Simplifying design and analysis of complex predicate encryption schemes
From MaRDI portal
Publication:5738892
DOI10.1007/978-3-319-56620-7_22zbMATH Open1411.94045OpenAlexW2603048639MaRDI QIDQ5738892FDOQ5738892
Authors: Shashank Agrawal, Melissa Chase
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-56620-7_22
Recommendations
- A study of pair encodings: predicate encryption in prime order groups
- Construction of fully CCA-secure predicate encryptions from pair encoding schemes
- Predicate signatures from pair encodings via dual system proof technique
- Generic transformations of predicate encodings: constructions and applications
- Dual System Encryption via Predicate Encodings
Cites Work
- Dynamic credentials and ciphertext delegation for attribute-based encryption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Fuzzy Identity-Based Encryption
- Secret-Sharing Schemes: A Survey
- Functional encryption for regular languages
- Multi-authority Attribute Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Attribute-based encryption for circuits
- Tools for simulating features of composite order bilinear groups in the prime order setting
- Converting pairing-based cryptosystems from composite-order groups to prime-order groups
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- New proof methods for attribute-based encryption: achieving full security through selective techniques
- Expressive key-policy attribute-based encryption with constant-size ciphertexts
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- Decentralizing attribute-based encryption
- Function-private identity-based encryption: hiding the function in functional encryption
- Unbounded HIBE and Attribute-Based Encryption
- Predicate Privacy in Encryption Systems
- Fully secure unbounded inner-product and attribute-based encryption
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- Dual System Encryption via Predicate Encodings
- Functional encryption without obfuscation
- A punctured programming approach to adaptively secure functional encryption
- Semi-adaptive attribute-based encryption and improved delegation for Boolean formula
- Improved dual system ABE in prime-order groups via predicate encodings
- Dual system encryption framework in prime-order groups via computational pair encodings
- Bilinear entropy expansion from the decisional linear assumption
- Attribute-based functional encryption on lattices
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations
- A study of pair encodings: predicate encryption in prime order groups
- Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs
- A framework and compact constructions for non-monotonic attribute-based encryption
Cited In (32)
- A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption
- A practical compiler for attribute-based encryption: new decentralized constructions and more
- CCA-secure predicate encryption from pair encoding in prime order groups: generic and efficient
- Bounded Collusion ABE for TMs from IBE
- GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs
- Construction of fully CCA-secure predicate encryptions from pair encoding schemes
- Fast, compact, and expressive attribute-based encryption
- Fast, compact, and expressive attribute-based encryption
- An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs
- A generic construction of CCA-secure attribute-based encryption with equality test
- Match me if you can: matchmaking encryption and its applications
- Simple and efficient FE for quadratic functions
- Adaptively secure ABE for DFA from \(k\)-Lin and more
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)
- CCA-secure ABE using tag and pair encoding
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin
- Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
- Generic negation of pair encodings
- Master-key KDM-secure ABE via predicate encoding
- Unbounded dynamic predicate compositions in ABE from standard assumptions
- TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- A multi-authority approach to various predicate encryption types
- A modular approach to registered ABE for unbounded predicates
- Inner-product functional encryption with fine-grained access control
- ABE for DFA from LWE against bounded collusions, revisited
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
- Blind key-generation attribute-based encryption for general predicates
- A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption
- Improved inner-product encryption with adaptive security and full attribute-hiding
- Tag-based ABE in prime-order groups via pair encoding
- A study of pair encodings: predicate encryption in prime order groups
This page was built for publication: Simplifying design and analysis of complex predicate encryption schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5738892)