Pages that link to "Item:Q2894433"
From MaRDI portal
The following pages link to Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption (Q2894433):
Displaying 38 items.
- Generalized closest substring encryption (Q300391) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Adaptively simulation-secure attribute-hiding predicate encryption (Q1710619) (← links)
- Improved inner-product encryption with adaptive security and full attribute-hiding (Q1710620) (← links)
- Fine-grained searchable encryption in multi-user setting (Q1741938) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Efficient fully CCA-secure predicate encryptions from pair encodings (Q2070257) (← links)
- Functional encryption for attribute-weighted sums from \(k\)-Lin (Q2096503) (← links)
- Cross-domain attribute-based access control encryption (Q2149810) (← links)
- CCA-secure ABE using tag and pair encoding (Q2152061) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- Efficient revocable identity-based encryption via subset difference methods (Q2402970) (← links)
- On the power of rewinding simulators in functional encryption (Q2407055) (← links)
- The relation and transformation between hierarchical inner product encryption and spatial encryption (Q2448081) (← links)
- Adaptively secure inner product encryption from LWE (Q2691591) (← links)
- Inner-product functional encryption with fine-grained access control (Q2691594) (← links)
- Policy-compliant signatures (Q2697898) (← links)
- Fully secure unbounded zero inner product encryption with short ciphertexts and keys (Q2697924) (← links)
- Leakage-Resilient Functional Encryption via Pair Encodings (Q2817484) (← links)
- Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions (Q2822675) (← links)
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys (Q2827708) (← links)
- Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting (Q2953791) (← links)
- Compact (Targeted Homomorphic) Inner Product Encryption from LWE (Q3297486) (← links)
- Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption (Q3457081) (← links)
- Predicate Encryption for Circuits from LWE (Q3457082) (← links)
- Improved (Hierarchical) Inner-Product Encryption from Lattices (Q4916012) (← links)
- Adaptive Simulation Security for Inner Product Functional Encryption (Q5041151) (← links)
- Verifiable Inner Product Encryption Scheme (Q5041153) (← links)
- Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits (Q5738750) (← links)
- Access Control Encryption for Equality, Comparison, and More (Q5738753) (← links)
- (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin (Q6095187) (← links)
- Unbounded predicate inner product functional encryption from pairings (Q6109084) (← links)
- Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric (Q6116190) (← links)
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting (Q6124593) (← links)
- A survey on functional encryption (Q6163797) (← links)
- Unbounded non-zero inner product encryption (Q6495783) (← links)