Fully secure functional encryption with a large class of relations from the decisional linear assumption
From MaRDI portal
Publication:2010596
Recommendations
- Fully secure functional encryption with general relations from the decisional linear assumption
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Functional encryption for inner product with full function privacy
- Fully secure functional encryption for inner products, from standard assumptions
- Practical fully secure unrestricted inner product functional encryption modulo \(p\)
Cites work
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Advances in Cryptology – CRYPTO 2004
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Attribute-based encryption for circuits
- Attribute-based encryption for circuits from multilinear maps
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Delegating Capabilities in Predicate Encryption Systems
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption
- Fully secure functional encryption with general relations from the decisional linear assumption
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Fully secure unbounded inner-product and attribute-based encryption
- Functional Encryption for Turing Machines
- Functional encryption: definitions and challenges
- Functional encryption: new perspectives and lower bounds
- Fuzzy Identity-Based Encryption
- Generalized Identity Based and Broadcast Encryption Schemes
- Hierarchical ID-Based Cryptography
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Hierarchical Predicate Encryption for Inner-Products
- Homomorphic Encryption and Signatures from Vector Decomposition
- Multi-input functional encryption
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- New proof techniques for DLIN-based adaptively secure attribute-based encryption
- On the achievability of simulation-based security for functional encryption
- Practical Identity-Based Encryption Without Random Oracles
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Spatial encryption supporting non-monotone access structure
- The relation and transformation between hierarchical inner product encryption and spatial encryption
- Theory of Cryptography
- Tools for simulating features of composite order bilinear groups in the prime order setting
- Topics in Cryptology – CT-RSA 2005
- Unbounded HIBE and Attribute-Based Encryption
Cited in
(7)- Adaptively secure inner product encryption from LWE
- Fully secure functional encryption with general relations from the decisional linear assumption
- Hierarchical functional encryption for linear transformations
- Tag-based ABE in prime-order groups via pair encoding
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Functional encryption for attribute-weighted sums from \(k\)-Lin
- Doubly spatial encryption from DBDH
This page was built for publication: Fully secure functional encryption with a large class of relations from the decisional linear assumption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2010596)