Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions

From MaRDI portal
Publication:3183588

DOI10.1007/978-3-642-03356-8_36zbMath1252.94101OpenAlexW1484751769MaRDI QIDQ3183588

Brent Waters

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_36




Related Items (only showing first 100 items - show all)

Generic Constructions of Revocable Identity-Based EncryptionTwo-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and MoreFast, Compact, and Expressive Attribute-Based EncryptionMaster-Key KDM-Secure IBE from PairingsHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityShort Integrated PKE+PEKS in Standard ModelNew Proof for BKP IBE Scheme and Improvement in the MIMC SettingStructure-Preserving Signatures from Standard Assumptions, RevisitedCommunication Complexity of Conditional Disclosure of Secrets and Attribute-Based EncryptionPredicate Encryption for Circuits from LWEBilinear Entropy Expansion from the Decisional Linear AssumptionFrom Selective to Adaptive Security in Functional EncryptionSemi-adaptive Security and Bundling Functionalities Made Generic and EasyIBE Under $$k$$-LIN with Shorter Ciphertexts and Private KeysImproved Identity-Based Online/Offline EncryptionConstructions of CCA-Secure Revocable Identity-Based EncryptionEfficient ciphertext-policy attribute-based encryption with blackbox traceabilityKey-Policy Multi-authority Attribute-Based EncryptionEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionBlind key-generation attribute-based encryption for general predicatesAdaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-LinLeakage-resilient identity-based cryptography from minimal assumptionsFully adaptive decentralized multi-authority \textsf{ABE}Registered attribute-based encryptionTraitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-LinTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceA practical compiler for attribute-based encryption: new decentralized constructions and moreDecentralized multi-authority attribute-based inner-product FE: large universe and unbounded(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linTight lower bounds and optimal constructions of anonymous broadcast encryption and authenticationOn Constructing Pairing-Free Identity-Based EncryptionsUnbounded predicate inner product functional encryption from pairingsLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesAdaptive multiparty NIKEReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded settingKey-policy ABE with switchable attributesMulti-client functional encryption with fine-grained access controlCompact FE for unbounded attribute-weighted sums for logspace from SXDHAdaptively secure inner product encryption from LWEUnbounded dynamic predicate compositions in ABE from standard assumptionsSuccinct and adaptively secure ABE for ABP from \(k\)-LinInner-product functional encryption with fine-grained access controlUnbounded HIBE with tight securityReceiver selective opening security for identity-based encryption in the multi-challenge settingDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHMulti-party functional encryptionABE for DFA from LWE against bounded collusions, revisitedRing-based identity based encryption -- asymptotically shorter MPK and tighter securityTowards tight adaptive security of non-interactive key exchangeNew Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public ParametersTransforming Hidden Vector Encryption Schemes from Composite to Prime Order GroupsExpanded Framework for Dual System Encryption and Its ApplicationSecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based EncryptionA Signature Scheme with Efficient Proof of ValidityCost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward SecurityIdentification Schemes from Key Encapsulation MechanismsAdaptively Secure Non-interactive Threshold CryptosystemsDecentralized Attribute-Based SignaturesEfficient Completely Context-Hiding Quotable and Linearly Homomorphic SignaturesVerifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESSequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation StudiesDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsTightly Secure IBE Under Constant-Size Master Public KeyProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsMulti-input Inner-Product Functional Encryption from PairingsSimplifying Design and Analysis of Complex Predicate Encryption SchemesIdentification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle AttacksDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsUnbounded inner product functional encryption from bilinear mapsBloom filter encryption and applications to efficient forward-secret 0-RTT key exchangeAccumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic SignaturesUnbounded inner product functional encryption from bilinear mapsAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyVerifiable Random Functions from Standard AssumptionsDéjà Q: Encore! Un Petit IBEA Study of Pair Encodings: Predicate Encryption in Prime Order GroupsFunctional Encryption Without ObfuscationFully Secure IBE with Tighter Reduction in Prime Order Bilinear GroupsTightly secure hierarchical identity-based encryptionLeakage-Resilient Functional Encryption via Pair EncodingsSecret Handshakes with Dynamic Expressive Matching PolicyChosen Ciphertext Secure Attribute-Based Encryption with Outsourced DecryptionMinicrypt primitives with algebraic structure and applicationsMore Efficient Constructions for Inner-Product EncryptionEfficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-CostAnonymous Encryption with Partial-Order Subset Delegation FunctionalityA Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order GroupsNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesDesign in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer ProgrammingCiphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user SettingNew Techniques for Dual System Encryption and Fully Secure HIBE with Short CiphertextsUnnamed ItemAn efficient IBE scheme with tight security reduction in the random oracle model




This page was built for publication: Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions