Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
From MaRDI portal
Publication:3582755
DOI10.1007/978-3-642-14623-7_11zbMath1280.94086OpenAlexW2161214158MaRDI QIDQ3582755
Katsuyuki Takashima, Tatsuaki Okamoto
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_11
Related Items
Attribute-based signatures for range of inner product and its applications, Key-policy ABE with switchable attributes, Multi-client functional encryption with fine-grained access control, Compact FE for unbounded attribute-weighted sums for logspace from SXDH, Identity-based matchmaking encryption from standard assumptions, Multi-input attribute based encryption and predicate encryption, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, A survey on functional encryption, Public key encryption with hierarchical authorized keyword search, Indistinguishability obfuscation, Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation, Fast, Compact, and Expressive Attribute-Based Encryption, Adaptive Simulation Security for Inner Product Functional Encryption, Generalized closest substring encryption, Predicate encryption supporting disjunctions, polynomial equations, and inner products, A New Functional Encryption for Multidimensional Range Query (Short Paper), Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, Revocable Decentralized Multi-Authority Functional Encryption, Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption, Predicate Encryption for Circuits from LWE, Bilinear Entropy Expansion from the Decisional Linear Assumption, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, Unbounded ABE via bilinear entropy expansion, revisited, On the security of joint signature and encryption revisited, Generic constructions for fully secure revocable attribute-based encryption, Anonymous and leakage resilient IBE and IPE, Attribute based encryption for deterministic finite automata from DLIN, Rerandomizable signatures under standard assumption, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013, Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups, (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin, Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin, Fully adaptive decentralized multi-authority \textsf{ABE}, Unbounded quadratic functional encryption and more from pairings, Multi-key and multi-input predicate encryption from learning with errors, Hierarchical identity-based inner product functional encryption, Pattern matching in encrypted stream from inner product encryption, Verifiable Functional Encryption, Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings, Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Spatial encryption supporting non-monotone access structure, Shorter identity-based encryption via asymmetric pairings, A practical compiler for attribute-based encryption: new decentralized constructions and more, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey, Unbounded predicate inner product functional encryption from pairings, Functional encryption for computational hiding in prime order groups via pair encodings, Automated analysis of cryptographic assumptions in generic group models, ABE for circuits with constant-size secret keys and adaptive security, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Attribute-based encryption schemes with constant-size ciphertexts, Unbounded dynamic predicate compositions in ABE from standard assumptions, Complexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting), Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH, Fully secure unbounded zero inner product encryption with short ciphertexts and keys, Efficient attribute-based signature for monotone predicates, Adaptively simulation-secure attribute-hiding predicate encryption, Improved inner-product encryption with adaptive security and full attribute-hiding, The relation and transformation between hierarchical inner product encryption and spatial encryption, Expanded Framework for Dual System Encryption and Its Application, Compact (Targeted Homomorphic) Inner Product Encryption from LWE, Efficient Inner Product Encryption with Simulation-Based Security, Fast, compact, and expressive attribute-based encryption, Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, Some Key Techniques on Pairing Vector Spaces, Strongly full-hiding inner product encryption, Computational friendly attribute-based encryptions with short ciphertext, An algebraic framework for Diffie-Hellman assumptions, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Functional Encryption: Origins and Recent Developments, Decentralized Attribute-Based Signatures, Attribute-Based Encryption with Fast Decryption, Improved (Hierarchical) Inner-Product Encryption from Lattices, Anonymous HIBE with short ciphertexts: full security in prime order groups, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, Tightly Secure IBE Under Constant-Size Master Public Key, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Unbounded inner product functional encryption from bilinear maps, Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe, An expressive and provably secure ciphertext-policy attribute-based encryption, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, Unbounded inner product functional encryption from bilinear maps, A Study of Pair Encodings: Predicate Encryption in Prime Order Groups, Algebraic Attacks Against Several Weak Variants of GVW’13 ABE, Implementing, and keeping in check, a DSL used in E-learning, Post-Quantum Constant-Round Group Key Exchange from Static Assumptions, Leakage-Resilient Functional Encryption via Pair Encodings, Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption, Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures, Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \), Tightly CCA-secure inner product functional encryption scheme, More Efficient Constructions for Inner-Product Encryption, Attribute Based Encryption with Direct Efficiency Tradeoff, Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost, A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Attribute-Based Encryption for Range Attributes, Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security, Efficient fully CCA-secure predicate encryptions from pair encodings, A new approach to practical function-private inner product encryption, Attribute-based encryption with adaptive policy, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes, Heuristic counting of Kachisa-Schaefer-Scott curves