Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques - MaRDI portal

New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques

From MaRDI portal
Publication:2914260

DOI10.1007/978-3-642-32009-5_12zbMath1296.94128OpenAlexW154883872MaRDI QIDQ2914260

Allison Lewko, Brent Waters

Publication date: 25 September 2012

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_12




Related Items (59)

Efficient subtree-based encryption for fuzzy-entity data sharingExtended dual system group and shorter unbounded hierarchical identity based encryptionBroadcast encryption with size \(N^{1/3}\) and more from \(k\)-LinFully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size CiphertextsAttribute-based versions of Schnorr and ElGamalCommunication Complexity of Conditional Disclosure of Secrets and Attribute-Based EncryptionBilinear Entropy Expansion from the Decisional Linear AssumptionFrom Selective to Adaptive Security in Functional EncryptionSemi-adaptive Security and Bundling Functionalities Made Generic and EasyServer-aided revocable attribute-based encryption revised: multi-user setting and fully secureOn the security of joint signature and encryption revisitedAttribute based encryption for deterministic finite automata from DLINCryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear GroupsCompact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-LinTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsEfficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge SettingSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceAccountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and NonrepudiationCiphertext-Policy Attribute Based Encryption Supporting Access Policy UpdateA practical compiler for attribute-based encryption: new decentralized constructions and moreFunctional encryption for computational hiding in prime order groups via pair encodingsABE for circuits with constant-size secret keys and adaptive securityIdentity-based matchmaking encryption from standard assumptionsMulti-input attribute based encryption and predicate encryptionHierarchical and non-monotonic key-policy attribute-based encryption and its applicationAccountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in CloudVerifiable outsourced ciphertext-policy attribute-based encryption in cloud computingDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHAttribute-based optimistic fair exchange: how to restrict brokers with policiesAdaptively simulation-secure attribute-hiding predicate encryptionImproved inner-product encryption with adaptive security and full attribute-hidingExpanded Framework for Dual System Encryption and Its ApplicationFully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryptionCost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward SecurityAlgebraic (trapdoor) one-way functions: constructions and applicationsAn efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control systemAnonymous spatial encryption under affine space delegation functionality with full securitySelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsSimplifying Design and Analysis of Complex Predicate Encryption SchemesDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsPractical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large UniverseA Study of Pair Encodings: Predicate Encryption in Prime Order GroupsAlgebraic Attacks Against Several Weak Variants of GVW’13 ABEFully Secure IBE with Tighter Reduction in Prime Order Bilinear GroupsA multi-authority approach to various predicate encryption typesTag-based ABE in prime-order groups via pair encodingSecure and Traceable Framework for Data CirculationVerifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing StorageCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Fully secure ABE with outsourced decryption against chosen ciphertext attackMore Efficient Constructions for Inner-Product EncryptionAttribute Based Encryption with Direct Efficiency TradeoffGeneric negation of pair encodingsA Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order GroupsAttribute-Based Encryption for Range AttributesCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security




This page was built for publication: New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques