Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
From MaRDI portal
Publication:887451
DOI10.1007/s10623-015-0131-1zbMath1356.94079OpenAlexW2107081597WikidataQ59404246 ScholiaQ59404246MaRDI QIDQ887451
Katsuyuki Takashima, Tatsuaki Okamoto
Publication date: 26 October 2015
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-015-0131-1
Related Items (7)
Unbounded predicate inner product functional encryption from pairings ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ Fully secure unbounded zero inner product encryption with short ciphertexts and keys ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ Still wrong use of pairings in cryptography
Cites Work
- Attribute-Based Encryption for Circuits from Multilinear Maps
- Functional Encryption: New Perspectives and Lower Bounds
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
- Functional Encryption: Definitions and Challenges
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Generalized Identity Based and Broadcast Encryption Schemes
- Homomorphic Encryption and Signatures from Vector Decomposition
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Hierarchical Predicate Encryption for Inner-Products
- Hierarchical ID-Based Cryptography
- Fuzzy Identity-Based Encryption
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- Chosen‐Ciphertext Security from Identity‐Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Attribute-based encryption for circuits
- On Extractability Obfuscation
This page was built for publication: Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption