Unbounded ABE via bilinear entropy expansion, revisited
From MaRDI portal
Publication:1648812
DOI10.1007/978-3-319-78381-9_19zbMATH Open1423.94062OpenAlexW2795178971MaRDI QIDQ1648812FDOQ1648812
Authors: Jie Chen, Junqing Gong, L. Kowalczyk, Hoeteck Wee
Publication date: 9 July 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-78381-9_19
Recommendations
- Bilinear entropy expansion from the decisional linear assumption
- Unbounded HIBE and Attribute-Based Encryption
- Fully secure unbounded inner-product and attribute-based encryption
- Unbounded dynamic predicate compositions in ABE from standard assumptions
- Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
constant-size public parametersconstructions of unbounded attribute-based encryption (ABE) schemesstatic assumptions in bilinear groups
Cites Work
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Fuzzy Identity-Based Encryption
- Bit commitment using pseudorandomness
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Fully secure functional encryption with general relations from the decisional linear assumption
- Tools for simulating features of composite order bilinear groups in the prime order setting
- Non-malleability amplification
- Concurrent Non-malleable Commitments from Any One-Way Function
- New notions of security: achieving universal composability without trusted setup
- Title not available (Why is that?)
- A unified framework for concurrent security
- Theory of Cryptography
- Unbounded HIBE and Attribute-Based Encryption
- Fully secure unbounded inner-product and attribute-based encryption
- An algebraic framework for Diffie-Hellman assumptions
- On adaptively secure protocols
- Bounded-concurrent secure multi-party computation with a dishonest majority
- Bounded-concurrent secure two-party computation without setup assumptions
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- Lossy Trapdoor Functions and Their Applications
- Tightly CCA-secure encryption without pairings
- Waters signatures with optimal security reduction
- Dual System Encryption via Predicate Encodings
- Black-Box Constructions of Two-Party Protocols from One-Way Functions
- Theory of Cryptography
- Round-efficient black-box construction of composable multi-party computation
- Black-box constructions of composable protocols without set-up
- Round-optimal black-box two-party computation
- Partial garbling schemes and their applications
- Resettably sound zero-knowledge arguments from OWFs -- the (semi) black-box way
- Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
- Semi-adaptive attribute-based encryption and improved delegation for Boolean formula
- Improved dual system ABE in prime-order groups via predicate encodings
- Dual system encryption framework in prime-order groups via computational pair encodings
- Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
- Semi-adaptive security and bundling functionalities made generic and easy
- Bilinear entropy expansion from the decisional linear assumption
- A unified framework for UC from only OT
- Constant-round black-box construction of composable multi-party computation protocol
Cited In (33)
- Compact FE for unbounded attribute-weighted sums for logspace from SXDH
- GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs
- Fast, compact, and expressive attribute-based encryption
- Fast, compact, and expressive attribute-based encryption
- Unbounded HIBE with tight security
- Rerandomizable signatures under standard assumption
- A survey on functional encryption
- Improved fully adaptive decentralized MA-ABE for NC1 from MDDH
- Non-interactive zero-knowledge functional proofs
- Fully adaptive decentralized multi-authority \textsf{ABE}
- Unbounded inner product functional encryption from bilinear maps
- Unbounded inner product functional encryption from bilinear maps
- Public-key puncturable encryption: modular and compact constructions
- Compact \textsf{FE} for unbounded attribute-weighted sums for logspace from \textsf{SXDH}
- Bilinear entropy expansion from the decisional linear assumption
- Adaptively secure ABE for DFA from \(k\)-Lin and more
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)
- Attribute based encryption for deterministic finite automata from DLIN
- Witness encryption for succinct functional commitments and applications
- Flexible attribute-based proxy re-encryption for efficient data sharing
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Fully secure ABE with outsourced decryption against chosen ciphertext attack
- Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions
- Registered functional encryptions from pairings
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin
- Master-key KDM-secure ABE via predicate encoding
- Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded
- Unbounded dynamic predicate compositions in ABE from standard assumptions
- Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
- Improved inner-product encryption with adaptive security and full attribute-hiding
- Tag-based ABE in prime-order groups via pair encoding
This page was built for publication: Unbounded ABE via bilinear entropy expansion, revisited
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1648812)