Improved dual system ABE in prime-order groups via predicate encodings
From MaRDI portal
Publication:2948397
DOI10.1007/978-3-662-46803-6_20zbMATH Open1375.94109OpenAlexW1896261913MaRDI QIDQ2948397FDOQ2948397
Authors: Jie Chen, Romain Gay, Hoeteck Wee
Publication date: 30 September 2015
Published in: Advances in Cryptology - EUROCRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46803-6_20
Recommendations
- Dual system encryption framework in prime-order groups via computational pair encodings
- Tag-based ABE in prime-order groups via pair encoding
- A study of pair encodings: predicate encryption in prime order groups
- A new encoding framework for predicate encryption with non-linear structures in prime order groups
- Dual system framework in multilinear settings and applications to fully secure (compact) ABE for unbounded-size circuits
Cited In (86)
- A practical compiler for attribute-based encryption: new decentralized constructions and more
- Attribute-Based Encryption for Range Attributes
- Identity-based matchmaking encryption from standard assumptions
- Generic transformation from broadcast encryption to round-optimal deniable ring authentication
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
- Predicate signatures from pair encodings via dual system proof technique
- Master-Key KDM-Secure IBE from Pairings
- Survey of information security
- Déjà Q: Encore! Un Petit IBE
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Fast, compact, and expressive attribute-based encryption
- Functional encryption for attribute-weighted sums from \(k\)-Lin
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys
- Fully adaptive decentralized multi-authority \textsf{ABE}
- Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin
- Unbounded ABE via bilinear entropy expansion, revisited
- Attribute Based Encryption with Direct Efficiency Tradeoff
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption
- Tightly Secure IBE Under Constant-Size Master Public Key
- Simple and efficient FE for quadratic functions
- Adaptively secure ABE for DFA from \(k\)-Lin and more
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)
- Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security
- Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
- Leakage-Resilient Functional Encryption via Pair Encodings
- CCA-secure ABE using tag and pair encoding
- Attribute based encryption for deterministic finite automata from DLIN
- Decentralized policy-hiding ABE with receiver privacy
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Fully secure ABE with outsourced decryption against chosen ciphertext attack
- More Efficient Constructions for Inner-Product Encryption
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin
- Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
- Adaptively secure inner product encryption from LWE
- Generic negation of pair encodings
- Master-key KDM-secure ABE via predicate encoding
- Unbounded dynamic predicate compositions in ABE from standard assumptions
- Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- A multi-authority approach to various predicate encryption types
- Functional encryption for computational hiding in prime order groups via pair encodings
- Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings
- Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting
- Fine-grained secure attribute-based encryption
- Fine-grained secure attribute-based encryption
- Inner-product functional encryption with fine-grained access control
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
- Fast, Compact, and Expressive Attribute-Based Encryption
- A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups
- Tightly secure hierarchical identity-based encryption
- Blind key-generation attribute-based encryption for general predicates
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
- Adaptively simulation-secure attribute-hiding predicate encryption
- Improved inner-product encryption with adaptive security and full attribute-hiding
- Tag-based ABE in prime-order groups via pair encoding
- Simplifying Design and Analysis of Complex Predicate Encryption Schemes
- Public-Key Puncturable Encryption: Modular and Compact Constructions
- Key-policy ABE with switchable attributes
- Compact FE for unbounded attribute-weighted sums for logspace from SXDH
- Tightly secure (H)IBE in the random oracle model
- Minicrypt primitives with algebraic structure and applications
- GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs
- A generic construction of CCA-secure attribute-based encryption with equality test
- (Augmented) broadcast encryption from identity based encryption with wildcard
- Distributed broadcast encryption from bilinear groups
- Improved fully adaptive decentralized MA-ABE for NC1 from MDDH
- Non-interactive zero-knowledge functional proofs
- Registered ABE via predicate encodings
- Compact \textsf{FE} for unbounded attribute-weighted sums for logspace from \textsf{SXDH}
- How to use (plain) witness encryption: registered ABE, flexible broadcast, and more
- Registered attribute-based signature
- Witness encryption for succinct functional commitments and applications
- Hierarchical and non-monotonic key-policy attribute-based encryption and its application
- A public key identity-based revocation scheme: fully attribute-hiding and function private
- Public-key encryption with keyword search in multi-user, multi-challenge setting under adaptive corruptions
- Registered functional encryptions from pairings
- Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems
- Expanded Framework for Dual System Encryption and Its Application
- Bounded-collusion decentralized ABE with sublinear parameters
- A modular approach to registered ABE for unbounded predicates
- Unbounded non-zero inner product encryption
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
- Statistically consistent broadcast authenticated encryption with keyword search. Adaptive security from standard assumptions
- Leakage-resilient attribute-based encryption with attribute-hiding
This page was built for publication: Improved dual system ABE in prime-order groups via predicate encodings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2948397)