Simplifying Design and Analysis of Complex Predicate Encryption Schemes
From MaRDI portal
Publication:5738892
DOI10.1007/978-3-319-56620-7_22zbMath1411.94045OpenAlexW2603048639MaRDI QIDQ5738892
Shashank Agrawal, Melissa Chase
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-56620-7_22
Related Items
A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption, Fast, Compact, and Expressive Attribute-Based Encryption, CCA-secure ABE using tag and pair encoding, Blind key-generation attribute-based encryption for general predicates, Bounded Collusion ABE for TMs from IBE, Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, A practical compiler for attribute-based encryption: new decentralized constructions and more, GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs, TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks, A generic construction of CCA-secure attribute-based encryption with equality test, Unbounded dynamic predicate compositions in ABE from standard assumptions, Inner-product functional encryption with fine-grained access control, Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH, ABE for DFA from LWE against bounded collusions, revisited, A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Improved inner-product encryption with adaptive security and full attribute-hiding, Fast, compact, and expressive attribute-based encryption, Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, A multi-authority approach to various predicate encryption types, Match me if you can: matchmaking encryption and its applications, Simple and efficient FE for quadratic functions, Tag-based ABE in prime-order groups via pair encoding, Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \), Adaptively secure ABE for DFA from \(k\)-Lin and more, Master-key KDM-secure ABE via predicate encoding, Generic negation of pair encodings
Cites Work
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
- Functional Encryption Without Obfuscation
- Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
- Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
- Functional Encryption for Regular Languages
- Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings
- Unbounded HIBE and Attribute-Based Encryption
- Decentralizing Attribute-Based Encryption
- Secret-Sharing Schemes: A Survey
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Bilinear Entropy Expansion from the Decisional Linear Assumption
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Multi-authority Attribute Based Encryption
- Predicate Privacy in Encryption Systems
- Attribute-Based Functional Encryption on Lattices
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
- Fuzzy Identity-Based Encryption
- A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
- Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Attribute-based encryption for circuits
- Dual System Encryption via Predicate Encodings