Algebraic Attacks Against Several Weak Variants of GVW’13 ABE
From MaRDI portal
Publication:5205016
DOI10.1142/S012905411940015XzbMath1439.94034MaRDI QIDQ5205016
Baocang Wang, Jiangshan Chen, Shanshan Zhang, Zhizhu Lian, Yu Pu Hu
Publication date: 10 December 2019
Published in: International Journal of Foundations of Computer Science (Search for Journal in Brave)
Cites Work
- Bonsai trees, or how to delegate a lattice basis
- Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
- Attribute-Based Encryption for Circuits from Multilinear Maps
- New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques
- Functional Encryption for Regular Languages
- Identity-Based Cryptosystems and Signature Schemes
- Targeted Homomorphic Attribute-Based Encryption
- Trapdoors for hard lattices and new cryptographic constructions
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Efficient Lattice (H)IBE in the Standard Model
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Identity-Based Encryption from the Weil Pairing
- Attribute-Based Functional Encryption on Lattices
- Attribute-Based Encryption with Fast Decryption
- Fuzzy Identity-Based Encryption
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
- Attribute-based encryption for circuits
This page was built for publication: Algebraic Attacks Against Several Weak Variants of GVW’13 ABE