New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
From MaRDI portal
Publication:2914260
DOI10.1007/978-3-642-32009-5_12zbMath1296.94128OpenAlexW154883872MaRDI QIDQ2914260
Publication date: 25 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_12
Related Items (59)
Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Extended dual system group and shorter unbounded hierarchical identity based encryption ⋮ Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin ⋮ Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts ⋮ Attribute-based versions of Schnorr and ElGamal ⋮ Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption ⋮ Bilinear Entropy Expansion from the Decisional Linear Assumption ⋮ From Selective to Adaptive Security in Functional Encryption ⋮ Semi-adaptive Security and Bundling Functionalities Made Generic and Easy ⋮ Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure ⋮ On the security of joint signature and encryption revisited ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 ⋮ Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups ⋮ Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin ⋮ Towards Tightly Secure Lattice Short Signature and Id-Based Encryption ⋮ Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings ⋮ Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation ⋮ Ciphertext-Policy Attribute Based Encryption Supporting Access Policy Update ⋮ A practical compiler for attribute-based encryption: new decentralized constructions and more ⋮ Functional encryption for computational hiding in prime order groups via pair encodings ⋮ ABE for circuits with constant-size secret keys and adaptive security ⋮ Identity-based matchmaking encryption from standard assumptions ⋮ Multi-input attribute based encryption and predicate encryption ⋮ Hierarchical and non-monotonic key-policy attribute-based encryption and its application ⋮ Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud ⋮ Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ Attribute-based optimistic fair exchange: how to restrict brokers with policies ⋮ Adaptively simulation-secure attribute-hiding predicate encryption ⋮ Improved inner-product encryption with adaptive security and full attribute-hiding ⋮ Expanded Framework for Dual System Encryption and Its Application ⋮ Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption ⋮ Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security ⋮ Algebraic (trapdoor) one-way functions: constructions and applications ⋮ An efficient attribute-based access control system with break-glass capability for cloud-assisted industrial control system ⋮ Anonymous spatial encryption under affine space delegation functionality with full security ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits ⋮ Simplifying Design and Analysis of Complex Predicate Encryption Schemes ⋮ Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings ⋮ Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe ⋮ A Study of Pair Encodings: Predicate Encryption in Prime Order Groups ⋮ Algebraic Attacks Against Several Weak Variants of GVW’13 ABE ⋮ Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups ⋮ A multi-authority approach to various predicate encryption types ⋮ Tag-based ABE in prime-order groups via pair encoding ⋮ Secure and Traceable Framework for Data Circulation ⋮ Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage ⋮ Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) ⋮ Fully secure ABE with outsourced decryption against chosen ciphertext attack ⋮ More Efficient Constructions for Inner-Product Encryption ⋮ Attribute Based Encryption with Direct Efficiency Tradeoff ⋮ Generic negation of pair encodings ⋮ A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups ⋮ Attribute-Based Encryption for Range Attributes ⋮ Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
This page was built for publication: New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques