Fully Secure Unbounded Inner-Product and Attribute-Based Encryption

From MaRDI portal
Publication:4911595

DOI10.1007/978-3-642-34961-4_22zbMath1292.94122OpenAlexW39353691MaRDI QIDQ4911595

Katsuyuki Takashima, Tatsuaki Okamoto

Publication date: 19 March 2013

Published in: Advances in Cryptology – ASIACRYPT 2012 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-34961-4_22




Related Items

Fast, Compact, and Expressive Attribute-Based EncryptionPublic-Key Puncturable Encryption: Modular and Compact ConstructionsExtended dual system group and shorter unbounded hierarchical identity based encryptionRevocable Decentralized Multi-Authority Functional EncryptionBilinear Entropy Expansion from the Decisional Linear AssumptionRevocable policy-based chameleon hashUnbounded ABE via bilinear entropy expansion, revisitedGeneric constructions for fully secure revocable attribute-based encryptionAttribute based encryption for deterministic finite automata from DLIN(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-LinCompact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-LinFully adaptive decentralized multi-authority \textsf{ABE}Pattern matching in encrypted stream from inner product encryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceGLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linUnbounded predicate inner product functional encryption from pairingsFunctional encryption for computational hiding in prime order groups via pair encodingsReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded settingKey-policy ABE with switchable attributesMulti-client functional encryption with fine-grained access controlCompact FE for unbounded attribute-weighted sums for logspace from SXDHA survey on functional encryptionUnbounded dynamic predicate compositions in ABE from standard assumptionsUnbounded HIBE with tight securityDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHPolicy-compliant signaturesFully secure unbounded zero inner product encryption with short ciphertexts and keysInner-product functional encryption from random linear codes: trial and challengesA new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionAdaptively simulation-secure attribute-hiding predicate encryptionImproved inner-product encryption with adaptive security and full attribute-hidingAchieving IND-CCA Security for Functional Encryption for Inner ProductsExpanded Framework for Dual System Encryption and Its ApplicationPractical Large Universe Attribute-Set Based Encryption in the Standard ModelFast, compact, and expressive attribute-based encryptionStrongly full-hiding inner product encryptionAn algebraic framework for Diffie-Hellman assumptionsVerifiability-based conversion from CPA to CCA-secure predicate encryptionSimplifying Design and Analysis of Complex Predicate Encryption SchemesFully secure functional encryption with a large class of relations from the decisional linear assumptionDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsUnbounded inner product functional encryption from bilinear mapsPractical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large UniverseUnbounded inner product functional encryption from bilinear mapsA Study of Pair Encodings: Predicate Encryption in Prime Order GroupsTag-based ABE in prime-order groups via pair encodingChosen Ciphertext Secure Attribute-Based Encryption with Outsourced DecryptionCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Adaptively secure ABE for DFA from \(k\)-Lin and moreAttribute Based Encryption with Direct Efficiency TradeoffMaster-key KDM-secure ABE via predicate encodingA Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order GroupsNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysAttribute-Based Encryption for Range AttributesCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityEfficient fully CCA-secure predicate encryptions from pair encodingsFormal Language Identity-based Cryptography