Inner-product encryption under standard assumptions
From MaRDI portal
Publication:2430410
DOI10.1007/s10623-010-9405-9zbMath1215.68097OpenAlexW2082190228WikidataQ121074648 ScholiaQ121074648MaRDI QIDQ2430410
Publication date: 6 April 2011
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-010-9405-9
Related Items (8)
Verifiable Inner Product Encryption Scheme ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ A survey on functional encryption ⋮ Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups ⋮ Compact (Targeted Homomorphic) Inner Product Encryption from LWE ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Improved (Hierarchical) Inner-Product Encryption from Lattices ⋮ On the Efficient Implementation of Pairing-Based Protocols
Cites Work
- Unnamed Item
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Practical Identity-Based Encryption Without Random Oracles
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Hidden-Vector Encryption with Groups of Prime Order
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
- Hierarchical Predicate Encryption for Inner-Products
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
- Cryptography and Coding
This page was built for publication: Inner-product encryption under standard assumptions