Pages that link to "Item:Q3562910"
From MaRDI portal
The following pages link to Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation (Q3562910):
Displayed 33 items.
- Spatial encryption supporting non-monotone access structure (Q404924) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Predicate signatures from pair encodings via dual system proof technique (Q2009416) (← links)
- Optimal broadcast encryption from pairings and LWE (Q2055600) (← links)
- Generic negation of pair encodings (Q2061950) (← links)
- Efficient fully CCA-secure predicate encryptions from pair encodings (Q2070257) (← links)
- Cross-domain attribute-based access control encryption (Q2149810) (← links)
- Generic constructions for fully secure revocable attribute-based encryption (Q2167729) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- Doubly spatial encryption from DBDH (Q2250446) (← links)
- The relation and transformation between hierarchical inner product encryption and spatial encryption (Q2448081) (← links)
- Towards semantically secure outsourcing of association rule mining on categorical data (Q2629963) (← links)
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice (Q2678984) (← links)
- Direct computation of branching programs and its applications to more efficient lattice-based cryptography (Q2698337) (← links)
- Leakage-Resilient Functional Encryption via Pair Encodings (Q2817484) (← links)
- More Efficient Constructions for Inner-Product Encryption (Q2822673) (← links)
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys (Q2827708) (← links)
- Attribute-Based Encryption for Range Attributes (Q2827709) (← links)
- Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost (Q3092350) (← links)
- Anonymous Encryption with Partial-Order Subset Delegation Functionality (Q3092355) (← links)
- Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting (Q3104695) (← links)
- Compact (Targeted Homomorphic) Inner Product Encryption from LWE (Q3297486) (← links)
- Improved (Hierarchical) Inner-Product Encryption from Lattices (Q4916012) (← links)
- Public-Key Puncturable Encryption: Modular and Compact Constructions (Q5041162) (← links)
- Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits (Q5738750) (← links)
- Simplifying Design and Analysis of Complex Predicate Encryption Schemes (Q5738892) (← links)
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting (Q6124593) (← links)
- Attribute-based signatures for range of inner product and its applications (Q6134229) (← links)
- Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts (Q6205019) (← links)