Pages that link to "Item:Q5458590"
From MaRDI portal
The following pages link to Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products (Q5458590):
Displayed 50 items.
- Generalized closest substring encryption (Q300391) (← links)
- Spatial encryption supporting non-monotone access structure (Q404924) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Strongly full-hiding inner product encryption (Q511916) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- Generic construction of designated tester public-key encryption with keyword search (Q713419) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Revocable hierarchical identity-based encryption via history-free approach (Q906383) (← links)
- Proxy re-encryption with keyword search (Q985079) (← links)
- Impossibility of simulation secure functional encryption even with random oracles (Q1629443) (← links)
- Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813) (← links)
- A novel model for lattice-based authorized searchable encryption with special keyword (Q1665334) (← links)
- Functional encryption for computational hiding in prime order groups via pair encodings (Q1692153) (← links)
- Dual trapdoor identity-based encryption with keyword search (Q1701741) (← links)
- Adaptively simulation-secure attribute-hiding predicate encryption (Q1710619) (← links)
- Improved inner-product encryption with adaptive security and full attribute-hiding (Q1710620) (← links)
- Practical fully secure unrestricted inner product functional encryption modulo \(p\) (Q1710625) (← links)
- Minimizing locality of one-way functions via semi-private randomized encodings (Q1747656) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Robust encryption (Q1753165) (← links)
- Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis (Q1787193) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- An efficient CCA-secure access control encryption for any policy (Q2057135) (← links)
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption (Q2057139) (← links)
- Generic negation of pair encodings (Q2061950) (← links)
- Functional encryption for set intersection in the multi-client setting (Q2068378) (← links)
- Efficient fully CCA-secure predicate encryptions from pair encodings (Q2070257) (← links)
- Functional encryption for attribute-weighted sums from \(k\)-Lin (Q2096503) (← links)
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE (Q2096618) (← links)
- Revocable hierarchical attribute-based signatures from lattices (Q2096621) (← links)
- Zero-knowledge proofs for committed symmetric Boolean functions (Q2118554) (← links)
- A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency (Q2124234) (← links)
- Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin (Q2139632) (← links)
- Multi-input quadratic functional encryption from pairings (Q2139634) (← links)
- Cross-domain attribute-based access control encryption (Q2149810) (← links)
- CCA-secure ABE using tag and pair encoding (Q2152061) (← links)
- Simpler constructions of asymmetric primitives from obfuscation (Q2152062) (← links)
- A privacy-preserving multi-keyword search approach in cloud computing (Q2152914) (← links)
- Dynamic collusion bounded functional encryption from identity-based encryption (Q2170069) (← links)
- Predicate encryption from bilinear maps and one-sided probabilistic rank (Q2175910) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters (Q2200685) (← links)
- Functional broadcast encryption with applications to data sharing for cloud storage (Q2224865) (← links)
- Doubly spatial encryption from DBDH (Q2250446) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- A multi-authority approach to various predicate encryption types (Q2291666) (← links)
- Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing (Q2292920) (← links)