Generalized Identity Based and Broadcast Encryption Schemes

From MaRDI portal
Publication:3600391

DOI10.1007/978-3-540-89255-7_28zbMath1206.94054OpenAlexW1538349060MaRDI QIDQ3600391

Mike Hamburg, Dan Boneh

Publication date: 10 February 2009

Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_28




Related Items (38)

Short Attribute-Based Signatures for Threshold PredicatesEfficient subtree-based encryption for fuzzy-entity data sharingCCA-secure ABE using tag and pair encodingGeneric constructions for fully secure revocable attribute-based encryptionAttribute based encryption for deterministic finite automata from DLINEfficient traceable ring signature scheme without pairingsAchieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryptionPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsSpatial encryption supporting non-monotone access structureTraceable Identity-Based Group SignatureForward-secure ID based digital signature scheme with forward-secure private key generatorAttribute-based encryption schemes with constant-size ciphertextsSpatial encryption revisited: from delegatable multiple inner product encryption and moreWildcarded identity-based encryptionThe relation and transformation between hierarchical inner product encryption and spatial encryptionEfficient identity-based broadcast encryption with keyword search against insider attacks for database systemsAnonymous spatial encryption under affine space delegation functionality with full securityVerifiability-based conversion from CPA to CCA-secure predicate encryptionLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsDoubly spatial encryption from DBDHImproved (Hierarchical) Inner-Product Encryption from LatticesAnonymous HIBE with short ciphertexts: full security in prime order groupsFully secure functional encryption with a large class of relations from the decisional linear assumptionDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsOptimal subset-difference broadcast encryption with free ridersACE with Compact Ciphertext Size and Decentralized SanitizersAdaptive-ID Secure Revocable Identity-Based EncryptionAsymmetric Group Key AgreementMinicrypt primitives with algebraic structure and applicationsAttribute Based Encryption with Direct Efficiency TradeoffAnonymous Encryption with Partial-Order Subset Delegation FunctionalityConjunctive Broadcast and Attribute-Based EncryptionGeneric negation of pair encodingsAttribute-Based Encryption for Range AttributesEfficient fully CCA-secure predicate encryptions from pair encodingsSender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocolIdentity-based broadcast encryption with continuous leakage resilienceComputing on authenticated data



Cites Work


This page was built for publication: Generalized Identity Based and Broadcast Encryption Schemes