Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups

From MaRDI portal
Publication:3563829

DOI10.1007/978-3-642-13190-5_3zbMath1279.94074OpenAlexW2146689848MaRDI QIDQ3563829

David M. Freeman

Publication date: 1 June 2010

Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_3




Related Items (50)

Traitor-tracing from LWE made simple and attribute-basedBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesPredicate encryption supporting disjunctions, polynomial equations, and inner productsPublic-Key Encryption with Simulation-Based Selective-Opening Security and Compact CiphertextsConstructive \(t\)-secure homomorphic secret sharing for low degree polynomialsKey regeneration-free ciphertext-policy attribute-based encryption and its applicationNew approaches to traitor tracing with embedded identitiesRerandomizable signatures under standard assumptionEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionA survey of elliptic curves for proof systemsFully adaptive decentralized multi-authority \textsf{ABE}Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscationPattern matching in encrypted stream from inner product encryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceShorter identity-based encryption via asymmetric pairingsAn Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access StructuresDecentralized multi-authority attribute-based inner-product FE: large universe and unboundedOn the security of functional encryption in the generic group modelBatch arguments for \textsf{NP} and more from standard bilinear group assumptionsChosen ciphertext secure keyed two-level homomorphic encryptionFunctional encryption for computational hiding in prime order groups via pair encodingsAutomated analysis of cryptographic assumptions in generic group modelsThe Kernel Matrix Diffie-Hellman AssumptionEfficient zero-knowledge arguments in discrete logarithm setting: sublogarithmic proof or sublinear verifierHomomorphic secret sharing for multipartite and general adversary structures supporting parallel evaluation of low-degree polynomialsIdentity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext settingImproved hidden vector encryption with short ciphertexts and tokensDecentralized multi-client functional encryption for set intersection with improved efficiencyDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHAdaptively simulation-secure attribute-hiding predicate encryptionAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsCollusion Resistant Traitor Tracing from Learning with ErrorsThe relation and transformation between hierarchical inner product encryption and spatial encryptionTransforming Hidden Vector Encryption Schemes from Composite to Prime Order GroupsAnonymous spatial encryption under affine space delegation functionality with full securityAn algebraic framework for Diffie-Hellman assumptionsLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsAn efficient ring signature scheme from pairingsAnonymous HIBE with short ciphertexts: full security in prime order groupsSimplifying Design and Analysis of Complex Predicate Encryption SchemesSomewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesOn cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisitedConverting pairing-based cryptosystems from composite to prime order setting -- a comparative analysisDéjà Q: Encore! Un Petit IBEA Study of Pair Encodings: Predicate Encryption in Prime Order GroupsFully Secure IBE with Tighter Reduction in Prime Order Bilinear GroupsA Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order GroupsFunctional encryption for set intersection in the multi-client settingEfficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2


Uses Software





This page was built for publication: Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups