More efficient constructions for inner-product encryption
From MaRDI portal
Publication:2822673
DOI10.1007/978-3-319-39555-5_13zbMATH Open1345.94086OpenAlexW2488240078MaRDI QIDQ2822673FDOQ2822673
Authors: Somindu C. Ramanna
Publication date: 4 October 2016
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://hal.inria.fr/hal-01394288/file/356.pdf
Recommendations
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- Non-zero inner product encryption with short ciphertexts and private keys
- Efficient inner product encryption with simulation-based security
inner-product encryptionattribute-hidingconstant-size ciphertextsquasi-adaptive non-interactive zero knowledge proofs
Cites Work
- Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Fuzzy Identity-Based Encryption
- Attribute-based encryption for circuits from multilinear maps
- Fully secure functional encryption with general relations from the decisional linear assumption
- Hierarchical Predicate Encryption for Inner-Products
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Attribute-based encryption for circuits
- New proof methods for attribute-based encryption: achieving full security through selective techniques
- Advances in cryptology -- CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18--22, 2013. Proceedings, Part II
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- Homomorphic Encryption and Signatures from Vector Decomposition
- Shorter quasi-adaptive NIZK proofs for linear subspaces
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- (Hierarchical) identity-based encryption from affine message authentication
- Dual System Encryption via Predicate Encodings
- Dual-system simulation-soundness with applications to UC-PAKE and more
- Improved dual system ABE in prime-order groups via predicate encodings
- Dual system encryption framework in prime-order groups via computational pair encodings
- Attribute-based functional encryption on lattices
- Efficient (anonymous) compact HIBE from standard assumptions
- More efficient constructions for inner-product encryption
Cited In (14)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- Compact (targeted homomorphic) inner product encryption from LWE
- Non-zero inner product encryption with short ciphertexts and private keys
- Verifiable Inner Product Encryption Scheme
- Hierarchical identity-based inner product functional encryption
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- Pattern matching in encrypted stream from inner product encryption
- More efficient constructions for inner-product encryption
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
- CCA-secure ABE using tag and pair encoding
- A public key identity-based revocation scheme: fully attribute-hiding and function private
- CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption
- A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups
This page was built for publication: More efficient constructions for inner-product encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2822673)