Pages that link to "Item:Q3650694"
From MaRDI portal
The following pages link to Hierarchical Predicate Encryption for Inner-Products (Q3650694):
Displaying 44 items.
- Generalized closest substring encryption (Q300391) (← links)
- Spatial encryption supporting non-monotone access structure (Q404924) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts (Q726568) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Revocable hierarchical identity-based encryption via history-free approach (Q906383) (← links)
- Functional encryption for computational hiding in prime order groups via pair encodings (Q1692153) (← links)
- Shorter quasi-adaptive NIZK proofs for linear subspaces (Q1698397) (← links)
- Adaptively simulation-secure attribute-hiding predicate encryption (Q1710619) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis (Q1787193) (← links)
- Predicate signatures from pair encodings via dual system proof technique (Q2009416) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) (Q2055654) (← links)
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption (Q2057139) (← links)
- Efficient fully CCA-secure predicate encryptions from pair encodings (Q2070257) (← links)
- Anonymous HIBE with short ciphertexts: full security in prime order groups (Q2256104) (← links)
- A new approach to practical function-private inner product encryption (Q2317860) (← links)
- Predicate encryption supporting disjunctions, polynomial equations, and inner products (Q2377068) (← links)
- Efficient revocable identity-based encryption via subset difference methods (Q2402970) (← links)
- Inner-product encryption under standard assumptions (Q2430410) (← links)
- Improved hidden vector encryption with short ciphertexts and tokens (Q2430414) (← links)
- The relation and transformation between hierarchical inner product encryption and spatial encryption (Q2448081) (← links)
- Fully secure unbounded zero inner product encryption with short ciphertexts and keys (Q2697924) (← links)
- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts (Q2790033) (← links)
- Déjà Q: Encore! Un Petit IBE (Q2799097) (← links)
- Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups (Q2801775) (← links)
- Secret Handshakes with Dynamic Expressive Matching Policy (Q2817485) (← links)
- More Efficient Constructions for Inner-Product Encryption (Q2822673) (← links)
- A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups (Q2827707) (← links)
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys (Q2827708) (← links)
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption (Q2948190) (← links)
- Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings (Q2953790) (← links)
- Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups (Q2988340) (← links)
- Some Key Techniques on Pairing Vector Spaces (Q3011929) (← links)
- Anonymous Encryption with Partial-Order Subset Delegation Functionality (Q3092355) (← links)
- Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting (Q3104695) (← links)
- Compact (Targeted Homomorphic) Inner Product Encryption from LWE (Q3297486) (← links)
- Efficient Inner Product Encryption with Simulation-Based Security (Q3297490) (← links)
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting (Q6124593) (← links)
- A survey on functional encryption (Q6163797) (← links)
- Unbounded non-zero inner product encryption (Q6495783) (← links)