Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
From MaRDI portal
Publication:1752551
DOI10.1007/s10623-017-0399-4zbMath1386.68056OpenAlexW2742879667WikidataQ123111804 ScholiaQ123111804MaRDI QIDQ1752551
Jie Chen, Junqing Gong, Jie Zhang, Ai-Jun Ge, Chuan-Gui Ma
Publication date: 24 May 2018
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-017-0399-4
Related Items (2)
Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Leakage-resilient identity-based cryptography from minimal assumptions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks
- Leakage-Resilient Functional Encryption via Pair Encodings
- An Algebraic Framework for Diffie-Hellman Assumptions
- Fully, (Almost) Tightly Secure IBE and Dual System Groups
- Leakage Resilient IBE and IPE under the DLIN Assumption
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings
- Identity-Based Cryptosystems and Signature Schemes
- Achieving Leakage Resilience through Dual System Encryption
- Functional Encryption: Definitions and Challenges
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Leakage-Resilient Signatures
- Public-Key Encryption Schemes with Auxiliary Inputs
- Attribute-Based Encryption Resilient to Auxiliary Input
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- Public-Key Encryption in the Bounded-Retrieval Model
- Generalized Identity Based and Broadcast Encryption Schemes
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Hierarchical Predicate Encryption for Inner-Products
- Partial Garbling Schemes and Their Applications
- Fuzzy Identity-Based Encryption
- Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
- Deterministic Extractors for Bit‐Fixing Sources and Exposure‐Resilient Cryptography
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Dual System Encryption via Predicate Encodings
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
This page was built for publication: Leakage-resilient attribute based encryption in prime-order groups via predicate encodings