Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More

From MaRDI portal
Publication:5418716

DOI10.1007/978-3-642-55220-5_31zbMath1327.94028OpenAlexW2211075457MaRDI QIDQ5418716

Nuttapong Attrapadung

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_31




Related Items

A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryptionQuadratic secret sharing and conditional disclosure of secretsMeasuring, simulating and exploiting the head concavity phenomenon in BKZExtended dual system group and shorter unbounded hierarchical identity based encryptionBroadcast encryption with size \(N^{1/3}\) and more from \(k\)-LinCompact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper)Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based EncryptionBilinear Entropy Expansion from the Decisional Linear AssumptionSemi-adaptive Security and Bundling Functionalities Made Generic and EasyCCA-secure ABE using tag and pair encodingUnbounded ABE via bilinear entropy expansion, revisitedGeneric constructions for fully secure revocable attribute-based encryptionAttribute based encryption for deterministic finite automata from DLINBlind key-generation attribute-based encryption for general predicatesAdaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear GroupsBounded Collusion ABE for TMs from IBECompact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-LinMulti-key and multi-input predicate encryption from learning with errorsHierarchical identity-based inner product functional encryptionAdaptive Oblivious Transfer and GeneralizationDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceA practical compiler for attribute-based encryption: new decentralized constructions and moreGLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offsTinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networksFunctional encryption for computational hiding in prime order groups via pair encodingsIdentity-based matchmaking encryption from standard assumptionsMulti-input attribute based encryption and predicate encryptionA generic construction of CCA-secure attribute-based encryption with equality testConstant input attribute based (and predicate) encryption from evasive and tensor LWEGeneric conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertextsAdaptively secure inner product encryption from LWEUnbounded dynamic predicate compositions in ABE from standard assumptionsInner-product functional encryption with fine-grained access controlDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHABE for DFA from LWE against bounded collusions, revisitedA new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionAdaptively simulation-secure attribute-hiding predicate encryptionImproved inner-product encryption with adaptive security and full attribute-hidingOptimal linear multiparty conditional disclosure of secrets protocolsExpanded Framework for Dual System Encryption and Its ApplicationConditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and SeparationsVerifiability-based conversion from CPA to CCA-secure predicate encryptionLeakage-resilient attribute based encryption in prime-order groups via predicate encodingsDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsTightly Secure IBE Under Constant-Size Master Public KeySimplifying Design and Analysis of Complex Predicate Encryption SchemesPredicate signatures from pair encodings via dual system proof techniqueUnnamed ItemDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsUnbounded inner product functional encryption from bilinear mapsUnbounded inner product functional encryption from bilinear mapsCompacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionDéjà Q: Encore! Un Petit IBEA Study of Pair Encodings: Predicate Encryption in Prime Order GroupsPlacing conditional disclosure of secrets in the communication complexity universeFully Secure IBE with Tighter Reduction in Prime Order Bilinear GroupsA multi-authority approach to various predicate encryption typesSimple and efficient FE for quadratic functionsTag-based ABE in prime-order groups via pair encodingLeakage-Resilient Functional Encryption via Pair EncodingsCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Adaptively secure ABE for DFA from \(k\)-Lin and moreMore Efficient Constructions for Inner-Product EncryptionAttribute Based Encryption with Direct Efficiency TradeoffTuring Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded FunctionsMaster-key KDM-secure ABE via predicate encodingGeneric negation of pair encodingsA Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order GroupsAttribute-Based Encryption for Range AttributesEfficient fully CCA-secure predicate encryptions from pair encodings