Attribute-Based Encryption for Circuits from Multilinear Maps

From MaRDI portal
Publication:2849413

DOI10.1007/978-3-642-40084-1_27zbMath1311.94080OpenAlexW1564449568MaRDI QIDQ2849413

Craig Gentry, Shai Halevi, Amit Sahai, Brent Waters, Sanjam Garg

Publication date: 17 September 2013

Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40084-1_27




Related Items (51)

Identity-based re-encryption scheme with lightweight re-encryption key generationPushing the limits of Valiant's universal circuits: simpler, tighter and more compactThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksGeneralized closest substring encryptionFully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size CiphertextsAttribute-based versions of Schnorr and ElGamalBilinear Entropy Expansion from the Decisional Linear AssumptionCross-domain attribute-based access control encryptionComments on ``Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegationMaking \textit{any} attribute-based encryption accountable, efficientlyA general framework for secure sharing of personal health records in cloud systemCryptanalysis of multilinear maps from ideal lattices: revisitedOn the power of rewinding simulators in functional encryptionKey-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear MapsAchieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryptionCompact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-LinMultilinear maps from obfuscationEfficient and scalable universal circuitsSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceAccountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and NonrepudiationSuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingAccountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in CloudDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHDisappearing cryptography in the bounded storage modelA new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionCiphertext-policy attribute-based encryption for general circuits from bilinear mapsExpanded Framework for Dual System Encryption and Its ApplicationCost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward SecuritySelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyVerifiability-based conversion from CPA to CCA-secure predicate encryptionDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsBounded-Collusion Attribute-Based Encryption from Minimal AssumptionsFully secure functional encryption with a large class of relations from the decisional linear assumptionFunctional encryption for cascade automataDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsCompacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionMultilinear Maps from ObfuscationAlgebraic Attacks Against Several Weak Variants of GVW’13 ABEFuzzy matching and direct revocation: a new CP-ABE scheme from multilinear mapsFunctional Encryption for Cascade Automata (Extended Abstract)Candidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary InformationMinicrypt primitives with algebraic structure and applicationsDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}More Efficient Constructions for Inner-Product EncryptionA PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEMEFully Secure Functional Encryption for Inner Products, from Standard AssumptionsCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityEfficient fully CCA-secure predicate encryptions from pair encodingsHow to Use Indistinguishability Obfuscation: Deniable Encryption, and More


Uses Software



This page was built for publication: Attribute-Based Encryption for Circuits from Multilinear Maps