Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
From MaRDI portal
Publication:887451
DOI10.1007/S10623-015-0131-1zbMATH Open1356.94079OpenAlexW2107081597WikidataQ59404246 ScholiaQ59404246MaRDI QIDQ887451FDOQ887451
Authors: Tatsuaki Okamoto, Katsuyuki Takashima
Publication date: 26 October 2015
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-015-0131-1
Recommendations
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- Non-zero inner product encryption with short ciphertexts and private keys
- More efficient constructions for inner-product encryption
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
Cites Work
- Functional encryption: definitions and challenges
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Hierarchical ID-Based Cryptography
- Fuzzy Identity-Based Encryption
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Attribute-based encryption for circuits from multilinear maps
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
- Fully secure functional encryption with general relations from the decisional linear assumption
- Hierarchical Predicate Encryption for Inner-Products
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Attribute-based encryption for circuits
- Expressive key-policy attribute-based encryption with constant-size ciphertexts
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- Generalized Identity Based and Broadcast Encryption Schemes
- Homomorphic Encryption and Signatures from Vector Decomposition
- Functional encryption: new perspectives and lower bounds
- On extractability obfuscation
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- A punctured programming approach to adaptively secure functional encryption
Cited In (16)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR
- Still wrong use of pairings in cryptography
- Non-zero inner product encryption with short ciphertexts and private keys
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- Functional encryption for inner product: achieving constant-size ciphertexts with adaptive security or support for negation
- More efficient constructions for inner-product encryption
- Unbounded predicate inner product functional encryption from pairings
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption
- A public key identity-based revocation scheme: fully attribute-hiding and function private
- CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption
- Unbounded non-zero inner product encryption
- Functional encryption for public-attribute inner products: achieving constant-size ciphertexts with adaptive security or support for negation
- Fully secure unbounded zero inner product encryption with short ciphertexts and keys
- Improved inner-product encryption with adaptive security and full attribute-hiding
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting
This page was built for publication: Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q887451)