Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting

From MaRDI portal
Publication:2894416

DOI10.1007/978-3-642-29011-4_20zbMath1297.94086OpenAlexW1684724692MaRDI QIDQ2894416

Allison Lewko

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_20



Related Items

Hierarchical Identity-Based Encryption with Tight Multi-challenge Security, Extended dual system group and shorter unbounded hierarchical identity based encryption, Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares, Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption, Unbounded ABE via bilinear entropy expansion, revisited, IBE Under $$k$$-LIN with Shorter Ciphertexts and Private Keys, Efficient revocable identity-based encryption with short public parameters, Efficient revocable identity-based encryption via subset difference methods, Revocable hierarchical identity-based encryption with shorter private keys and update keys, Attribute based encryption for deterministic finite automata from DLIN, Rerandomizable signatures under standard assumption, Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness, Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Blind key-generation attribute-based encryption for general predicates, Fully adaptive decentralized multi-authority \textsf{ABE}, Pattern matching in encrypted stream from inner product encryption, Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings, Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Shorter identity-based encryption via asymmetric pairings, Unique-path identity based encryption with applications to strongly secure messaging, Multi-authority ABE for non-monotonic access structures, Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded, Functional encryption for computational hiding in prime order groups via pair encodings, Identity-based matchmaking encryption from standard assumptions, (Augmented) broadcast encryption from identity based encryption with wildcard, Shorter quasi-adaptive NIZK proofs for linear subspaces, Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting, Unbounded HIBE with tight security, Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH, New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters, Improved inner-product encryption with adaptive security and full attribute-hiding, Expanded Framework for Dual System Encryption and Its Application, Practical Large Universe Attribute-Set Based Encryption in the Standard Model, Efficient identity-based encryption with hierarchical key-insulation from HIBE, Anonymous spatial encryption under affine space delegation functionality with full security, Computing discrete logarithms in \(\mathbb F_{p^6}\), Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Decentralized Attribute-Based Signatures, Revocable Identity-Based Encryption Revisited: Security Model and Construction, Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies, Anonymous HIBE with short ciphertexts: full security in prime order groups, Simplifying Design and Analysis of Complex Predicate Encryption Schemes, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis, Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe, Déjà Q: Encore! Un Petit IBE, A Study of Pair Encodings: Predicate Encryption in Prime Order Groups, Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption, Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups, Tightly secure hierarchical identity-based encryption, Leakage-Resilient Functional Encryption via Pair Encodings, Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance, A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups, Sequential aggregate signatures with short public keys without random oracles