Leakage-resilient functional encryption via pair encodings
From MaRDI portal
Publication:2817484
Recommendations
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- Achieving leakage resilience through dual system encryption
- Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model
Cites work
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1418307 (Why is no real title available?)
- Achieving leakage resilience through dual system encryption
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Dual System Encryption via Predicate Encodings
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Dual system encryption framework in prime-order groups via computational pair encodings
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- Efficient public-key cryptography in the presence of key leakage
- Expressive key-policy attribute-based encryption with constant-size ciphertexts
- Fully secure functional encryption with general relations from the decisional linear assumption
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- Functional encryption for regular languages
- Fuzzy Identity-Based Encryption
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Identity-based cryptosystems and signature schemes
- Identity-based encryption resilient to continual auxiliary leakage
- Improved dual system ABE in prime-order groups via predicate encodings
- Multiparty computation secure against continual memory leakage
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Signatures resilient to continual leakage on memory and computation
- Storing Secrets on Continually Leaky Devices
- Theory of Cryptography
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Tools for simulating features of composite order bilinear groups in the prime order setting
- Unbounded HIBE and Attribute-Based Encryption
Cited in
(8)- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Achieving leakage resilience through dual system encryption
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- Functional encryption for computational hiding in prime order groups via pair encodings
- A general framework for secure sharing of personal health records in cloud system
- Leakage-resilient attribute-based encryption with attribute-hiding
This page was built for publication: Leakage-resilient functional encryption via pair encodings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2817484)