Spatial encryption revisited: from delegatable multiple inner product encryption and more
DOI10.1007/978-3-031-17140-6_14zbMATH Open1523.68026WikidataQ131317830 ScholiaQ131317830MaRDI QIDQ6173291FDOQ6173291
Authors: Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk
Publication date: 21 July 2023
Published in: Computer Security – ESORICS 2022 (Search for Journal in Brave)
Recommendations
learning with errorsspatial encryptioninner-product encryptionlattice trapdoorsallow-/deny-list encryptiondelegatable multiple inner-product encryptionhierarchical inner-product encryptionlattice evaluation
Cites Work
- On lattices, learning with errors, random linear codes, and cryptography
- Identity-based cryptosystems and signature schemes
- Functional encryption for inner product predicates from learning with errors
- Trapdoors for hard lattices and new cryptographic constructions
- Bonsai trees, or how to delegate a lattice basis
- Efficient lattice (H)IBE in the standard model
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Title not available (Why is that?)
- Hierarchical ID-Based Cryptography
- Lattice signatures without trapdoors
- Hierarchical Predicate Encryption for Inner-Products
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Trapdoors for lattices: simpler, tighter, faster, smaller
- The relation and transformation between hierarchical inner product encryption and spatial encryption
- Generalized Identity Based and Broadcast Encryption Schemes
- Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based
- Spatial encryption under simpler assumption
- Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
- Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
- Doubly spatial encryption from DBDH
- Improved (hierarchical) inner-product encryption from lattices
- Fully secure attribute-based encryption for \(t\)-CNF from LWE
- Fully secure doubly-spatial encryption under simple assumptions
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications
- Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption
- Puncturable Identity-Based Encryption from Lattices
- Adaptively secure inner product encryption from LWE
- Lattice-based hierarchical inner product encryption
Cited In (7)
- Spatial encryption supporting non-monotone access structure
- Spatial encryption under simpler assumption
- Leakage-Resilient Spatial Encryption
- Doubly spatial encryption from DBDH
- The relation and transformation between hierarchical inner product encryption and spatial encryption
- Fully secure doubly-spatial encryption under simple assumptions
- Anonymous spatial encryption under affine space delegation functionality with full security
This page was built for publication: Spatial encryption revisited: from delegatable multiple inner product encryption and more
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6173291)