Predicate Privacy in Encryption Systems
From MaRDI portal
Publication:3611782
DOI10.1007/978-3-642-00457-5_27zbMath1213.94133OpenAlexW2169691038MaRDI QIDQ3611782
Brent Waters, Elaine Shi, Emily S. Shen
Publication date: 3 March 2009
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-00457-5_27
Related Items (33)
Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation ⋮ Towards semantically secure outsourcing of association rule mining on categorical data ⋮ Predicate encryption supporting disjunctions, polynomial equations, and inner products ⋮ From minicrypt to obfustopia via private-key functional encryption ⋮ Predicate encryption from bilinear maps and one-sided probabilistic rank ⋮ Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption ⋮ Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric ⋮ Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation ⋮ A survey on functional encryption ⋮ Improved hidden vector encryption with short ciphertexts and tokens ⋮ Dual trapdoor identity-based encryption with keyword search ⋮ Efficient Inner Product Encryption with Simulation-Based Security ⋮ Anonymous spatial encryption under affine space delegation functionality with full security ⋮ Public-Key Encryption with Delegated Search ⋮ Functional encryption for randomized functionalities in the private-key setting from minimal assumptions ⋮ Function-private functional encryption in the private-key setting ⋮ Strongly full-hiding inner product encryption ⋮ Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions ⋮ From Minicrypt to Obfustopia via Private-Key Functional Encryption ⋮ Simplifying Design and Analysis of Complex Predicate Encryption Schemes ⋮ Generic construction of designated tester public-key encryption with keyword search ⋮ Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis ⋮ A Study of Pair Encodings: Predicate Encryption in Prime Order Groups ⋮ Multi-input Functional Encryption and Its Application in Outsourcing Computation ⋮ Match me if you can: matchmaking encryption and its applications ⋮ Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data ⋮ Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) ⋮ Non-interactive anonymous router ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption ⋮ A new approach to practical function-private inner product encryption ⋮ Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting ⋮ Obfuscation of Hyperplane Membership
This page was built for publication: Predicate Privacy in Encryption Systems