Bounded Collusion ABE for TMs from IBE
From MaRDI portal
Publication:6041291
Recommendations
- Bounded functional encryption for Turing machines: adaptive security from general assumptions
- Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
- Functional encryption for Turing machines with dynamic bounded collusion from LWE
- Turing machines with shortcuts: efficient attribute-based encryption for bounded functions
- Bounded-collusion IBE from key homomorphism
Cites work
- scientific article; zbMATH DE number 1942416 (Why is no real title available?)
- scientific article; zbMATH DE number 1759794 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- A quasipolynomial reduction for generalized selective decryption on trees
- ABE for DFA from \(k\)-lin
- Adaptive Security of Constrained PRFs
- Adaptive garbled RAM from laconic oblivious transfer
- Adaptive security of Yao's garbled circuits
- Adaptively secure ABE for DFA from \(k\)-Lin and more
- Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously
- Advances in Cryptology – CRYPTO 2004
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Attribute based encryption for deterministic finite automata from DLIN
- Attribute-based encryption (and more) for nondeterministic finite automata from LWE
- Attribute-based encryption for finite automata from LWE
- Be adaptive, avoid overcommitting
- Compact adaptively secure ABE for \(\mathrm{NC}^1\) from \(k\)-lin
- Dual system encryption framework in prime-order groups via computational pair encodings
- Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more
- From selective IBE to full IBE and selective HIBE
- Functional Encryption for Turing Machines
- Functional encryption for Turing machines with dynamic bounded collusion from LWE
- Functional encryption for regular languages
- Functional encryption with bounded collusions via multi-party computation
- Fuzzy Identity-Based Encryption
- Garbled RAM revisited
- How to garble RAM programs?
- Identity-based cryptosystems and signature schemes
- Identity-based encryption from the Diffie-Hellman assumption
- Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
- Indistinguishability obfuscation from well-founded assumptions
- Laconic oblivious transfer and its applications
- On extractability obfuscation
- Optimal bounded-collusion secure functional encryption
- Public-coin differing-inputs obfuscation and its applications
- Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption
- Registration-based encryption: removing private-key generator from IBE
- Semi-adaptive security and bundling functionalities made generic and easy
- Simplifying design and analysis of complex predicate encryption schemes
- Theory of Cryptography
- Towards attribute-based encryption for RAMs from LWE: sub-linear decryption, and more
- Trapdoors for hard lattices and new cryptographic constructions
Cited in
(5)- Bounded functional encryption for Turing machines: adaptive security from general assumptions
- Attribute based encryption for Turing machines from lattices
- Bounded-collusion decentralized ABE with sublinear parameters
- Dynamic collusion functional encryption and multi-authority attribute-based encryption
- Turing machines with shortcuts: efficient attribute-based encryption for bounded functions
This page was built for publication: Bounded Collusion ABE for TMs from IBE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6041291)