Hierarchical Predicate Encryption for Inner-Products

From MaRDI portal
Publication:3650694

DOI10.1007/978-3-642-10366-7_13zbMath1267.94089OpenAlexW1511513446MaRDI QIDQ3650694

Tatsuaki Okamoto, Katsuyuki Takashima

Publication date: 15 December 2009

Published in: Advances in Cryptology – ASIACRYPT 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-10366-7_13



Related Items

Adaptive Simulation Security for Inner Product Functional Encryption, Generalized closest substring encryption, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Efficient revocable identity-based encryption via subset difference methods, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings, Spatial encryption supporting non-monotone access structure, Shorter identity-based encryption via asymmetric pairings, Multi-authority ABE for non-monotonic access structures, Functional encryption for computational hiding in prime order groups via pair encodings, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Identity-based matchmaking encryption from standard assumptions, A survey on functional encryption, Spatial encryption revisited: from delegatable multiple inner product encryption and more, Public key encryption with hierarchical authorized keyword search, Shorter quasi-adaptive NIZK proofs for linear subspaces, Inner-product encryption under standard assumptions, Improved hidden vector encryption with short ciphertexts and tokens, Revocable hierarchical identity-based encryption via history-free approach, Fully secure unbounded zero inner product encryption with short ciphertexts and keys, Adaptively simulation-secure attribute-hiding predicate encryption, The relation and transformation between hierarchical inner product encryption and spatial encryption, Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups, Compact (Targeted Homomorphic) Inner Product Encryption from LWE, Efficient Inner Product Encryption with Simulation-Based Security, Some Key Techniques on Pairing Vector Spaces, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Revocable Identity-Based Encryption Revisited: Security Model and Construction, Improved (Hierarchical) Inner-Product Encryption from Lattices, Anonymous HIBE with short ciphertexts: full security in prime order groups, Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps, Predicate signatures from pair encodings via dual system proof technique, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts, Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, Déjà Q: Encore! Un Petit IBE, Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups, Match me if you can: matchmaking encryption and its applications, Secret Handshakes with Dynamic Expressive Matching Policy, Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \), Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, More Efficient Constructions for Inner-Product Encryption, Anonymous Encryption with Partial-Order Subset Delegation Functionality, A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Efficient fully CCA-secure predicate encryptions from pair encodings, A new approach to practical function-private inner product encryption, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting