Fuzzy Identity-Based Encryption
From MaRDI portal
Publication:5385745
DOI10.1007/11426639_27zbMath1137.94355OpenAlexW1498316612MaRDI QIDQ5385745
Publication date: 6 May 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11426639_27
Related Items (only showing first 100 items - show all)
An efficient IBE scheme with tight security reduction in the random oracle model ⋮ Cryptanalysis of a CP-ABE scheme with policy in normal forms ⋮ A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency ⋮ A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption ⋮ (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps ⋮ On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate ⋮ Upgrading to functional encryption ⋮ Impossibility of simulation secure functional encryption even with random oracles ⋮ FE and iO for Turing machines from minimal assumptions ⋮ Generalized closest substring encryption ⋮ Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin ⋮ Functional encryption for Turing machines with dynamic bounded collusion from LWE ⋮ Blind attribute-based encryption and oblivious transfer with fine-grained access control ⋮ Attribute-based access control for inner product functional encryption from LWE ⋮ Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure ⋮ Optimizing registration based encryption ⋮ Cross-domain attribute-based access control encryption ⋮ Efficient attribute-based proxy re-encryption with constant size ciphertexts ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Identity-based data storage scheme with anonymous key generation in fog computing ⋮ Unbounded ABE via bilinear entropy expansion, revisited ⋮ Anonymous IBE, leakage resilience and circular security from new assumptions ⋮ On the security of joint signature and encryption revisited ⋮ A provable secure fuzzy identity based signature scheme ⋮ A novel model for lattice-based authorized searchable encryption with special keyword ⋮ A secure ciphertext self-destruction scheme with attribute-based encryption ⋮ Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption ⋮ Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications ⋮ Fully secure revocable attribute-based encryption ⋮ Functional encryption for computational hiding in prime order groups via pair encodings ⋮ Attribute-based encryption schemes with constant-size ciphertexts ⋮ Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security ⋮ Revocable hierarchical identity-based encryption via history-free approach ⋮ Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing ⋮ Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing ⋮ Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage ⋮ Accountable authority key policy attribute-based encryption ⋮ A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Improved inner-product encryption with adaptive security and full attribute-hiding ⋮ Decentralized multi-client functional encryption for inner product ⋮ Practical fully secure unrestricted inner product functional encryption modulo \(p\) ⋮ Chosen ciphertext secure fuzzy identity based encryption without ROM ⋮ An efficient key-policy attribute-based encryption scheme with constant ciphertext length ⋮ Functional encryption for cubic polynomials and implementation ⋮ Adaptable key-policy attribute-based encryption with time interval ⋮ Fine-grained searchable encryption in multi-user setting ⋮ An efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control system ⋮ Minimizing locality of one-way functions via semi-private randomized encodings ⋮ Strongly full-hiding inner product encryption ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Computational friendly attribute-based encryptions with short ciphertext ⋮ Verifiability-based conversion from CPA to CCA-secure predicate encryption ⋮ Research on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation ⋮ Flexible attribute-based proxy re-encryption for efficient data sharing ⋮ Fuzzy matching: multi-authority attribute searchable encryption without central authority ⋮ Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation ⋮ Efficient attribute-based encryption with attribute revocation for assured data deletion ⋮ Key updating technique in identity-based encryption ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Hidden attribute-based signatures without anonymity revocation ⋮ Functional encryption for cascade automata ⋮ Revocable hierarchical identity-based encryption ⋮ Secure threshold multi authority attribute based encryption without a central authority ⋮ Extensions of access structures and their cryptographic applications ⋮ An expressive and provably secure ciphertext-policy attribute-based encryption ⋮ Attribute-based key-insulated signature and its applications ⋮ Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts ⋮ Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs ⋮ A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system ⋮ Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps ⋮ SEMD: secure and efficient message dissemination with policy enforcement in VANET ⋮ Attribute-based fuzzy identity access control in multicloud computing environments ⋮ Expressive attribute-based keyword search with constant-size ciphertext ⋮ Simple and efficient FE for quadratic functions ⋮ Tag-based ABE in prime-order groups via pair encoding ⋮ Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism ⋮ Combiners for functional encryption, unconditionally ⋮ Adaptively secure ABE for DFA from \(k\)-Lin and more ⋮ Non-interactive zero knowledge from sub-exponential DDH ⋮ Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} ⋮ Unbounded multi-party computation from learning with errors ⋮ Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification ⋮ Non-interactive anonymous router ⋮ Fully secure ABE with outsourced decryption against chosen ciphertext attack ⋮ Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption ⋮ Master-key KDM-secure ABE via predicate encoding ⋮ Generic negation of pair encodings ⋮ BETA: biometric-enabled threshold authentication ⋮ Steel: composable hardware-based stateful and randomised functional encryption ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ Attribute-based signcryption scheme based on linear codes ⋮ Improvement of an outsourced attribute-based encryption scheme ⋮ A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation ⋮ Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes ⋮ Verifiable registration-based encryption ⋮ Functional encryption for attribute-weighted sums from \(k\)-Lin ⋮ Amplifying the security of functional encryption, unconditionally ⋮ Dynamic decentralized functional encryption
This page was built for publication: Fuzzy Identity-Based Encryption