Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin
From MaRDI portal
Publication:2139632
DOI10.1007/978-3-030-84259-8_6zbMath1489.94113OpenAlexW3192904781MaRDI QIDQ2139632
Publication date: 18 May 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84259-8_6
Related Items (4)
Optimal broadcast encryption and CP-ABE from evasive lattice assumptions ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ Multi-client functional encryption with fine-grained access control ⋮ How to use (plain) witness encryption: registered ABE, flexible broadcast, and more
Cites Work
- Unnamed Item
- Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs
- Conditional disclosure of secrets via non-linear reconstruction
- Optimal broadcast encryption from pairings and LWE
- Optimal broadcast encryption from LWE and pairings in the standard model
- Functional encryption for quadratic functions from \(k\)-lin, revisited
- New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
- Functional encryption for attribute-weighted sums from \(k\)-Lin
- An Algebraic Framework for Diffie-Hellman Assumptions
- Low Overhead Broadcast Encryption from Multilinear Maps
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
- Collusion resistant traitor tracing from learning with errors
- Fuzzy Identity-Based Encryption
- Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Dual System Encryption via Predicate Encodings
This page was built for publication: Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin