Simplifying design and analysis of complex predicate encryption schemes
From MaRDI portal
Publication:5738892
Recommendations
- A study of pair encodings: predicate encryption in prime order groups
- Construction of fully CCA-secure predicate encryptions from pair encoding schemes
- Predicate signatures from pair encodings via dual system proof technique
- Generic transformations of predicate encodings: constructions and applications
- Dual System Encryption via Predicate Encodings
Cites work
- A framework and compact constructions for non-monotonic attribute-based encryption
- A punctured programming approach to adaptively secure functional encryption
- A study of pair encodings: predicate encryption in prime order groups
- Attribute-based encryption for circuits
- Attribute-based functional encryption on lattices
- Bilinear entropy expansion from the decisional linear assumption
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs
- Converting pairing-based cryptosystems from composite-order groups to prime-order groups
- Decentralizing attribute-based encryption
- Dual System Encryption via Predicate Encodings
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Dual system encryption framework in prime-order groups via computational pair encodings
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- Dynamic credentials and ciphertext delegation for attribute-based encryption
- Expressive key-policy attribute-based encryption with constant-size ciphertexts
- Fully secure unbounded inner-product and attribute-based encryption
- Function-private identity-based encryption: hiding the function in functional encryption
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- Functional encryption for regular languages
- Functional encryption without obfuscation
- Fuzzy Identity-Based Encryption
- Improved dual system ABE in prime-order groups via predicate encodings
- Multi-authority Attribute Based Encryption
- New proof methods for attribute-based encryption: achieving full security through selective techniques
- Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Predicate Privacy in Encryption Systems
- Secret-Sharing Schemes: A Survey
- Semi-adaptive attribute-based encryption and improved delegation for Boolean formula
- Tools for simulating features of composite order bilinear groups in the prime order setting
- Unbounded HIBE and Attribute-Based Encryption
Cited in
(32)- A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption
- A practical compiler for attribute-based encryption: new decentralized constructions and more
- CCA-secure predicate encryption from pair encoding in prime order groups: generic and efficient
- Bounded Collusion ABE for TMs from IBE
- Construction of fully CCA-secure predicate encryptions from pair encoding schemes
- GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs
- Fast, compact, and expressive attribute-based encryption
- Fast, compact, and expressive attribute-based encryption
- An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs
- A generic construction of CCA-secure attribute-based encryption with equality test
- Match me if you can: matchmaking encryption and its applications
- Simple and efficient FE for quadratic functions
- Adaptively secure ABE for DFA from \(k\)-Lin and more
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)
- CCA-secure ABE using tag and pair encoding
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin
- Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
- Generic negation of pair encodings
- Master-key KDM-secure ABE via predicate encoding
- Unbounded dynamic predicate compositions in ABE from standard assumptions
- TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- A multi-authority approach to various predicate encryption types
- A modular approach to registered ABE for unbounded predicates
- Inner-product functional encryption with fine-grained access control
- ABE for DFA from LWE against bounded collusions, revisited
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
- Blind key-generation attribute-based encryption for general predicates
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
- Improved inner-product encryption with adaptive security and full attribute-hiding
- Tag-based ABE in prime-order groups via pair encoding
- A study of pair encodings: predicate encryption in prime order groups
This page was built for publication: Simplifying design and analysis of complex predicate encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5738892)