Expressive key-policy attribute-based encryption with constant-size ciphertexts
From MaRDI portal
Publication:3084342
DOI10.1007/978-3-642-19379-8_6zbMATH Open1291.94049OpenAlexW2117616411MaRDI QIDQ3084342FDOQ3084342
Authors: Nuttapong Attrapadung, Benoît Libert, Elie de Panafieu
Publication date: 15 March 2011
Published in: Public Key Cryptography – PKC 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19379-8_6
Recommendations
- Attribute-based encryption schemes with constant-size ciphertexts
- Computationally efficient expressive key-policy attribute based encryption schemes with constant-size ciphertext
- Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption
- Computational friendly attribute-based encryptions with short ciphertext
- Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
Cited In (63)
- Anonymous attribute-based broadcast encryption with hidden multiple access structures
- Compact NIZKs from standard assumptions on bilinear maps
- Complementary set encryption for privacy-preserving data consolidation
- Hierarchical and non-monotonic key-policy attribute-based encryption and its application
- Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts
- Multi-client functional encryption with fine-grained access control
- Circuit ABE with \(\mathsf{poly}(\mathrm{depth},\lambda )\)-sized ciphertexts and keys from lattices
- Unbounded non-zero inner product encryption
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting
- Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
- Attribute-based signatures for range of inner product and its applications
- Security-level switchable attribute-based encryption under the strictly weaker assumption family
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- Attribute-Based Encryption for Range Attributes
- Attribute-Based Encryption
- Attribute-based encryption with fast decryption
- Attribute-based encryption schemes with constant-size ciphertexts
- Efficient anonymous multi-group broadcast encryption
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
- A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
- GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs
- Fast, compact, and expressive attribute-based encryption
- Efficient fully CCA-secure predicate encryptions from pair encodings
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys
- ABE for circuits with constant-size secret keys and adaptive security
- Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits
- Short attribute-based signatures for threshold predicates
- Attribute Based Encryption with Direct Efficiency Tradeoff
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
- Constant size ciphertexts in threshold attribute-based encryption
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- Generic constructions for fully secure revocable attribute-based encryption
- Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys
- Expressive Attribute Based Signcryption with Constant-Size Ciphertext
- Leakage-Resilient Functional Encryption via Pair Encodings
- Linear Encryption with Keyword Search
- An efficient key-policy attribute-based encryption scheme with constant ciphertext length
- Compact NIZKs from standard assumptions on bilinear maps
- Fully secure ABE with outsourced decryption against chosen ciphertext attack
- Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
- Succinct and adaptively secure ABE for ABP from \(k\)-Lin
- Unbounded dynamic predicate compositions in ABE from standard assumptions
- TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks
- On the security of joint signature and encryption revisited
- CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption
- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts
- Efficient fully secure attribute-based encryption schemes for general access structures
- On the optimal succinctness and efficiency of functional encryption and attribute-based encryption
- Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- Generic Framework for Attribute-Based Group Signature
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes
- Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings
- Verifiability-based conversion from CPA to CCA-secure predicate encryption
- Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper)
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
- Conjunctive Broadcast and Attribute-Based Encryption
- Fast, Compact, and Expressive Attribute-Based Encryption
- Broadcast, trace and revoke with optimal parameters from polynomial hardness
- Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost
- Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters
- Simplifying Design and Analysis of Complex Predicate Encryption Schemes
- Public-Key Puncturable Encryption: Modular and Compact Constructions
This page was built for publication: Expressive key-policy attribute-based encryption with constant-size ciphertexts
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3084342)