Multi-client functional encryption with fine-grained access control
From MaRDI portal
Publication:6135394
DOI10.1007/978-3-031-22963-3_4zbMath1519.94150OpenAlexW4313308499MaRDI QIDQ6135394
David Pointcheval, Ky Nguyen, Duong Hieu Phan
Publication date: 25 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-22963-3_4
Related Items (5)
Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded ⋮ Multi-client inner product encryption: function-hiding instantiations without random oracles ⋮ Multi-client functional encryption with fine-grained access control ⋮ (Inner-product) functional encryption with updatable ciphertexts ⋮ Attribute-based multi-input FE (and more) for attribute-weighted sums
Cites Work
- Unnamed Item
- Unnamed Item
- Practical functional encryption for quadratic functions with applications to predicate encryption
- Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs
- Decentralized multi-client functional encryption for inner product
- Practical fully secure unrestricted inner product functional encryption modulo \(p\)
- New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts
- Dynamic decentralized functional encryption
- Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin
- Functional encryption for Turing machines with dynamic bounded collusion from LWE
- Attribute-based access control for inner product functional encryption from LWE
- Multi-client functional encryption for linear functions in the standard model from LWE
- Inner-product functional encryption with fine-grained access control
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- An Algebraic Framework for Diffie-Hellman Assumptions
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Simple Functional Encryption Schemes for Inner Products
- Identity-Based Cryptosystems and Signature Schemes
- Functional Encryption: Definitions and Challenges
- How to share a secret
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Robust Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
- Shorter IBE and Signatures via Asymmetric Pairings
- A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials
- Fuzzy Identity-Based Encryption
- Multi-input Functional Encryption
- CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
- Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps
- Bounded functional encryption for Turing machines: adaptive security from general assumptions
- Key-policy ABE with switchable attributes
- Multi-client functional encryption with fine-grained access control
This page was built for publication: Multi-client functional encryption with fine-grained access control