Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
From MaRDI portal
Publication:4911595
DOI10.1007/978-3-642-34961-4_22zbMath1292.94122OpenAlexW39353691MaRDI QIDQ4911595
Katsuyuki Takashima, Tatsuaki Okamoto
Publication date: 19 March 2013
Published in: Advances in Cryptology – ASIACRYPT 2012 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34961-4_22
Related Items
Fast, Compact, and Expressive Attribute-Based Encryption ⋮ Public-Key Puncturable Encryption: Modular and Compact Constructions ⋮ Extended dual system group and shorter unbounded hierarchical identity based encryption ⋮ Revocable Decentralized Multi-Authority Functional Encryption ⋮ Bilinear Entropy Expansion from the Decisional Linear Assumption ⋮ Revocable policy-based chameleon hash ⋮ Unbounded ABE via bilinear entropy expansion, revisited ⋮ Generic constructions for fully secure revocable attribute-based encryption ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin ⋮ Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin ⋮ Fully adaptive decentralized multi-authority \textsf{ABE} ⋮ Pattern matching in encrypted stream from inner product encryption ⋮ Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings ⋮ Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ Unbounded predicate inner product functional encryption from pairings ⋮ Functional encryption for computational hiding in prime order groups via pair encodings ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ Key-policy ABE with switchable attributes ⋮ Multi-client functional encryption with fine-grained access control ⋮ Compact FE for unbounded attribute-weighted sums for logspace from SXDH ⋮ A survey on functional encryption ⋮ Unbounded dynamic predicate compositions in ABE from standard assumptions ⋮ Unbounded HIBE with tight security ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ Policy-compliant signatures ⋮ Fully secure unbounded zero inner product encryption with short ciphertexts and keys ⋮ Inner-product functional encryption from random linear codes: trial and challenges ⋮ A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Adaptively simulation-secure attribute-hiding predicate encryption ⋮ Improved inner-product encryption with adaptive security and full attribute-hiding ⋮ Achieving IND-CCA Security for Functional Encryption for Inner Products ⋮ Expanded Framework for Dual System Encryption and Its Application ⋮ Practical Large Universe Attribute-Set Based Encryption in the Standard Model ⋮ Fast, compact, and expressive attribute-based encryption ⋮ Strongly full-hiding inner product encryption ⋮ An algebraic framework for Diffie-Hellman assumptions ⋮ Verifiability-based conversion from CPA to CCA-secure predicate encryption ⋮ Simplifying Design and Analysis of Complex Predicate Encryption Schemes ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ A Study of Pair Encodings: Predicate Encryption in Prime Order Groups ⋮ Tag-based ABE in prime-order groups via pair encoding ⋮ Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption ⋮ Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) ⋮ Adaptively secure ABE for DFA from \(k\)-Lin and more ⋮ Attribute Based Encryption with Direct Efficiency Tradeoff ⋮ Master-key KDM-secure ABE via predicate encoding ⋮ A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ Attribute-Based Encryption for Range Attributes ⋮ Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ Formal Language Identity-based Cryptography