Generalized Identity Based and Broadcast Encryption Schemes
From MaRDI portal
Publication:3600391
DOI10.1007/978-3-540-89255-7_28zbMath1206.94054OpenAlexW1538349060MaRDI QIDQ3600391
Publication date: 10 February 2009
Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_28
Related Items (38)
Short Attribute-Based Signatures for Threshold Predicates ⋮ Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ CCA-secure ABE using tag and pair encoding ⋮ Generic constructions for fully secure revocable attribute-based encryption ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ Efficient traceable ring signature scheme without pairings ⋮ Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption ⋮ Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps ⋮ Spatial encryption supporting non-monotone access structure ⋮ Traceable Identity-Based Group Signature ⋮ Forward-secure ID based digital signature scheme with forward-secure private key generator ⋮ Attribute-based encryption schemes with constant-size ciphertexts ⋮ Spatial encryption revisited: from delegatable multiple inner product encryption and more ⋮ Wildcarded identity-based encryption ⋮ The relation and transformation between hierarchical inner product encryption and spatial encryption ⋮ Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems ⋮ Anonymous spatial encryption under affine space delegation functionality with full security ⋮ Verifiability-based conversion from CPA to CCA-secure predicate encryption ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ Doubly spatial encryption from DBDH ⋮ Improved (Hierarchical) Inner-Product Encryption from Lattices ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings ⋮ Optimal subset-difference broadcast encryption with free riders ⋮ ACE with Compact Ciphertext Size and Decentralized Sanitizers ⋮ Adaptive-ID Secure Revocable Identity-Based Encryption ⋮ Asymmetric Group Key Agreement ⋮ Minicrypt primitives with algebraic structure and applications ⋮ Attribute Based Encryption with Direct Efficiency Tradeoff ⋮ Anonymous Encryption with Partial-Order Subset Delegation Functionality ⋮ Conjunctive Broadcast and Attribute-Based Encryption ⋮ Generic negation of pair encodings ⋮ Attribute-Based Encryption for Range Attributes ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ Sender dynamic, non-repudiable, privacy-preserving and strong secure group communication protocol ⋮ Identity-based broadcast encryption with continuous leakage resilience ⋮ Computing on authenticated data
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A forward-secure public-key encryption scheme
- Identity-Based Cryptosystems and Signature Schemes
- Conjunctive, Subset, and Range Queries on Encrypted Data
- ID-Based Blind Signature and Ring Signature from Pairings
- Hierarchical ID-Based Cryptography
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
This page was built for publication: Generalized Identity Based and Broadcast Encryption Schemes