Leakage-resilient functional encryption via pair encodings
From MaRDI portal
Publication:2817484
DOI10.1007/978-3-319-40253-6_27zbMATH Open1405.94094OpenAlexW2482514850MaRDI QIDQ2817484FDOQ2817484
Authors: Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang, Jinguang Han
Publication date: 31 August 2016
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-40253-6_27
Recommendations
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- Achieving leakage resilience through dual system encryption
- Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model
Cites Work
- Theory of Cryptography
- Identity-based cryptosystems and signature schemes
- Efficient public-key cryptography in the presence of key leakage
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Identity-based encryption resilient to continual auxiliary leakage
- Achieving leakage resilience through dual system encryption
- Signatures resilient to continual leakage on memory and computation
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Functional encryption for regular languages
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Fully secure functional encryption with general relations from the decisional linear assumption
- Tools for simulating features of composite order bilinear groups in the prime order setting
- Storing Secrets on Continually Leaky Devices
- Expressive key-policy attribute-based encryption with constant-size ciphertexts
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- Advances in Cryptology – CRYPTO 2004
- Unbounded HIBE and Attribute-Based Encryption
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- Multiparty computation secure against continual memory leakage
- Dual System Encryption via Predicate Encodings
- Improved dual system ABE in prime-order groups via predicate encodings
- Dual system encryption framework in prime-order groups via computational pair encodings
Cited In (8)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Achieving leakage resilience through dual system encryption
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting
- A general framework for secure sharing of personal health records in cloud system
- Functional encryption for computational hiding in prime order groups via pair encodings
- Leakage-resilient attribute-based encryption with attribute-hiding
This page was built for publication: Leakage-resilient functional encryption via pair encodings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2817484)