Fuzzy Identity-Based Encryption
From MaRDI portal
Publication:5385745
DOI10.1007/11426639_27zbMath1137.94355OpenAlexW1498316612MaRDI QIDQ5385745
Publication date: 6 May 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11426639_27
Related Items
An efficient IBE scheme with tight security reduction in the random oracle model, Cryptanalysis of a CP-ABE scheme with policy in normal forms, A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency, A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption, (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps, On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate, Upgrading to functional encryption, Impossibility of simulation secure functional encryption even with random oracles, FE and iO for Turing machines from minimal assumptions, Generalized closest substring encryption, Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin, Functional encryption for Turing machines with dynamic bounded collusion from LWE, Blind attribute-based encryption and oblivious transfer with fine-grained access control, Attribute-based access control for inner product functional encryption from LWE, Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure, Optimizing registration based encryption, Cross-domain attribute-based access control encryption, Efficient attribute-based proxy re-encryption with constant size ciphertexts, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, Identity-based data storage scheme with anonymous key generation in fog computing, Unbounded ABE via bilinear entropy expansion, revisited, Anonymous IBE, leakage resilience and circular security from new assumptions, On the security of joint signature and encryption revisited, A provable secure fuzzy identity based signature scheme, A novel model for lattice-based authorized searchable encryption with special keyword, A secure ciphertext self-destruction scheme with attribute-based encryption, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications, Fully secure revocable attribute-based encryption, Functional encryption for computational hiding in prime order groups via pair encodings, Attribute-based encryption schemes with constant-size ciphertexts, Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security, Revocable hierarchical identity-based encryption via history-free approach, Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing, Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing, Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage, Accountable authority key policy attribute-based encryption, A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Improved inner-product encryption with adaptive security and full attribute-hiding, Decentralized multi-client functional encryption for inner product, Practical fully secure unrestricted inner product functional encryption modulo \(p\), Chosen ciphertext secure fuzzy identity based encryption without ROM, An efficient key-policy attribute-based encryption scheme with constant ciphertext length, Functional encryption for cubic polynomials and implementation, Adaptable key-policy attribute-based encryption with time interval, Fine-grained searchable encryption in multi-user setting, An efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control system, Minimizing locality of one-way functions via semi-private randomized encodings, Strongly full-hiding inner product encryption, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Computational friendly attribute-based encryptions with short ciphertext, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Research on ciphertext-policy attribute-based encryption with attribute level user revocation in cloud storage, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation, Flexible attribute-based proxy re-encryption for efficient data sharing, Fuzzy matching: multi-authority attribute searchable encryption without central authority, Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation, Efficient attribute-based encryption with attribute revocation for assured data deletion, Key updating technique in identity-based encryption, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Hidden attribute-based signatures without anonymity revocation, Functional encryption for cascade automata, Revocable hierarchical identity-based encryption, Secure threshold multi authority attribute based encryption without a central authority, Extensions of access structures and their cryptographic applications, An expressive and provably secure ciphertext-policy attribute-based encryption, Attribute-based key-insulated signature and its applications, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs, A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system, Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps, SEMD: secure and efficient message dissemination with policy enforcement in VANET, Attribute-based fuzzy identity access control in multicloud computing environments, Expressive attribute-based keyword search with constant-size ciphertext, Simple and efficient FE for quadratic functions, Tag-based ABE in prime-order groups via pair encoding, Forgeability of Wang-Zhu-Feng-Yau's attribute-based signature with policy-and-endorsement mechanism, Combiners for functional encryption, unconditionally, Adaptively secure ABE for DFA from \(k\)-Lin and more, Non-interactive zero knowledge from sub-exponential DDH, Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}, Unbounded multi-party computation from learning with errors, Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification, Non-interactive anonymous router, Fully secure ABE with outsourced decryption against chosen ciphertext attack, Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, Master-key KDM-secure ABE via predicate encoding, Generic negation of pair encodings, BETA: biometric-enabled threshold authentication, Steel: composable hardware-based stateful and randomised functional encryption, Efficient fully CCA-secure predicate encryptions from pair encodings, Attribute-based signcryption scheme based on linear codes, Improvement of an outsourced attribute-based encryption scheme, A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation, Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes, Verifiable registration-based encryption, Functional encryption for attribute-weighted sums from \(k\)-Lin, Amplifying the security of functional encryption, unconditionally, Dynamic decentralized functional encryption, Multi-authority attribute-based encryption with honest-but-curious central authority, Short Attribute-Based Signatures for Threshold Predicates, Predicate encryption supporting disjunctions, polynomial equations, and inner products, Survey of information security, Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing, Generic constructions for fully secure revocable attribute-based encryption, Making \textit{any} attribute-based encryption accountable, efficiently, Decentralized policy-hiding ABE with receiver privacy, ABE with improved auxiliary input for big data security, Round-optimal and communication-efficient multiparty computation, Optimal broadcast encryption and CP-ABE from evasive lattice assumptions, Dynamic collusion bounded functional encryption from identity-based encryption, Efficient revocable identity-based encryption via subset difference methods, A general framework for secure sharing of personal health records in cloud system, Key regeneration-free ciphertext-policy attribute-based encryption and its application, Efficient and secure attribute-based signature for monotone predicates, On the power of rewinding simulators in functional encryption, Optimal bounded-collusion secure functional encryption, From FE combiners to secure MPC and back, Attribute based encryption for deterministic finite automata from DLIN, Efficient ciphertext-policy attribute-based encryption with blackbox traceability, Attribute-based fine-grained access control for outscored private set intersection computation, A survey of lattice based expressive attribute based encryption, Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood), Key-Policy Multi-authority Attribute-Based Encryption, Identity-based encryption with hierarchical key-insulation in the standard model, Forward-secure revocable identity-based encryption, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Blind key-generation attribute-based encryption for general predicates, Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013, Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin, Multi-input Functional Encryption with Unbounded-Message Security, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Privacy-enhanced attribute-based private information retrieval, Wildcarded identity-based encryption, Inner-product encryption under standard assumptions, Improved hidden vector encryption with short ciphertexts and tokens, Access control encryption with efficient verifiable sanitized decryption, Key-policy attribute-based encryption against continual auxiliary input leakage, Adaptively secure inner product encryption from LWE, Succinct and adaptively secure ABE for ABP from \(k\)-Lin, Inner-product functional encryption with fine-grained access control, Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions, Decentralized multi-client functional encryption for set intersection with improved efficiency, Provably secure role-based encryption with revocation mechanism, Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH, Multi-party functional encryption, ABE for DFA from LWE against bounded collusions, revisited, Disappearing cryptography in the bounded storage model, Public key based searchable encryption with fine-grained sender permission control, Fully secure unbounded zero inner product encryption with short ciphertexts and keys, Inner-product functional encryption from random linear codes: trial and challenges, Direct computation of branching programs and its applications to more efficient lattice-based cryptography, Attribute-based optimistic fair exchange: how to restrict brokers with policies, Security-level switchable attribute-based encryption under the strictly weaker assumption family, Hierarchical attribute based encryption with continuous leakage-resilience, (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance, Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more, An efficient and revocable storage CP-ABE scheme in the cloud computing, The relation and transformation between hierarchical inner product encryption and spatial encryption, Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts, Efficient anonymous multi-group broadcast encryption, Efficient identity-based encryption with hierarchical key-insulation from HIBE, Fast, compact, and expressive attribute-based encryption, Doubly spatial encryption from DBDH, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts, Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe, Bandwidth-efficient attribute-based key-insulated signatures with message recovery, Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Functional Encryption for Turing Machines, A Study of Pair Encodings: Predicate Encryption in Prime Order Groups, Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography, A multi-authority approach to various predicate encryption types, Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Secure independent-update concise-expression access control for video on demand in cloud, Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, Secure and Traceable Framework for Data Circulation, Leakage-Resilient Functional Encryption via Pair Encodings, Secret Handshakes with Dynamic Expressive Matching Policy, Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse Resistance, Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption, Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures, Edit Distance Based Encryption and Its Application, Proxy Re-encryption with Delegatable Verifiability, Linear Encryption with Keyword Search, Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information, More Efficient Constructions for Inner-Product Encryption, Attribute Based Encryption with Direct Efficiency Tradeoff, Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions, Offline Witness Encryption, A fully distributed hierarchical attribute-based encryption scheme, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Attribute-Based Encryption for Range Attributes, Secret Sharing Schemes for Dense Forbidden Graphs, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security, A new approach to practical function-private inner product encryption, Attribute-based encryption with adaptive policy, Privacy-preserving encryption scheme using DNA parentage test, Multi-authority ABE for non-monotonic access structures, Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded, GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, On the security of functional encryption in the generic group model, Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey, TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks, Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices, Bounded functional encryption for Turing machines: adaptive security from general assumptions, Multi-authority ABE from lattices without random oracles, ABE for circuits with constant-size secret keys and adaptive security, Multi-input quadratic functional encryption: stronger security, broader functionality, Fully-secure MPC with minimal trust, Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Functional encryption with secure key leasing, Attribute-based signatures for range of inner product and its applications, Multi-client functional encryption with fine-grained access control, Collusion-resistant functional encryption for RAMs, Traceable receipt-free encryption, (Inner-product) functional encryption with updatable ciphertexts, Multi-input attribute based encryption and predicate encryption, Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication, Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits, A survey on functional encryption, More efficient verifiable functional encryption, Achieving privacy-preserving sensitive attributes for large universe based on private set intersection, Complementary set encryption for privacy-preserving data consolidation, Streaming functional encryption, Attribute-based multi-input FE (and more) for attribute-weighted sums, How to use (plain) witness encryption: registered ABE, flexible broadcast, and more, Constant input attribute based (and predicate) encryption from evasive and tensor LWE, \(\mathrm{mR}_{\mathrm{LWE}}\)-CP-ABE: a revocable CP-ABE for post-quantum cryptography, Indistinguishability obfuscation, Key escrow-free attribute based encryption with user revocation, Hierarchical and non-monotonic key-policy attribute-based encryption and its application, Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts, Attribute-Based Keyword Search from Lattices, Generic Constructions of Revocable Identity-Based Encryption, Fast, Compact, and Expressive Attribute-Based Encryption, Adaptive Simulation Security for Inner Product Functional Encryption, Verifiable Inner Product Encryption Scheme, CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles, Extensions of IBE and Related Primitives, Attribute-Based Encryption, Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper), A New Functional Encryption for Multidimensional Range Query (Short Paper), Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, Revocable Decentralized Multi-Authority Functional Encryption, Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption, Predicate Encryption for Circuits from LWE, Bilinear Entropy Expansion from the Decisional Linear Assumption, From Selective to Adaptive Security in Functional Encryption, A Punctured Programming Approach to Adaptively Secure Functional Encryption, Targeted Homomorphic Attribute-Based Encryption, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, Single-Key to Multi-Key Functional Encryption with Polynomial Loss, Reducing elliptic curve logarithms to logarithms in a finite field, Bounded-collusion decentralized ABE with sublinear parameters, Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups, Bounded Collusion ABE for TMs from IBE, Compressed $$\varSigma $$-Protocols for Bilinear Group Arithmetic Circuits and Application to Logarithmic Transparent Threshold Signatures, Quantum attribute-based encryption: a comprehensive study, Multi-input non-interactive functional encryption: constructions and applications, Fully adaptive decentralized multi-authority \textsf{ABE}, On the optimal succinctness and efficiency of functional encryption and attribute-based encryption, Registered attribute-based encryption, Forward and backward secure keyword search with flexible keyword shielding, Verifiable Functional Encryption, Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings, Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness, Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation, An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures, Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update, One-Round Attribute-Based Key Exchange in the Multi-party Setting, A practical compiler for attribute-based encryption: new decentralized constructions and more, Unlinkable policy-based sanitizable signatures, Attribute-Based Broadcast Encryption Scheme Made Efficient, Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures, On the Security of a Searchable Anonymous Attribute Based Encryption, Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud, One-Round Attribute-Based Key Exchange in the Multi-Party Setting, Ciphertext-policy attribute-based encryption for general circuits from bilinear maps, Achieving IND-CCA Security for Functional Encryption for Inner Products, Expanded Framework for Dual System Encryption and Its Application, Server-Aided Directly Revocable Ciphertext-Policy Attribute-Based Encryption with Verifiable Delegation, Practical Large Universe Attribute-Set Based Encryption in the Standard Model, Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata, Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations, Secret-Sharing Schemes: A Survey, Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security, Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems, Functional Encryption: Origins and Recent Developments, Attribute-Based Encryption with Fast Decryption, Revocable Identity-Based Encryption Revisited: Security Model and Construction, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions, Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions, Access Control Encryption for Equality, Comparison, and More, Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps, Private Puncturable PRFs from Standard Lattice Assumptions, Multi-input Inner-Product Functional Encryption from Pairings, Simplifying Design and Analysis of Complex Predicate Encryption Schemes, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, Cryptography with Updates, Multi-Identity Single-Key Decryption without Random Oracles, The communication complexity of private simultaneous messages, revisited, Watermarking cryptographic functionalities from standard lattice assumptions, Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness, Multi-key Hierarchical Identity-Based Signatures, Obfustopia built on secret-key functional encryption, Algebraic Attacks Against Several Weak Variants of GVW’13 ABE, Functional Encryption for Cascade Automata (Extended Abstract), Match me if you can: matchmaking encryption and its applications, Attribute-Based Signatures, Multi-identity management for identity-based cryptography, Adaptive-ID Secure Revocable Identity-Based Encryption, Adaptive oblivious transfer with access control from lattice assumptions, Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters’ IBE Scheme, A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing, RSA cryptosystem with fuzzy set theory for encryption and decryption, Minicrypt primitives with algebraic structure and applications, Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems, Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost, Anonymous Encryption with Partial-Order Subset Delegation Functionality, Conjunctive Broadcast and Attribute-Based Encryption, A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME, Privacy-Aware Attribute-Based Encryption with User Accountability, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Publicly Verifiable Secret Sharing for Cloud-Based Key Management, Computing $(\ell ,\ell )$-isogenies in polynomial time on Jacobians of genus $2$ curves, A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low, Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority, Unnamed Item, Formal Language Identity-based Cryptography, Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software