Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
From MaRDI portal
Publication:2894433
DOI10.1007/978-3-642-29011-4_35zbMath1297.94096OpenAlexW2122119548MaRDI QIDQ2894433
Tatsuaki Okamoto, Katsuyuki Takashima
Publication date: 29 June 2012
Published in: Advances in Cryptology – EUROCRYPT 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-29011-4_35
Related Items
Adaptive Simulation Security for Inner Product Functional Encryption ⋮ Verifiable Inner Product Encryption Scheme ⋮ Generalized closest substring encryption ⋮ Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption ⋮ Predicate Encryption for Circuits from LWE ⋮ Cross-domain attribute-based access control encryption ⋮ CCA-secure ABE using tag and pair encoding ⋮ Efficient revocable identity-based encryption via subset difference methods ⋮ On the power of rewinding simulators in functional encryption ⋮ Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption ⋮ (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin ⋮ Multi-key and multi-input predicate encryption from learning with errors ⋮ Pattern matching in encrypted stream from inner product encryption ⋮ Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ Unbounded predicate inner product functional encryption from pairings ⋮ Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ Key-policy ABE with switchable attributes ⋮ Multi-client functional encryption with fine-grained access control ⋮ Identity-based matchmaking encryption from standard assumptions ⋮ Multi-input attribute based encryption and predicate encryption ⋮ A survey on functional encryption ⋮ (Augmented) broadcast encryption from identity based encryption with wildcard ⋮ Adaptively secure inner product encryption from LWE ⋮ Inner-product functional encryption with fine-grained access control ⋮ Policy-compliant signatures ⋮ Fully secure unbounded zero inner product encryption with short ciphertexts and keys ⋮ Adaptively simulation-secure attribute-hiding predicate encryption ⋮ Improved inner-product encryption with adaptive security and full attribute-hiding ⋮ The relation and transformation between hierarchical inner product encryption and spatial encryption ⋮ Compact (Targeted Homomorphic) Inner Product Encryption from LWE ⋮ Fine-grained searchable encryption in multi-user setting ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Verifiability-based conversion from CPA to CCA-secure predicate encryption ⋮ Improved (Hierarchical) Inner-Product Encryption from Lattices ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits ⋮ Access Control Encryption for Equality, Comparison, and More ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Leakage-Resilient Functional Encryption via Pair Encodings ⋮ Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ Functional encryption for attribute-weighted sums from \(k\)-Lin