Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption

From MaRDI portal
Publication:2894433

DOI10.1007/978-3-642-29011-4_35zbMath1297.94096OpenAlexW2122119548MaRDI QIDQ2894433

Tatsuaki Okamoto, Katsuyuki Takashima

Publication date: 29 June 2012

Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_35




Related Items

Adaptive Simulation Security for Inner Product Functional EncryptionVerifiable Inner Product Encryption SchemeGeneralized closest substring encryptionCommunication Complexity of Conditional Disclosure of Secrets and Attribute-Based EncryptionPredicate Encryption for Circuits from LWECross-domain attribute-based access control encryptionCCA-secure ABE using tag and pair encodingEfficient revocable identity-based encryption via subset difference methodsOn the power of rewinding simulators in functional encryptionAchieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-LinMulti-key and multi-input predicate encryption from learning with errorsPattern matching in encrypted stream from inner product encryptionEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linUnbounded predicate inner product functional encryption from pairingsMulti random projection inner product encryption, applications to proximity searchable encryption for the iris biometricReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded settingKey-policy ABE with switchable attributesMulti-client functional encryption with fine-grained access controlIdentity-based matchmaking encryption from standard assumptionsMulti-input attribute based encryption and predicate encryptionA survey on functional encryption(Augmented) broadcast encryption from identity based encryption with wildcardAdaptively secure inner product encryption from LWEInner-product functional encryption with fine-grained access controlPolicy-compliant signaturesFully secure unbounded zero inner product encryption with short ciphertexts and keysAdaptively simulation-secure attribute-hiding predicate encryptionImproved inner-product encryption with adaptive security and full attribute-hidingThe relation and transformation between hierarchical inner product encryption and spatial encryptionCompact (Targeted Homomorphic) Inner Product Encryption from LWEFine-grained searchable encryption in multi-user settingSelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyVerifiability-based conversion from CPA to CCA-secure predicate encryptionImproved (Hierarchical) Inner-Product Encryption from LatticesAnonymous HIBE with short ciphertexts: full security in prime order groupsDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsAccess Control Encryption for Equality, Comparison, and MoreFully secure functional encryption with a large class of relations from the decisional linear assumptionLeakage-Resilient Functional Encryption via Pair EncodingsTuring Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded FunctionsNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysEfficient fully CCA-secure predicate encryptions from pair encodingsFunctional encryption for attribute-weighted sums from \(k\)-Lin