Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR
From MaRDI portal
Publication:2289429
DOI10.1007/978-3-030-17259-6_6zbMATH Open1483.94044OpenAlexW2918460395MaRDI QIDQ2289429FDOQ2289429
Authors: Shuichi Katsumata, Shota Yamada
Publication date: 28 January 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-17259-6_6
Recommendations
- Non-zero inner product encryption with short ciphertexts and private keys
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- Function private predicate encryption for low min-entropy predicates
Cited In (11)
- Non-interactive secure computation of inner-product from LPN and LWE
- Non-zero inner product encryption with short ciphertexts and private keys
- Public-key puncturable encryption: modular and compact constructions
- Unbounded predicate inner product functional encryption from pairings
- A public key identity-based revocation scheme: fully attribute-hiding and function private
- Adaptively secure inner product encryption from LWE
- Adaptively secure constrained pseudorandom functions in the standard model
- CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption
- Direct computation of branching programs and its applications to more efficient lattice-based cryptography
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting
- Attribute-based signatures for range of inner product and its applications
This page was built for publication: Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2289429)