Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
From MaRDI portal
Publication:2170046
DOI10.1007/978-3-031-07085-3_8zbMath1496.94069OpenAlexW4285134135MaRDI QIDQ2170046
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-07085-3_8
Related Items (7)
Fully adaptive decentralized multi-authority \textsf{ABE} ⋮ Broadcast, trace and revoke with optimal parameters from polynomial hardness ⋮ Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded ⋮ Multi-authority ABE from lattices without random oracles ⋮ Witness encryption and null-iO from evasive LWE ⋮ How to use (plain) witness encryption: registered ABE, flexible broadcast, and more ⋮ Constant input attribute based (and predicate) encryption from evasive and tensor LWE
Cites Work
- Unnamed Item
- Return of GGH15: provable security against zeroizing attacks
- Limits on low-degree pseudorandom generators (or: sum-of-squares meets program obfuscation)
- Limits on the locality of pseudorandom generators and applications to indistinguishability obfuscation
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates
- Optimal broadcast encryption from pairings and LWE
- Candidate iO from homomorphic encryption schemes
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE
- CP-ABE for circuits (and More) in the symmetric key setting
- Optimal broadcast encryption from LWE and pairings in the standard model
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Candidate obfuscation via oblivious LWE sampling
- Counterexamples to new circular security assumptions underlying iO
- Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin
- Obfuscating simple functionalities from knowledge assumptions
- Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Cryptanalysis of GGH15 Multilinear Maps
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- Key Homomorphic PRFs and Their Applications
- Low Overhead Broadcast Encryption from Multilinear Maps
- Hardness of k-LWE and Applications in Traitor Tracing
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
- Cryptanalysis of the Multilinear Map over the Integers
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Secure Obfuscation in a Weak Multilinear Map Model
- Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
- Candidate Multilinear Maps from Ideal Lattices
- Graph-Induced Multilinear Maps from Lattices
- Fuzzy Identity-Based Encryption
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- Indistinguishability obfuscation from circular security
This page was built for publication: Optimal broadcast encryption and CP-ABE from evasive lattice assumptions