Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
From MaRDI portal
Publication:3563830
DOI10.1007/978-3-642-13190-5_4zbMath1279.94095OpenAlexW177444027MaRDI QIDQ3563830
Amit Sahai, Allison Lewko, Brent Waters, Tatsuaki Okamoto, Katsuyuki Takashima
Publication date: 1 June 2010
Published in: Advances in Cryptology – EUROCRYPT 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13190-5_4
Related Items
Short Attribute-Based Signatures for Threshold Predicates, Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation, Fast, Compact, and Expressive Attribute-Based Encryption, Adaptive Simulation Security for Inner Product Functional Encryption, Verifiable Inner Product Encryption Scheme, Attribute-Based Encryption, A New Functional Encryption for Multidimensional Range Query (Short Paper), Generic Framework for Attribute-Based Group Signature, Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption, Bilinear Entropy Expansion from the Decisional Linear Assumption, From Selective to Adaptive Security in Functional Encryption, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, Key-Policy Multi-authority Attribute-Based Encryption, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups, (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin, Quantum attribute-based encryption: a comprehensive study, Fully adaptive decentralized multi-authority \textsf{ABE}, Registered attribute-based encryption, Multi-key and multi-input predicate encryption from learning with errors, Hierarchical identity-based inner product functional encryption, Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings, Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting, Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions, Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps, Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation, An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures, Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey, Attribute based tracing for securing group signatures against centralized authorities, ABE for circuits with constant-size secret keys and adaptive security, Adaptive multiparty NIKE, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding, Key-policy ABE with switchable attributes, Compact FE for unbounded attribute-weighted sums for logspace from SXDH, Identity-based matchmaking encryption from standard assumptions, Multi-input attribute based encryption and predicate encryption, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, A survey on functional encryption, (Augmented) broadcast encryption from identity based encryption with wildcard, A generic construction of CCA-secure attribute-based encryption with equality test, Additive-homomorphic functional commitments and applications to homomorphic signatures, Public key encryption with hierarchical authorized keyword search, Achieving privacy-preserving sensitive attributes for large universe based on private set intersection, Hierarchical and non-monotonic key-policy attribute-based encryption and its application, Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud, Confidentiality-Preserving Publicly Verifiable Computation, Achieving IND-CCA Security for Functional Encryption for Inner Products, Expanded Framework for Dual System Encryption and Its Application, Compact (Targeted Homomorphic) Inner Product Encryption from LWE, Practical Large Universe Attribute-Set Based Encryption in the Standard Model, Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model, Some Key Techniques on Pairing Vector Spaces, Adaptively Secure Non-interactive Threshold Cryptosystems, Functional Encryption: Origins and Recent Developments, Attribute-Based Encryption with Fast Decryption, Improved (Hierarchical) Inner-Product Encryption from Lattices, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions, Tightly Secure IBE Under Constant-Size Master Public Key, Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, Algebraic Attacks Against Several Weak Variants of GVW’13 ABE, Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost, Anonymous Encryption with Partial-Order Subset Delegation Functionality, A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Unnamed Item, Efficient subtree-based encryption for fuzzy-entity data sharing, Generalized closest substring encryption, Towards semantically secure outsourcing of association rule mining on categorical data, Extended dual system group and shorter unbounded hierarchical identity based encryption, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Attribute-based versions of Schnorr and ElGamal, Revocable policy-based chameleon hash, Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure, CCA-secure ABE using tag and pair encoding, Unbounded ABE via bilinear entropy expansion, revisited, Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing, On the security of joint signature and encryption revisited, A novel model for lattice-based authorized searchable encryption with special keyword, ABE with improved auxiliary input for big data security, Efficient revocable identity-based encryption via subset difference methods, A general framework for secure sharing of personal health records in cloud system, On the power of rewinding simulators in functional encryption, Anonymous and leakage resilient IBE and IPE, Predicate encryption from bilinear maps and one-sided probabilistic rank, Attribute based encryption for deterministic finite automata from DLIN, Efficient ciphertext-policy attribute-based encryption with blackbox traceability, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Blind key-generation attribute-based encryption for general predicates, Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013, Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Spatial encryption supporting non-monotone access structure, New results and applications for multi-secret sharing schemes, Shorter identity-based encryption via asymmetric pairings, Fully secure revocable attribute-based encryption, Functional encryption for computational hiding in prime order groups via pair encodings, Attribute-based encryption schemes with constant-size ciphertexts, Relations between semantic security and anonymity in identity-based encryption, Inner-product encryption under standard assumptions, Key-policy attribute-based encryption against continual auxiliary input leakage, Adaptively secure inner product encryption from LWE, Succinct and adaptively secure ABE for ABP from \(k\)-Lin, Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing, Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing, Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH, Accountable authority key policy attribute-based encryption, Fully secure unbounded zero inner product encryption with short ciphertexts and keys, A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Attribute-based signatures from RSA, Adaptively simulation-secure attribute-hiding predicate encryption, Improved inner-product encryption with adaptive security and full attribute-hiding, Hierarchical attribute based encryption with continuous leakage-resilience, The relation and transformation between hierarchical inner product encryption and spatial encryption, Efficient anonymous multi-group broadcast encryption, Fast, compact, and expressive attribute-based encryption, Anonymous spatial encryption under affine space delegation functionality with full security, Strongly full-hiding inner product encryption, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Computational friendly attribute-based encryptions with short ciphertext, An algebraic framework for Diffie-Hellman assumptions, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Research on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage, Doubly spatial encryption from DBDH, Anonymous HIBE with short ciphertexts: full security in prime order groups, Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation, Predicate signatures from pair encodings via dual system proof technique, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe, Bandwidth-efficient attribute-based key-insulated signatures with message recovery, An expressive and provably secure ciphertext-policy attribute-based encryption, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system, Déjà Q: Encore! Un Petit IBE, A Study of Pair Encodings: Predicate Encryption in Prime Order Groups, Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups, Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps, SEMD: secure and efficient message dissemination with policy enforcement in VANET, A multi-authority approach to various predicate encryption types, Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data, Tag-based ABE in prime-order groups via pair encoding, Leakage-Resilient Functional Encryption via Pair Encodings, Secret Handshakes with Dynamic Expressive Matching Policy, Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance, Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption, Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures, Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \), Tightly CCA-secure inner product functional encryption scheme, Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}, Fully secure ABE with outsourced decryption against chosen ciphertext attack, Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, Attribute Based Encryption with Direct Efficiency Tradeoff, A fully distributed hierarchical attribute-based encryption scheme, A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Attribute-Based Encryption for Range Attributes, Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security, Efficient fully CCA-secure predicate encryptions from pair encodings, A new approach to practical function-private inner product encryption, A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation, Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes, Towards secure data retrieval for multi-tenant architecture using attribute-based key word search, Still wrong use of pairings in cryptography, Computing on authenticated data, Privacy-preserving encryption scheme using DNA parentage test