Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings
From MaRDI portal
Publication:2953790
DOI10.1007/978-3-662-53890-6_20zbMath1416.94039OpenAlexW2552743177MaRDI QIDQ2953790
Publication date: 6 January 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53890-6_20
Related Items (41)
Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper) ⋮ Revocable policy-based chameleon hash ⋮ CCA-secure ABE using tag and pair encoding ⋮ Unbounded ABE via bilinear entropy expansion, revisited ⋮ Generic constructions for fully secure revocable attribute-based encryption ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ Blind key-generation attribute-based encryption for general predicates ⋮ Bounded Collusion ABE for TMs from IBE ⋮ Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin ⋮ Fully adaptive decentralized multi-authority \textsf{ABE} ⋮ On the optimal succinctness and efficiency of functional encryption and attribute-based encryption ⋮ Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ A practical compiler for attribute-based encryption: new decentralized constructions and more ⋮ GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs ⋮ ABE for circuits with constant-size secret keys and adaptive security ⋮ Compact FE for unbounded attribute-weighted sums for logspace from SXDH ⋮ (Augmented) broadcast encryption from identity based encryption with wildcard ⋮ A generic construction of CCA-secure attribute-based encryption with equality test ⋮ Adaptively secure inner product encryption from LWE ⋮ Unbounded dynamic predicate compositions in ABE from standard assumptions ⋮ Succinct and adaptively secure ABE for ABP from \(k\)-Lin ⋮ Inner-product functional encryption with fine-grained access control ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ ABE for DFA from LWE against bounded collusions, revisited ⋮ Improved inner-product encryption with adaptive security and full attribute-hiding ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits ⋮ Tightly Secure IBE Under Constant-Size Master Public Key ⋮ Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems ⋮ Simplifying Design and Analysis of Complex Predicate Encryption Schemes ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Tag-based ABE in prime-order groups via pair encoding ⋮ Leakage-Resilient Functional Encryption via Pair Encodings ⋮ Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) ⋮ Adaptively secure ABE for DFA from \(k\)-Lin and more ⋮ More Efficient Constructions for Inner-Product Encryption ⋮ Generic negation of pair encodings ⋮ A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups ⋮ Attribute-Based Encryption for Range Attributes
Cites Work
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- Déjà Q: Encore! Un Petit IBE
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
- Riding on Asymmetry: Efficient ABE for Branching Programs
- Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
- Attribute Based Encryption with Direct Efficiency Tradeoff
- Attribute-Based Encryption for Range Attributes
- An Algebraic Framework for Diffie-Hellman Assumptions
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups
- Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
- Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures
- How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Functional Encryption for Regular Languages
- Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
- Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
- A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Functional Encryption: Definitions and Challenges
- Unbounded HIBE and Attribute-Based Encryption
- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Bilinear Entropy Expansion from the Decisional Linear Assumption
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Hierarchical Predicate Encryption for Inner-Products
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
- Partial Garbling Schemes and Their Applications
- Fuzzy Identity-Based Encryption
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
- Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
- Déjà Q: Using Dual Systems to Revisit q-Type Assumptions
- Attribute-based encryption for circuits
- Dual System Encryption via Predicate Encodings
This page was built for publication: Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings