New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts

From MaRDI portal
Publication:3408210

DOI10.1007/978-3-642-11799-2_27zbMath1274.94092OpenAlexW1522101599MaRDI QIDQ3408210

Brent Waters, Allison Lewko

Publication date: 24 February 2010

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-11799-2_27




Related Items (only showing first 100 items - show all)

An efficient IBE scheme with tight security reduction in the random oracle modelFast, Compact, and Expressive Attribute-Based EncryptionHierarchical Identity-Based Encryption with Tight Multi-challenge SecurityLattice-based linearly homomorphic signatures in the standard modelEfficient subtree-based encryption for fuzzy-entity data sharingTightly secure signatures and public-key encryptionExtended dual system group and shorter unbounded hierarchical identity based encryptionBroadcast encryption with size \(N^{1/3}\) and more from \(k\)-LinFine-grained secure attribute-based encryptionBorn and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short sharesCompact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper)Structure-Preserving Signatures from Standard Assumptions, RevisitedCommunication Complexity of Conditional Disclosure of Secrets and Attribute-Based EncryptionBilinear Entropy Expansion from the Decisional Linear AssumptionFrom Selective to Adaptive Security in Functional EncryptionServer-aided revocable attribute-based encryption revised: multi-user setting and fully secureCCA-secure ABE using tag and pair encodingUnbounded ABE via bilinear entropy expansion, revisitedTowards Forward Security Properties for PEKS and IBEEfficient revocable identity-based encryption with short public parametersEfficient revocable identity-based encryption via subset difference methodsRevocable hierarchical identity-based encryption with shorter private keys and update keysAttribute based encryption for deterministic finite automata from DLINRerandomizable signatures under standard assumptionKey-Policy Multi-authority Attribute-Based EncryptionAchieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryptionForward-secure revocable identity-based encryptionBlind key-generation attribute-based encryption for general predicates(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-LinThreshold public key encryption scheme resilient against continual leakage without random oraclesCompact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-LinFully adaptive decentralized multi-authority \textsf{ABE}Registered attribute-based encryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsDéjà Q All Over Again: Tighter and Broader Reductions of q-Type AssumptionsPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsSystematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practiceShorter identity-based encryption via asymmetric pairingsFully secure revocable attribute-based encryption(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linFunctional encryption for computational hiding in prime order groups via pair encodingsRelations between semantic security and anonymity in identity-based encryptionKey-policy attribute-based encryption against continual auxiliary input leakageDual trapdoor identity-based encryption with keyword searchUnbounded HIBE with tight securitySuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingVerifiable outsourced ciphertext-policy attribute-based encryption in cloud computingDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHAdaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroupsNew Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public ParametersAdaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructionsHierarchical attribute based encryption with continuous leakage-resilienceTransforming Hidden Vector Encryption Schemes from Composite to Prime Order GroupsExpanded Framework for Dual System Encryption and Its ApplicationEfficient identity-based encryption with hierarchical key-insulation from HIBEFast, compact, and expressive attribute-based encryptionAnonymous spatial encryption under affine space delegation functionality with full securityAdaptively Secure Non-interactive Threshold CryptosystemsSelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyNew chosen-ciphertext secure identity-based encryption with tight security reduction to the bilinear Diffie-Hellman problemDoubly spatial encryption from DBDHRevocable Identity-Based Encryption Revisited: Security Model and ConstructionSequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation StudiesFlexible attribute-based proxy re-encryption for efficient data sharingAnonymous HIBE with short ciphertexts: full security in prime order groupsDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsPredicate signatures from pair encodings via dual system proof techniqueFully secure functional encryption with a large class of relations from the decisional linear assumptionRevocable hierarchical identity-based encryptionDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsConverting pairing-based cryptosystems from composite to prime order setting -- a comparative analysisAccumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic SignaturesCiphertext-policy hierarchical attribute-based encryption with short ciphertextsNovel updatable identity-based hash proof system and its applicationsAlgebraic Partitioning: Fully Compact and (almost) Tightly Secure CryptographyDéjà Q: Encore! Un Petit IBEAdaptively secure revocable hierarchical IBE from \(k\)-linear assumptionNovel generic construction of leakage-resilient PKE scheme with CCA securityLeakage-Resilient Hierarchical Identity-Based Encryption with Recipient AnonymityIdentity-based encryption with leakage-amplified chosen-ciphertext attacks securityA multi-authority approach to various predicate encryption typesRevocable hierarchical identity-based encryption with adaptive securityLeakage-Resilient Functional Encryption via Pair EncodingsCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Adaptively secure ABE for DFA from \(k\)-Lin and moreFully secure ABE with outsourced decryption against chosen ciphertext attackAnonymous Encryption with Partial-Order Subset Delegation FunctionalityGeneric negation of pair encodingsA Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order GroupsNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysA PROOF OF SECURITY FOR A KEY-POLICY RS-ABE SCHEMEEfficient fully CCA-secure predicate encryptions from pair encodingsIdentity-based broadcast encryption with continuous leakage resilienceLeakage-resilient key exchange and two-seed extractorsDon't tamper with dual system encryption. Beyond polynomial related-key security of IBEUnnamed ItemComputing on authenticated dataSequential aggregate signatures with short public keys without random oraclesPrivacy-preserving encryption scheme using DNA parentage testLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices



Cites Work


This page was built for publication: New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts