Public-Key Puncturable Encryption: Modular and Compact Constructions
From MaRDI portal
Publication:5041162
DOI10.1007/978-3-030-45374-9_11zbMath1500.94050OpenAlexW3023659140MaRDI QIDQ5041162
Amin Sakzad, Joseph K. Liu, Shi-Feng Sun, Ron Steinfeld, Da-Wu Gu
Publication date: 13 October 2022
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-45374-9_11
Related Items (7)
Fine-grained forward secrecy: allow-list/deny-list encryption and applications ⋮ Puncturable identity-based and attribute-based encryption from lattices ⋮ Symmetric Key Exchange with Full Forward Security and Robust Synchronization ⋮ CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors ⋮ Incremental symmetric puncturable encryption with support for unbounded number of punctures ⋮ Forward secret encrypted RAM: lower bounds and applications ⋮ Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unbounded ABE via bilinear entropy expansion, revisited
- Revisiting proxy re-encryption: forward secrecy, improved security, and applications
- Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR
- Unbounded dynamic predicate compositions in attribute-based encryption
- ABE for DFA from \(k\)-lin
- Distributing the encryption and decryption of a block cipher
- Compressed bloom filters
- Attribute-Based Encryption for Range Attributes
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts
- Cryptography Secure against Related-Key Attacks and Tampering
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
- On Unconditionally Secure Robust Distributed Key Distribution Centers
- Watermarking Cryptographic Capabilities
- RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
- How to withstand mobile virus attacks (extended abstract)
- 0-RTT Key Exchange with Full Forward Secrecy
- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys
- A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
- Chosen-Ciphertext Secure Fully Homomorphic Encryption
- Theory of Cryptography
- Theory of Cryptography
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
This page was built for publication: Public-Key Puncturable Encryption: Modular and Compact Constructions