Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
From MaRDI portal
Publication:2948190
DOI10.1007/978-3-662-47854-7_19zbMath1415.94458OpenAlexW2231711433MaRDI QIDQ2948190
Brent Waters, Yannis Rouselakis
Publication date: 29 September 2015
Published in: Financial Cryptography and Data Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-47854-7_19
unboundedattribute-based encryptionimplementationsmulti-authoritylarge universecharm\(q\)-type assumption
Related Items (22)
A general framework for secure sharing of personal health records in cloud system ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ Efficient ciphertext-policy attribute-based encryption with blackbox traceability ⋮ A survey of lattice based expressive attribute based encryption ⋮ Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption ⋮ Bounded-collusion decentralized ABE with sublinear parameters ⋮ Fully adaptive decentralized multi-authority \textsf{ABE} ⋮ Registered attribute-based encryption ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ A practical compiler for attribute-based encryption: new decentralized constructions and more ⋮ Multi-authority ABE for non-monotonic access structures ⋮ Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded ⋮ Multi-authority ABE from lattices without random oracles ⋮ Building blocks of sharding blockchain systems: concepts, approaches, and open problems ⋮ Hierarchical and non-monotonic key-policy attribute-based encryption and its application ⋮ Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ Distributed Multi-authority Attribute-Based Encryption Using Cellular Automata ⋮ Flexible attribute-based proxy re-encryption for efficient data sharing ⋮ A multi-authority approach to various predicate encryption types ⋮ Match me if you can: matchmaking encryption and its applications ⋮ Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Pairings for cryptographers
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
- Identity-Based Cryptosystems and Signature Schemes
- Functional Encryption: Definitions and Challenges
- Unbounded HIBE and Attribute-Based Encryption
- Decentralizing Attribute-Based Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Collusion-Free Policy-Based Encryption
- Delegating Capabilities in Predicate Encryption Systems
- Bounded Ciphertext Policy Attribute Based Encryption
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Practical Identity-Based Encryption Without Random Oracles
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Multi-authority Attribute Based Encryption
- Homomorphic Encryption and Signatures from Vector Decomposition
- Predicate Privacy in Encryption Systems
- Hierarchical Predicate Encryption for Inner-Products
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Identity-Based Encryption from the Weil Pairing
- BRIEF REVIEW OF CHARM PHYSICS
- Advances in Cryptology - EUROCRYPT 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Secure Cryptographic Workflow in the Standard Model
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Escrow-free encryption supporting cryptographic workflow
This page was built for publication: Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption