Generic constructions of master-key KDM secure attribute-based encryption
From MaRDI portal
Publication:6146591
Recommendations
- Master-key KDM-secure ABE via predicate encoding
- Master-key KDM-secure IBE from pairings
- KDM security for identity-based encryption: constructions and separations
- Identity-based encryption with master key-dependent message security and leakage-resilience
- Efficient circuit-size independent public key encryption with KDM security
Cites work
- scientific article; zbMATH DE number 1256724 (Why is no real title available?)
- scientific article; zbMATH DE number 1341866 (Why is no real title available?)
- scientific article; zbMATH DE number 1951605 (Why is no real title available?)
- scientific article; zbMATH DE number 1842483 (Why is no real title available?)
- scientific article; zbMATH DE number 1842494 (Why is no real title available?)
- scientific article; zbMATH DE number 1405637 (Why is no real title available?)
- A Framework for Identity-Based Encryption with Almost Tight Security
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
- A note on perfect correctness by derandomization
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Bonsai trees, or how to delegate a lattice basis
- Bounded KDM security from iO and OWF
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Circular and KDM security for identity-based encryption
- Classical hardness of learning with errors
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Efficient IBE with tight reduction to standard assumption in the multi-challenge setting
- Efficient Non-interactive Proof Systems for Bilinear Groups
- Fully homomorphic encryption using ideal lattices
- Fully secure attribute-based encryption for \(t\)-CNF from LWE
- Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting
- Identity-based encryption with master key-dependent message security and leakage-resilience
- Indistinguishability obfuscation from circular security
- Indistinguishability obfuscation from well-founded assumptions
- KDM security for identity-based encryption: constructions and separations
- Key dependent message security and receiver selective opening security for identity-based encryption
- Master-key KDM-secure ABE via predicate encoding
- Master-key KDM-secure IBE from pairings
- More efficient (almost) tightly secure structure-preserving signatures
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- New bounds in some transference theorems in the geometry of numbers
- New techniques for noninteractive zero-knowledge
- On lattices, learning with errors, random linear codes, and cryptography
- On the key dependent message security of the Fujisaki-Okamoto constructions
- Public-key cryptosystems from the worst-case shortest vector problem
- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
- Tighter security proofs for GPV-IBE in the quantum random oracle model
- Trapdoors for hard lattices and new cryptographic constructions
- Worst‐Case to Average‐Case Reductions Based on Gaussian Measures
This page was built for publication: Generic constructions of master-key KDM secure attribute-based encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6146591)