Predicate Privacy in Encryption Systems

From MaRDI portal
Publication:3611782

DOI10.1007/978-3-642-00457-5_27zbMath1213.94133OpenAlexW2169691038MaRDI QIDQ3611782

Brent Waters, Elaine Shi, Emily S. Shen

Publication date: 3 March 2009

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-00457-5_27




Related Items (33)

Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of ComputationTowards semantically secure outsourcing of association rule mining on categorical dataPredicate encryption supporting disjunctions, polynomial equations, and inner productsFrom minicrypt to obfustopia via private-key functional encryptionPredicate encryption from bilinear maps and one-sided probabilistic rankEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionMulti random projection inner product encryption, applications to proximity searchable encryption for the iris biometricSecure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementationA survey on functional encryptionImproved hidden vector encryption with short ciphertexts and tokensDual trapdoor identity-based encryption with keyword searchEfficient Inner Product Encryption with Simulation-Based SecurityAnonymous spatial encryption under affine space delegation functionality with full securityPublic-Key Encryption with Delegated SearchFunctional encryption for randomized functionalities in the private-key setting from minimal assumptionsFunction-private functional encryption in the private-key settingStrongly full-hiding inner product encryptionMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionSimplifying Design and Analysis of Complex Predicate Encryption SchemesGeneric construction of designated tester public-key encryption with keyword searchConverting pairing-based cryptosystems from composite to prime order setting -- a comparative analysisA Study of Pair Encodings: Predicate Encryption in Prime Order GroupsMulti-input Functional Encryption and Its Application in Outsourcing ComputationMatch me if you can: matchmaking encryption and its applicationsEnabling efficient and verifiable multi-keyword ranked search over encrypted cloud dataCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Non-interactive anonymous routerNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysTWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable EncryptionA new approach to practical function-private inner product encryptionCiphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user SettingObfuscation of Hyperplane Membership




This page was built for publication: Predicate Privacy in Encryption Systems