Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
From MaRDI portal
Publication:5418716
DOI10.1007/978-3-642-55220-5_31zbMath1327.94028OpenAlexW2211075457MaRDI QIDQ5418716
Publication date: 27 May 2014
Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_31
Related Items
A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption ⋮ Quadratic secret sharing and conditional disclosure of secrets ⋮ Measuring, simulating and exploiting the head concavity phenomenon in BKZ ⋮ Extended dual system group and shorter unbounded hierarchical identity based encryption ⋮ Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin ⋮ Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper) ⋮ Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption ⋮ Bilinear Entropy Expansion from the Decisional Linear Assumption ⋮ Semi-adaptive Security and Bundling Functionalities Made Generic and Easy ⋮ CCA-secure ABE using tag and pair encoding ⋮ Unbounded ABE via bilinear entropy expansion, revisited ⋮ Generic constructions for fully secure revocable attribute-based encryption ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ Blind key-generation attribute-based encryption for general predicates ⋮ Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups ⋮ Bounded Collusion ABE for TMs from IBE ⋮ Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin ⋮ Multi-key and multi-input predicate encryption from learning with errors ⋮ Hierarchical identity-based inner product functional encryption ⋮ Adaptive Oblivious Transfer and Generalization ⋮ Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings ⋮ Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ A practical compiler for attribute-based encryption: new decentralized constructions and more ⋮ GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs ⋮ TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks ⋮ Functional encryption for computational hiding in prime order groups via pair encodings ⋮ Identity-based matchmaking encryption from standard assumptions ⋮ Multi-input attribute based encryption and predicate encryption ⋮ A generic construction of CCA-secure attribute-based encryption with equality test ⋮ Constant input attribute based (and predicate) encryption from evasive and tensor LWE ⋮ Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts ⋮ Adaptively secure inner product encryption from LWE ⋮ Unbounded dynamic predicate compositions in ABE from standard assumptions ⋮ Inner-product functional encryption with fine-grained access control ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ ABE for DFA from LWE against bounded collusions, revisited ⋮ A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Adaptively simulation-secure attribute-hiding predicate encryption ⋮ Improved inner-product encryption with adaptive security and full attribute-hiding ⋮ Optimal linear multiparty conditional disclosure of secrets protocols ⋮ Expanded Framework for Dual System Encryption and Its Application ⋮ Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations ⋮ Verifiability-based conversion from CPA to CCA-secure predicate encryption ⋮ Leakage-resilient attribute based encryption in prime-order groups via predicate encodings ⋮ Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits ⋮ Tightly Secure IBE Under Constant-Size Master Public Key ⋮ Simplifying Design and Analysis of Complex Predicate Encryption Schemes ⋮ Predicate signatures from pair encodings via dual system proof technique ⋮ Unnamed Item ⋮ Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption ⋮ Déjà Q: Encore! Un Petit IBE ⋮ A Study of Pair Encodings: Predicate Encryption in Prime Order Groups ⋮ Placing conditional disclosure of secrets in the communication complexity universe ⋮ Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups ⋮ A multi-authority approach to various predicate encryption types ⋮ Simple and efficient FE for quadratic functions ⋮ Tag-based ABE in prime-order groups via pair encoding ⋮ Leakage-Resilient Functional Encryption via Pair Encodings ⋮ Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) ⋮ Adaptively secure ABE for DFA from \(k\)-Lin and more ⋮ More Efficient Constructions for Inner-Product Encryption ⋮ Attribute Based Encryption with Direct Efficiency Tradeoff ⋮ Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions ⋮ Master-key KDM-secure ABE via predicate encoding ⋮ Generic negation of pair encodings ⋮ A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups ⋮ Attribute-Based Encryption for Range Attributes ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings