Attribute-based encryption schemes with constant-size ciphertexts
From MaRDI portal
Publication:417988
DOI10.1016/j.tcs.2011.12.004zbMath1259.94043OpenAlexW2034382123WikidataQ56659680 ScholiaQ56659680MaRDI QIDQ417988
Fabien Laguillaumie, Benoît Libert, Nuttapong Attrapadung, Javier Herranz, Elie de Panafieu, Carla Ràfols
Publication date: 14 May 2012
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2011.12.004
efficiencypublic-key cryptographyexpressivityprovable securityattribute-based encryptionaccess control
Related Items
Cryptanalysis of a CP-ABE scheme with policy in normal forms, Efficient ciphertext-policy attribute-based encryption with blackbox traceability, Key-Policy Multi-authority Attribute-Based Encryption, New results and applications for multi-secret sharing schemes, Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update, A survey on functional encryption, Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts, Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing, An efficient key-policy attribute-based encryption scheme with constant ciphertext length, Computational friendly attribute-based encryptions with short ciphertext, Attribute-Based Encryption with Fast Decryption, Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Bandwidth-efficient attribute-based key-insulated signatures with message recovery, Attribute-Based Encryption for Range Attributes, Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes, New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
Cites Work
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Functional Encryption: Definitions and Challenges
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Conjunctive Broadcast and Attribute-Based Encryption
- Bounded Ciphertext Policy Attribute Based Encryption
- Constant Size Ciphertexts in Threshold Attribute-Based Encryption
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Security Analysis of the Strong Diffie-Hellman Problem
- Multi-authority Attribute Based Encryption
- Dynamic Threshold Public-Key Encryption
- Generalized Identity Based and Broadcast Encryption Schemes
- Identity-Based Encryption from the Weil Pairing
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- Advances in Cryptology - CRYPTO 2003
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys
- General Ad Hoc Encryption from Exponent Inversion IBE
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- A ciphertext-policy attribute-based encryption scheme with constant ciphertext length