Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Riding on Asymmetry: Efficient ABE for Branching Programs - MaRDI portal

Riding on Asymmetry: Efficient ABE for Branching Programs

From MaRDI portal
Publication:2811146

DOI10.1007/978-3-662-48797-6_23zbMath1380.94094OpenAlexW2295419262MaRDI QIDQ2811146

Sergey Gorbunov, Dhinakaran Vinayagamurthy

Publication date: 10 June 2016

Published in: Advances in Cryptology -- ASIACRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-48797-6_23




Related Items (21)

Constraining and Watermarking PRFs from Milder AssumptionsDeniable Attribute Based Encryption for Branching Programs from LWEAttribute based encryption for deterministic finite automata from DLINA survey of lattice based expressive attribute based encryptionTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesBounded functional encryption for Turing machines: adaptive security from general assumptionsABE for circuits with constant-size secret keys and adaptive securityMulti-input attribute based encryption and predicate encryptionABE for DFA from LWE against bounded collusions, revisitedRing-based identity based encryption -- asymptotically shorter MPK and tighter securityDirect computation of branching programs and its applications to more efficient lattice-based cryptographyPrivate Puncturable PRFs from Standard Lattice AssumptionsWatermarking cryptographic functionalities from standard lattice assumptionsMulti-theorem preprocessing NIZKs from latticesAdaptive oblivious transfer with access control from lattice assumptionsOptimal broadcast encryption from pairings and LWECompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}Key-homomorphic pseudorandom functions from LWE with small modulus






This page was built for publication: Riding on Asymmetry: Efficient ABE for Branching Programs