Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption

From MaRDI portal
Publication:3582755


DOI10.1007/978-3-642-14623-7_11zbMath1280.94086MaRDI QIDQ3582755

Katsuyuki Takashima, Tatsuaki Okamoto

Publication date: 24 August 2010

Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_11


94A60: Cryptography


Related Items

Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, Functional Encryption: Origins and Recent Developments, Decentralized Attribute-Based Signatures, Attribute-Based Encryption with Fast Decryption, Improved (Hierarchical) Inner-Product Encryption from Lattices, Post-Quantum Constant-Round Group Key Exchange from Static Assumptions, Fast, Compact, and Expressive Attribute-Based Encryption, Adaptive Simulation Security for Inner Product Functional Encryption, A New Functional Encryption for Multidimensional Range Query (Short Paper), Algebraic Attacks Against Several Weak Variants of GVW’13 ABE, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, Tightly Secure IBE Under Constant-Size Master Public Key, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, Unbounded inner product functional encryption from bilinear maps, Unbounded inner product functional encryption from bilinear maps, Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups, (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin, Fully adaptive decentralized multi-authority \textsf{ABE}, Unbounded quadratic functional encryption and more from pairings, Multi-key and multi-input predicate encryption from learning with errors, Hierarchical identity-based inner product functional encryption, Pattern matching in encrypted stream from inner product encryption, A practical compiler for attribute-based encryption: new decentralized constructions and more, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey, Unbounded predicate inner product functional encryption from pairings, ABE for circuits with constant-size secret keys and adaptive security, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Generalized closest substring encryption, On the security of joint signature and encryption revisited, Spatial encryption supporting non-monotone access structure, Shorter identity-based encryption via asymmetric pairings, Attribute-based encryption schemes with constant-size ciphertexts, Strongly full-hiding inner product encryption, Computational friendly attribute-based encryptions with short ciphertext, An algebraic framework for Diffie-Hellman assumptions, Verifiability-based conversion from CPA to CCA-secure predicate encryption, An expressive and provably secure ciphertext-policy attribute-based encryption, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Unbounded ABE via bilinear entropy expansion, revisited, Functional encryption for computational hiding in prime order groups via pair encodings, Adaptively simulation-secure attribute-hiding predicate encryption, Improved inner-product encryption with adaptive security and full attribute-hiding, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Implementing, and keeping in check, a DSL used in E-learning, Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \), Tightly CCA-secure inner product functional encryption scheme, Efficient fully CCA-secure predicate encryptions from pair encodings, Generic constructions for fully secure revocable attribute-based encryption, Attribute based encryption for deterministic finite automata from DLIN, Rerandomizable signatures under standard assumption, Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin, Fast, compact, and expressive attribute-based encryption, Anonymous HIBE with short ciphertexts: full security in prime order groups, A new approach to practical function-private inner product encryption, Attribute-based encryption with adaptive policy, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Anonymous and leakage resilient IBE and IPE, Automated analysis of cryptographic assumptions in generic group models, The relation and transformation between hierarchical inner product encryption and spatial encryption, Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Unbounded dynamic predicate compositions in ABE from standard assumptions, Complexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting), Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH, Fully secure unbounded zero inner product encryption with short ciphertexts and keys, Efficient attribute-based signature for monotone predicates, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe, A Study of Pair Encodings: Predicate Encryption in Prime Order Groups, Leakage-Resilient Functional Encryption via Pair Encodings, Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption, Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures, More Efficient Constructions for Inner-Product Encryption, Attribute Based Encryption with Direct Efficiency Tradeoff, A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Attribute-Based Encryption for Range Attributes, Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security, Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Verifiable Functional Encryption, Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings, Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting, Expanded Framework for Dual System Encryption and Its Application, Some Key Techniques on Pairing Vector Spaces, Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Heuristic counting of Kachisa-Schaefer-Scott curves, Revocable Decentralized Multi-Authority Functional Encryption, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, Compact (Targeted Homomorphic) Inner Product Encryption from LWE, Efficient Inner Product Encryption with Simulation-Based Security, Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption, Predicate Encryption for Circuits from LWE, Bilinear Entropy Expansion from the Decisional Linear Assumption, Attribute-based signatures for range of inner product and its applications, Key-policy ABE with switchable attributes, Multi-client functional encryption with fine-grained access control, Compact FE for unbounded attribute-weighted sums for logspace from SXDH, Identity-based matchmaking encryption from standard assumptions, Multi-input attribute based encryption and predicate encryption, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, A survey on functional encryption, Public key encryption with hierarchical authorized keyword search, Indistinguishability obfuscation