Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
From MaRDI portal
Publication:3084342
DOI10.1007/978-3-642-19379-8_6zbMath1291.94049OpenAlexW2117616411MaRDI QIDQ3084342
Elie de Panafieu, Nuttapong Attrapadung, Benoît Libert
Publication date: 15 March 2011
Published in: Public Key Cryptography – PKC 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19379-8_6
Related Items
Short Attribute-Based Signatures for Threshold Predicates, Fast, Compact, and Expressive Attribute-Based Encryption, Public-Key Puncturable Encryption: Modular and Compact Constructions, Attribute-Based Encryption, Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper), Generic Framework for Attribute-Based Group Signature, Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, Fine-grained forward secrecy: allow-list/deny-list encryption and applications, On the security of joint signature and encryption revisited, Generic constructions for fully secure revocable attribute-based encryption, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, On the optimal succinctness and efficiency of functional encryption and attribute-based encryption, Broadcast, trace and revoke with optimal parameters from polynomial hardness, Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs, TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks, ABE for circuits with constant-size secret keys and adaptive security, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Attribute-based signatures for range of inner product and its applications, Multi-client functional encryption with fine-grained access control, Attribute-based encryption schemes with constant-size ciphertexts, Complementary set encryption for privacy-preserving data consolidation, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, Hierarchical and non-monotonic key-policy attribute-based encryption and its application, Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts, Unbounded dynamic predicate compositions in ABE from standard assumptions, Succinct and adaptively secure ABE for ABP from \(k\)-Lin, Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH, Security-level switchable attribute-based encryption under the strictly weaker assumption family, Efficient anonymous multi-group broadcast encryption, Fast, compact, and expressive attribute-based encryption, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Attribute-Based Encryption with Fast Decryption, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, Simplifying Design and Analysis of Complex Predicate Encryption Schemes, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, A Study of Pair Encodings: Predicate Encryption in Prime Order Groups, Leakage-Resilient Functional Encryption via Pair Encodings, Linear Encryption with Keyword Search, Compact NIZKs from standard assumptions on bilinear maps, Fully secure ABE with outsourced decryption against chosen ciphertext attack, Attribute Based Encryption with Direct Efficiency Tradeoff, Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Attribute-Based Encryption for Range Attributes, Efficient fully CCA-secure predicate encryptions from pair encodings, Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes