Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
From MaRDI portal
Publication:2948397
DOI10.1007/978-3-662-46803-6_20zbMath1375.94109OpenAlexW1896261913MaRDI QIDQ2948397
Jie Chen, Hoeteck Wee, Romain Gay
Publication date: 30 September 2015
Published in: Advances in Cryptology - EUROCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46803-6_20
Related Items (70)
Fast, Compact, and Expressive Attribute-Based Encryption ⋮ Master-Key KDM-Secure IBE from Pairings ⋮ Public-Key Puncturable Encryption: Modular and Compact Constructions ⋮ Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin ⋮ Fine-grained secure attribute-based encryption ⋮ Survey of information security ⋮ CCA-secure ABE using tag and pair encoding ⋮ Unbounded ABE via bilinear entropy expansion, revisited ⋮ Decentralized policy-hiding ABE with receiver privacy ⋮ Optimal broadcast encryption and CP-ABE from evasive lattice assumptions ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ Blind key-generation attribute-based encryption for general predicates ⋮ Bounded-collusion decentralized ABE with sublinear parameters ⋮ Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin ⋮ Fully adaptive decentralized multi-authority \textsf{ABE} ⋮ Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin ⋮ Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings ⋮ Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting ⋮ Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ A practical compiler for attribute-based encryption: new decentralized constructions and more ⋮ GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs ⋮ Functional encryption for computational hiding in prime order groups via pair encodings ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ Key-policy ABE with switchable attributes ⋮ Compact FE for unbounded attribute-weighted sums for logspace from SXDH ⋮ Identity-based matchmaking encryption from standard assumptions ⋮ (Augmented) broadcast encryption from identity based encryption with wildcard ⋮ A generic construction of CCA-secure attribute-based encryption with equality test ⋮ How to use (plain) witness encryption: registered ABE, flexible broadcast, and more ⋮ Hierarchical and non-monotonic key-policy attribute-based encryption and its application ⋮ Adaptively secure inner product encryption from LWE ⋮ Unbounded dynamic predicate compositions in ABE from standard assumptions ⋮ Inner-product functional encryption with fine-grained access control ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Adaptively simulation-secure attribute-hiding predicate encryption ⋮ Improved inner-product encryption with adaptive security and full attribute-hiding ⋮ Expanded Framework for Dual System Encryption and Its Application ⋮ Fast, compact, and expressive attribute-based encryption ⋮ Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ Tightly Secure IBE Under Constant-Size Master Public Key ⋮ Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems ⋮ Simplifying Design and Analysis of Complex Predicate Encryption Schemes ⋮ Predicate signatures from pair encodings via dual system proof technique ⋮ Fine-grained secure attribute-based encryption ⋮ Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Déjà Q: Encore! Un Petit IBE ⋮ A Study of Pair Encodings: Predicate Encryption in Prime Order Groups ⋮ Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption ⋮ A multi-authority approach to various predicate encryption types ⋮ Simple and efficient FE for quadratic functions ⋮ Tag-based ABE in prime-order groups via pair encoding ⋮ Tightly secure hierarchical identity-based encryption ⋮ Leakage-Resilient Functional Encryption via Pair Encodings ⋮ Minicrypt primitives with algebraic structure and applications ⋮ Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) ⋮ Adaptively secure ABE for DFA from \(k\)-Lin and more ⋮ Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} ⋮ Fully secure ABE with outsourced decryption against chosen ciphertext attack ⋮ More Efficient Constructions for Inner-Product Encryption ⋮ Attribute Based Encryption with Direct Efficiency Tradeoff ⋮ Master-key KDM-secure ABE via predicate encoding ⋮ Generic negation of pair encodings ⋮ A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ Attribute-Based Encryption for Range Attributes ⋮ Functional encryption for attribute-weighted sums from \(k\)-Lin ⋮ Generic transformation from broadcast encryption to round-optimal deniable ring authentication
This page was built for publication: Improved Dual System ABE in Prime-Order Groups via Predicate Encodings