Doubly spatial encryption from DBDH
From MaRDI portal
Recommendations
- Fully secure doubly-spatial encryption under simple assumptions
- Functional encryption for inner product with full function privacy
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- Spatial encryption revisited: from delegatable multiple inner product encryption and more
- Spatial encryption under simpler assumption
Cites work
- scientific article; zbMATH DE number 2009960 (Why is no real title available?)
- Advances in Cryptology - EUROCRYPT 2004
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Bonsai trees, or how to delegate a lattice basis
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Efficient lattice (H)IBE in the standard model
- Fully secure doubly-spatial encryption under simple assumptions
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Functional encryption for inner product predicates from learning with errors
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- Fuzzy Identity-Based Encryption
- Generalized Identity Based and Broadcast Encryption Schemes
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-Based Encryption from the Weil Pairing
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Spatial encryption under simpler assumption
Cited in
(10)- Spatial encryption supporting non-monotone access structure
- Spatial encryption under simpler assumption
- Predicate signatures from pair encodings via dual system proof technique
- Efficient fully CCA-secure predicate encryptions from pair encodings
- Fully secure doubly-spatial encryption under simple assumptions
- CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption
- Unbounded non-zero inner product encryption
- Spatial encryption revisited: from delegatable multiple inner product encryption and more
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting
- Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
This page was built for publication: Doubly spatial encryption from DBDH
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2250446)