Unbounded HIBE and Attribute-Based Encryption
From MaRDI portal
Publication:3003402
DOI10.1007/978-3-642-20465-4_30zbMath1290.94105OpenAlexW1546886278MaRDI QIDQ3003402
Publication date: 27 May 2011
Published in: Advances in Cryptology – EUROCRYPT 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-20465-4_30
Related Items
Extended dual system group and shorter unbounded hierarchical identity based encryption, Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption, Bilinear Entropy Expansion from the Decisional Linear Assumption, Simpler constructions of asymmetric primitives from obfuscation, Unbounded ABE via bilinear entropy expansion, revisited, Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing, Generic constructions for fully secure revocable attribute-based encryption, A general framework for secure sharing of personal health records in cloud system, Revocable hierarchical identity-based encryption with shorter private keys and update keys, Attribute based encryption for deterministic finite automata from DLIN, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Blind key-generation attribute-based encryption for general predicates, Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013, Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin, Fully adaptive decentralized multi-authority \textsf{ABE}, Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings, Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks, GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs, On the security of functional encryption in the generic group model, Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey, TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks, Unbounded predicate inner product functional encryption from pairings, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Compact FE for unbounded attribute-weighted sums for logspace from SXDH, Identity-based matchmaking encryption from standard assumptions, Multi-input attribute based encryption and predicate encryption, A survey on functional encryption, Additive-homomorphic functional commitments and applications to homomorphic signatures, Key-policy attribute-based encryption against continual auxiliary input leakage, Hierarchical and non-monotonic key-policy attribute-based encryption and its application, Unbounded dynamic predicate compositions in ABE from standard assumptions, Revocable hierarchical identity-based encryption via history-free approach, Unbounded HIBE with tight security, Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH, A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Hierarchical attribute based encryption with continuous leakage-resilience, Expanded Framework for Dual System Encryption and Its Application, Efficient identity-based encryption with hierarchical key-insulation from HIBE, Anonymous spatial encryption under affine space delegation functionality with full security, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Computational friendly attribute-based encryptions with short ciphertext, Attribute-Based Encryption with Fast Decryption, Anonymous HIBE with short ciphertexts: full security in prime order groups, Simplifying Design and Analysis of Complex Predicate Encryption Schemes, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Revocable hierarchical identity-based encryption, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts, Unbounded inner product functional encryption from bilinear maps, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, Unbounded inner product functional encryption from bilinear maps, A Study of Pair Encodings: Predicate Encryption in Prime Order Groups, Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption, Tag-based ABE in prime-order groups via pair encoding, Leakage-Resilient Functional Encryption via Pair Encodings, Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures, Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \), Adaptively secure ABE for DFA from \(k\)-Lin and more, Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}, Fully secure ABE with outsourced decryption against chosen ciphertext attack, Attribute Based Encryption with Direct Efficiency Tradeoff, Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions, Master-key KDM-secure ABE via predicate encoding, Generic negation of pair encodings, Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security, Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes, Functional encryption for attribute-weighted sums from \(k\)-Lin, Unnamed Item