold multi authority attribute based encryption without a central authorityExtensions of access structures and their cryptographic applicationsAn expressive and provably secure ciphertext-policy attribute-based encryptionAttribute-based key-insulated signature and its applicationsCiphertext-policy hierarchical attribute-based encryption with short ciphertextsPractical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofsA CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing systemFuzzy matching and direct revocation: a new CP-ABE scheme from multilinear mapsSEMD: secure and efficient message dissemination with policy enforcement in VANETAttribute-based fuzzy identity access control in multicloud computing environmentsExpressive attribute-based keyword search with constant-size ciphertextSimple and efficient FE for quadratic functionsTag-based ABE in prime-order groups via pair encodingForgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanismCombiners for functional encryption, unconditionallyAdaptively secure ABE for DFA from \(k\)-Lin and moreNon-interactive zero knowledge from sub-exponential DDHDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}Unbounded multi-party computation from learning with errorsIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationNon-interactive anonymous routerFully secure ABE with outsourced decryption against chosen ciphertext attackChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionMaster-key KDM-secure ABE via predicate encodingGeneric negation of pair encodingsBETA: biometric-enabled threshold authenticationSteel: composable hardware-based stateful and randomised functional encryptionEfficient fully CCA-secure predicate encryptions from pair encodingsAttribute-based signcryption scheme based on linear codesImprovement of an outsourced attribute-based encryption schemeA decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscationConstant-size ciphertexts in threshold attribute-based encryption without dummy attributesVerifiable registration-based encryptionFunctional encryption for attribute-weighted sums from \(k\)-LinAmplifying the security of functional encryption, unconditionallyDynamic decentralized functional encryption







This page was built for publication: Fuzzy Identity-Based Encryption