Hierarchical Predicate Encryption for Inner-Products

From MaRDI portal
Publication:3650694


DOI10.1007/978-3-642-10366-7_13zbMath1267.94089MaRDI QIDQ3650694

Tatsuaki Okamoto, Katsuyuki Takashima

Publication date: 15 December 2009

Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_13


94A60: Cryptography


Related Items

Revocable Identity-Based Encryption Revisited: Security Model and Construction, Improved (Hierarchical) Inner-Product Encryption from Lattices, Adaptive Simulation Security for Inner Product Functional Encryption, Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps, Match me if you can: matchmaking encryption and its applications, Multi-authority ABE for non-monotonic access structures, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Identity-based matchmaking encryption from standard assumptions, A survey on functional encryption, Spatial encryption revisited: from delegatable multiple inner product encryption and more, Public key encryption with hierarchical authorized keyword search, Generalized closest substring encryption, Spatial encryption supporting non-monotone access structure, Shorter identity-based encryption via asymmetric pairings, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Revocable hierarchical identity-based encryption via history-free approach, Functional encryption for computational hiding in prime order groups via pair encodings, Shorter quasi-adaptive NIZK proofs for linear subspaces, Adaptively simulation-secure attribute-hiding predicate encryption, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis, Predicate signatures from pair encodings via dual system proof technique, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \), Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, Efficient fully CCA-secure predicate encryptions from pair encodings, Anonymous HIBE with short ciphertexts: full security in prime order groups, A new approach to practical function-private inner product encryption, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Efficient revocable identity-based encryption via subset difference methods, Inner-product encryption under standard assumptions, Improved hidden vector encryption with short ciphertexts and tokens, The relation and transformation between hierarchical inner product encryption and spatial encryption, Fully secure unbounded zero inner product encryption with short ciphertexts and keys, Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts, Déjà Q: Encore! Un Petit IBE, Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups, Secret Handshakes with Dynamic Expressive Matching Policy, More Efficient Constructions for Inner-Product Encryption, A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings, Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups, Some Key Techniques on Pairing Vector Spaces, Anonymous Encryption with Partial-Order Subset Delegation Functionality, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Compact (Targeted Homomorphic) Inner Product Encryption from LWE, Efficient Inner Product Encryption with Simulation-Based Security