Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption
From MaRDI portal
Publication:2304999
DOI10.1007/978-3-030-26951-7_23OpenAlexW2969017426MaRDI QIDQ2304999
Publication date: 9 March 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-26951-7_23
Related Items (17)
CPA-to-CCA transformation for KDM security ⋮ Bounded Collusion ABE for TMs from IBE ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ Cryptographic primitives with hinting property ⋮ On non-uniform security for black-box non-interactive CCA commitments ⋮ Universal amplification of KDM security: from 1-key circular to multi-key KDM ⋮ How to build a trapdoor function from an encryption scheme ⋮ Hierarchical and non-monotonic key-policy attribute-based encryption and its application ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors ⋮ Multi-party functional encryption ⋮ Amortizing rate-1 OT and applications to PIR and PSI ⋮ CCA security and trapdoor functions via key-dependent-message security ⋮ Minicrypt primitives with algebraic structure and applications ⋮ Black-box non-interactive non-malleable commitments ⋮ On the CCA compatibility of public-key infrastructure ⋮ New constructions of hinting PRGs, OWFs with encryption, and more ⋮ Chosen ciphertext security from injective trapdoor functions
This page was built for publication: Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption