Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
From MaRDI portal
Publication:6041288
Recommendations
- Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order
- Security-level switchable attribute-based encryption under the strictly weaker assumption family
- New proof techniques for DLIN-based adaptively secure attribute-based encryption
- Fast, compact, and expressive attribute-based encryption
- Fast, compact, and expressive attribute-based encryption
Cites work
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A method for obtaining digital signatures and public-key cryptosystems
- Adaptively secure constrained pseudorandom functions in the standard model
- Attribute-based functional encryption on lattices
- Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
- Constrained pseudorandom functions and their applications
- Decentralizing attribute-based encryption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
- Fully secure attribute-based encryption for \(t\)-CNF from LWE
- Fully secure functional encryption with general relations from the decisional linear assumption
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Functional signatures and pseudorandom functions
- Fuzzy Identity-Based Encryption
- New directions in cryptography
- New proof methods for attribute-based encryption: achieving full security through selective techniques
- Practical Identity-Based Encryption Without Random Oracles
- Predicate encryption for circuits from LWE
- Probabilistic encryption
- Semi-adaptive security and bundling functionalities made generic and easy
- Why Proving HIBE Systems Secure Is Difficult
Cited in
(2)
This page was built for publication: Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6041288)