Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions

From MaRDI portal
Publication:3183588


DOI10.1007/978-3-642-03356-8_36zbMath1252.94101MaRDI QIDQ3183588

Brent Waters

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_36


94A60: Cryptography


Related Items

Unnamed Item, Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, Decentralized Attribute-Based Signatures, Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures, Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES, Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies, Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks, Generic Constructions of Revocable Identity-Based Encryption, Fast, Compact, and Expressive Attribute-Based Encryption, Master-Key KDM-Secure IBE from Pairings, Hierarchical Identity-Based Encryption with Tight Multi-challenge Security, Short Integrated PKE+PEKS in Standard Model, New Proof for BKP IBE Scheme and Improvement in the MIMC Setting, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, Tightly Secure IBE Under Constant-Size Master Public Key, Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps, Multi-input Inner-Product Functional Encryption from Pairings, Simplifying Design and Analysis of Complex Predicate Encryption Schemes, Unbounded inner product functional encryption from bilinear maps, Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange, Unbounded inner product functional encryption from bilinear maps, Tightly secure hierarchical identity-based encryption, Minicrypt primitives with algebraic structure and applications, Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups, (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin, Leakage-resilient identity-based cryptography from minimal assumptions, Fully adaptive decentralized multi-authority \textsf{ABE}, Registered attribute-based encryption, Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin, A practical compiler for attribute-based encryption: new decentralized constructions and more, Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication, On Constructing Pairing-Free Identity-Based Encryptions, Unbounded predicate inner product functional encryption from pairings, Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices, Adaptive multiparty NIKE, Key-policy ABE with switchable attributes, Multi-client functional encryption with fine-grained access control, Compact FE for unbounded attribute-weighted sums for logspace from SXDH, Identity-based matchmaking encryption from standard assumptions, Efficient ciphertext-policy attribute-based encryption with blackbox traceability, Blind key-generation attribute-based encryption for general predicates, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Adaptively secure inner product encryption from LWE, Unbounded dynamic predicate compositions in ABE from standard assumptions, Succinct and adaptively secure ABE for ABP from \(k\)-Lin, Inner-product functional encryption with fine-grained access control, Unbounded HIBE with tight security, Receiver selective opening security for identity-based encryption in the multi-challenge setting, Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH, Multi-party functional encryption, ABE for DFA from LWE against bounded collusions, revisited, Ring-based identity based encryption -- asymptotically shorter MPK and tighter security, Towards tight adaptive security of non-interactive key exchange, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures, Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography, Verifiable Random Functions from Standard Assumptions, Déjà Q: Encore! Un Petit IBE, A Study of Pair Encodings: Predicate Encryption in Prime Order Groups, Functional Encryption Without Obfuscation, Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups, Leakage-Resilient Functional Encryption via Pair Encodings, Secret Handshakes with Dynamic Expressive Matching Policy, Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption, More Efficient Constructions for Inner-Product Encryption, A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes, Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming, Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More, Key-Policy Multi-authority Attribute-Based Encryption, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Towards Tightly Secure Lattice Short Signature and Id-Based Encryption, Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings, Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting, Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions, Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps, New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters, Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups, Expanded Framework for Dual System Encryption and Its Application, A Signature Scheme with Efficient Proof of Validity, Identification Schemes from Key Encapsulation Mechanisms, Adaptively Secure Non-interactive Threshold Cryptosystems, Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost, Anonymous Encryption with Partial-Order Subset Delegation Functionality, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, IBE Under $$k$$-LIN with Shorter Ciphertexts and Private Keys, Improved Identity-Based Online/Offline Encryption, Constructions of CCA-Secure Revocable Identity-Based Encryption, SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, Structure-Preserving Signatures from Standard Assumptions, Revisited, Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption, Predicate Encryption for Circuits from LWE, Bilinear Entropy Expansion from the Decisional Linear Assumption, From Selective to Adaptive Security in Functional Encryption, Fine-grained secure attribute-based encryption, Generic constructions of master-key KDM secure attribute-based encryption, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, Leveled Hierarchical Identity-Based Fully Homomorphic Encryption from Learning with Rounding, A survey on functional encryption, To label, or not to label (in generic groups), Public key encryption with hierarchical authorized keyword search, Lattice-based programmable hash functions and applications, Complementary set encryption for privacy-preserving data consolidation, Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting, An efficient IBE scheme with tight security reduction in the random oracle model, Self-updatable encryption with short public parameters and its extensions, Tightly secure signatures and public-key encryption, Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares, Constant-size structure-preserving signatures: generic constructions and simple assumptions, Shorter identity-based encryption via asymmetric pairings, Fully secure revocable attribute-based encryption, Programmable hash functions and their applications, Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups, Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES, Anonymous spatial encryption under affine space delegation functionality with full security, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Efficient selective identity-based encryption without random oracles, Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption, An expressive and provably secure ciphertext-policy attribute-based encryption, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, SEMD: secure and efficient message dissemination with policy enforcement in VANET, Identity-based broadcast encryption with continuous leakage resilience, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Revocable hierarchical identity-based encryption via history-free approach, Efficient subtree-based encryption for fuzzy-entity data sharing, Smooth NIZK arguments, Unbounded ABE via bilinear entropy expansion, revisited, Revocable hierarchical identity-based encryption with shorter private keys and update keys, Functional encryption for computational hiding in prime order groups via pair encodings, Shorter quasi-adaptive NIZK proofs for linear subspaces, Dual trapdoor identity-based encryption with keyword search, Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing, Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing, A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Adaptively simulation-secure attribute-hiding predicate encryption, Improved inner-product encryption with adaptive security and full attribute-hiding, Identity-based quotable ring signature, New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Bonsai trees, or how to delegate a lattice basis, Relations between semantic security and anonymity in identity-based encryption, Flexible attribute-based proxy re-encryption for efficient data sharing, Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation, Predicate signatures from pair encodings via dual system proof technique, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Revocable hierarchical identity-based encryption, Confined guessing: new signatures from standard assumptions, Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption, Novel generic construction of leakage-resilient PKE scheme with CCA security, Revocable hierarchical identity-based encryption with adaptive security, Simple and efficient FE for quadratic functions, Tag-based ABE in prime-order groups via pair encoding, Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \), Adaptively secure ABE for DFA from \(k\)-Lin and more, Compact NIZKs from standard assumptions on bilinear maps, Generic construction of server-aided revocable hierarchical identity-based encryption, Fully secure ABE with outsourced decryption against chosen ciphertext attack, Master-key KDM-secure ABE via predicate encoding, Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance, Generic negation of pair encodings, Efficient fully CCA-secure predicate encryptions from pair encodings, Leakage-resilient key exchange and two-seed extractors, Functional encryption for attribute-weighted sums from \(k\)-Lin, A performance evaluation of pairing-based broadcast encryption systems, Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE, Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin, Fine-grained secure attribute-based encryption, Attribute-based access control for inner product functional encryption from LWE, Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure, Asymptotically tight lower bounds in anonymous broadcast encryption and authentication, CCA-secure ABE using tag and pair encoding, Rerandomizable signatures under standard assumption, Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin, Key-policy attribute-based encryption against continual auxiliary input leakage, Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions, Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more, Efficient anonymous multi-group broadcast encryption, Efficient identity-based encryption with hierarchical key-insulation from HIBE, Fast, compact, and expressive attribute-based encryption, Anonymous HIBE with short ciphertexts: full security in prime order groups, On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited, Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, A multi-authority approach to various predicate encryption types, A fully distributed hierarchical attribute-based encryption scheme, Leakage resilience from program obfuscation, Still wrong use of pairings in cryptography, Computing on authenticated data, Sequential aggregate signatures with short public keys without random oracles, Privacy-preserving encryption scheme using DNA parentage test, Efficient revocable identity-based encryption via subset difference methods, A general framework for secure sharing of personal health records in cloud system, Short signatures from Diffie-Hellman: realizing almost compact public key, Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness, Identity-based encryption with hierarchical key-insulation in the standard model, Threshold public key encryption scheme resilient against continual leakage without random oracles, Inner-product encryption under standard assumptions, Improved hidden vector encryption with short ciphertexts and tokens, Reflections on the security proofs of Boneh-Franklin identity-based encryption scheme, The relation and transformation between hierarchical inner product encryption and spatial encryption, Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts, Towards semantically secure outsourcing of association rule mining on categorical data, Extended dual system group and shorter unbounded hierarchical identity based encryption, The generic construction of continuous leakage-resilient identity-based cryptosystems, Efficient revocable identity-based encryption with short public parameters