Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation

From MaRDI portal
Publication:3562910


DOI10.1007/978-3-642-13013-7_23zbMath1281.94013MaRDI QIDQ3562910

Benoît Libert, Nuttapong Attrapadung

Publication date: 28 May 2010

Published in: Public Key Cryptography – PKC 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13013-7_23


94A60: Cryptography


Related Items

Improved (Hierarchical) Inner-Product Encryption from Lattices, Public-Key Puncturable Encryption: Modular and Compact Constructions, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, Simplifying Design and Analysis of Complex Predicate Encryption Schemes, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Attribute-based signatures for range of inner product and its applications, Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts, Spatial encryption supporting non-monotone access structure, Attribute-based encryption schemes with constant-size ciphertexts, Anonymous spatial encryption under affine space delegation functionality with full security, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Predicate signatures from pair encodings via dual system proof technique, Optimal broadcast encryption from pairings and LWE, Generic negation of pair encodings, Efficient fully CCA-secure predicate encryptions from pair encodings, Cross-domain attribute-based access control encryption, Generic constructions for fully secure revocable attribute-based encryption, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, Doubly spatial encryption from DBDH, The relation and transformation between hierarchical inner product encryption and spatial encryption, Towards semantically secure outsourcing of association rule mining on categorical data, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Direct computation of branching programs and its applications to more efficient lattice-based cryptography, Leakage-Resilient Functional Encryption via Pair Encodings, More Efficient Constructions for Inner-Product Encryption, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Attribute-Based Encryption for Range Attributes, Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost, Anonymous Encryption with Partial-Order Subset Delegation Functionality, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Compact (Targeted Homomorphic) Inner Product Encryption from LWE