Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption
From MaRDI portal
Recommendations
- Generic constructions for chosen-ciphertext secure attribute based encryption
- Practical direct chosen ciphertext secure key-policy attribute-based encryption with public ciphertext test
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
- Attribute-based encryption for circuits
- Advances in Cryptology - EUROCRYPT 2004
Cited in
(30)- Generic constructions for chosen-ciphertext secure attribute based encryption
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- Cryptographic primitives with hinting property
- On non-uniform security for black-box non-interactive CCA commitments
- Universal amplification of KDM security: from 1-key circular to multi-key KDM
- Minicrypt primitives with algebraic structure and applications
- Bounded Collusion ABE for TMs from IBE
- Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013
- How to build a trapdoor function from an encryption scheme
- Multi-party functional encryption
- Randomness recoverable secret sharing schemes
- Anonymous (hierarchical) identity-based encryption from broader assumptions
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors
- Black-box non-interactive non-malleable commitments
- CCA security and trapdoor functions via key-dependent-message security
- Hierarchical and non-monotonic key-policy attribute-based encryption and its application
- Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts
- Dynamic collusion functional encryption and multi-authority attribute-based encryption
- Quantum CCA-secure PKE, revisited
- On the CCA compatibility of public-key infrastructure
- CPA-to-CCA transformation for KDM security
- Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
- Public-key anamorphism in (CCA-secure) public-key encryption and beyond
- CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
- Amortizing rate-1 OT and applications to PIR and PSI
- Non-Observable Quantum Random Oracle Model
- Cryptographic primitives with hinting property
- Chosen ciphertext security from injective trapdoor functions
- New constructions of hinting PRGs, OWFs with encryption, and more
This page was built for publication: Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2304999)