New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
From MaRDI portal
Publication:3408210
DOI10.1007/978-3-642-11799-2_27zbMath1274.94092OpenAlexW1522101599MaRDI QIDQ3408210
Publication date: 24 February 2010
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_27
Related Items (only showing first 100 items - show all)
An efficient IBE scheme with tight security reduction in the random oracle model ⋮ Fast, Compact, and Expressive Attribute-Based Encryption ⋮ Hierarchical Identity-Based Encryption with Tight Multi-challenge Security ⋮ Lattice-based linearly homomorphic signatures in the standard model ⋮ Efficient subtree-based encryption for fuzzy-entity data sharing ⋮ Tightly secure signatures and public-key encryption ⋮ Extended dual system group and shorter unbounded hierarchical identity based encryption ⋮ Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin ⋮ Fine-grained secure attribute-based encryption ⋮ Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares ⋮ Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper) ⋮ Structure-Preserving Signatures from Standard Assumptions, Revisited ⋮ Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption ⋮ Bilinear Entropy Expansion from the Decisional Linear Assumption ⋮ From Selective to Adaptive Security in Functional Encryption ⋮ Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure ⋮ CCA-secure ABE using tag and pair encoding ⋮ Unbounded ABE via bilinear entropy expansion, revisited ⋮ Towards Forward Security Properties for PEKS and IBE ⋮ Efficient revocable identity-based encryption with short public parameters ⋮ Efficient revocable identity-based encryption via subset difference methods ⋮ Revocable hierarchical identity-based encryption with shorter private keys and update keys ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ Rerandomizable signatures under standard assumption ⋮ Key-Policy Multi-authority Attribute-Based Encryption ⋮ Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption ⋮ Forward-secure revocable identity-based encryption ⋮ Blind key-generation attribute-based encryption for general predicates ⋮ (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin ⋮ Threshold public key encryption scheme resilient against continual leakage without random oracles ⋮ Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin ⋮ Fully adaptive decentralized multi-authority \textsf{ABE} ⋮ Registered attribute-based encryption ⋮ Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings ⋮ Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions ⋮ Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ Shorter identity-based encryption via asymmetric pairings ⋮ Fully secure revocable attribute-based encryption ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ Functional encryption for computational hiding in prime order groups via pair encodings ⋮ Relations between semantic security and anonymity in identity-based encryption ⋮ Key-policy attribute-based encryption against continual auxiliary input leakage ⋮ Dual trapdoor identity-based encryption with keyword search ⋮ Unbounded HIBE with tight security ⋮ Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing ⋮ Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups ⋮ New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters ⋮ Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions ⋮ Hierarchical attribute based encryption with continuous leakage-resilience ⋮ Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups ⋮ Expanded Framework for Dual System Encryption and Its Application ⋮ Efficient identity-based encryption with hierarchical key-insulation from HIBE ⋮ Fast, compact, and expressive attribute-based encryption ⋮ Anonymous spatial encryption under affine space delegation functionality with full security ⋮ Adaptively Secure Non-interactive Threshold Cryptosystems ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ New chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problem ⋮ Doubly spatial encryption from DBDH ⋮ Revocable Identity-Based Encryption Revisited: Security Model and Construction ⋮ Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies ⋮ Flexible attribute-based proxy re-encryption for efficient data sharing ⋮ Anonymous HIBE with short ciphertexts: full security in prime order groups ⋮ Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits ⋮ Predicate signatures from pair encodings via dual system proof technique ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Revocable hierarchical identity-based encryption ⋮ Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings ⋮ Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis ⋮ Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures ⋮ Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts ⋮ Novel updatable identity-based hash proof system and its applications ⋮ Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography ⋮ Déjà Q: Encore! Un Petit IBE ⋮ Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption ⋮ Novel generic construction of leakage-resilient PKE scheme with CCA security ⋮ Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity ⋮ Identity-based encryption with leakage-amplified chosen-ciphertext attacks security ⋮ A multi-authority approach to various predicate encryption types ⋮ Revocable hierarchical identity-based encryption with adaptive security ⋮ Leakage-Resilient Functional Encryption via Pair Encodings ⋮ Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) ⋮ Adaptively secure ABE for DFA from \(k\)-Lin and more ⋮ Fully secure ABE with outsourced decryption against chosen ciphertext attack ⋮ Anonymous Encryption with Partial-Order Subset Delegation Functionality ⋮ Generic negation of pair encodings ⋮ A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ A PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEME ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ Identity-based broadcast encryption with continuous leakage resilience ⋮ Leakage-resilient key exchange and two-seed extractors ⋮ Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE ⋮ Unnamed Item ⋮ Computing on authenticated data ⋮ Sequential aggregate signatures with short public keys without random oracles ⋮ Privacy-preserving encryption scheme using DNA parentage test ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Identity-Based Cryptosystems and Signature Schemes
- Public Key Broadcast Encryption for Stateless Receivers
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Delegating Capabilities in Predicate Encryption Systems
- Trapdoors for hard lattices and new cryptographic constructions
- Practical Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Hierarchical ID-Based Cryptography
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Advances in Cryptology - EUROCRYPT 2004
- Advances in Cryptology – CRYPTO 2004
- Efficient Identity-Based Encryption Without Random Oracles
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Theory of Cryptography
This page was built for publication: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts