Pages that link to "Item:Q3582755"
From MaRDI portal
The following pages link to Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption (Q3582755):
Displaying 50 items.
- Generalized closest substring encryption (Q300391) (← links)
- On the security of joint signature and encryption revisited (Q350517) (← links)
- Spatial encryption supporting non-monotone access structure (Q404924) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Strongly full-hiding inner product encryption (Q511916) (← links)
- Computational friendly attribute-based encryptions with short ciphertext (Q512647) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- An expressive and provably secure ciphertext-policy attribute-based encryption (Q726482) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes (Q781862) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Unbounded ABE via bilinear entropy expansion, revisited (Q1648812) (← links)
- Functional encryption for computational hiding in prime order groups via pair encodings (Q1692153) (← links)
- Adaptively simulation-secure attribute-hiding predicate encryption (Q1710619) (← links)
- Improved inner-product encryption with adaptive security and full attribute-hiding (Q1710620) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Implementing, and keeping in check, a DSL used in E-learning (Q2039947) (← links)
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) (Q2055654) (← links)
- Tightly CCA-secure inner product functional encryption scheme (Q2055966) (← links)
- Efficient fully CCA-secure predicate encryptions from pair encodings (Q2070257) (← links)
- Generic constructions for fully secure revocable attribute-based encryption (Q2167729) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Rerandomizable signatures under standard assumption (Q2179379) (← links)
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin (Q2188962) (← links)
- Fast, compact, and expressive attribute-based encryption (Q2234469) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- A new approach to practical function-private inner product encryption (Q2317860) (← links)
- Attribute-based encryption with adaptive policy (Q2318249) (← links)
- Predicate encryption supporting disjunctions, polynomial equations, and inner products (Q2377068) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- Automated analysis of cryptographic assumptions in generic group models (Q2423840) (← links)
- The relation and transformation between hierarchical inner product encryption and spatial encryption (Q2448081) (← links)
- Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 (Q2673979) (← links)
- Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice (Q2678984) (← links)
- Unbounded dynamic predicate compositions in ABE from standard assumptions (Q2691592) (← links)
- Complexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting) (Q2693051) (← links)
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH (Q2697676) (← links)
- Fully secure unbounded zero inner product encryption with short ciphertexts and keys (Q2697924) (← links)
- Efficient attribute-based signature for monotone predicates (Q2697932) (← links)
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings (Q2790032) (← links)
- Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe (Q2794498) (← links)
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups (Q2799098) (← links)
- Leakage-Resilient Functional Encryption via Pair Encodings (Q2817484) (← links)
- Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption (Q2817488) (← links)
- Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures (Q2817489) (← links)
- More Efficient Constructions for Inner-Product Encryption (Q2822673) (← links)
- Attribute Based Encryption with Direct Efficiency Tradeoff (Q2822674) (← links)
- A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups (Q2827707) (← links)