Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products - MaRDI portal

Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products

From MaRDI portal
Publication:5458590

DOI10.1007/978-3-540-78967-3_9zbMath1149.94323OpenAlexW1596208550MaRDI QIDQ5458590

Amit Sahai, Brent Waters, Jonathan N. Katz

Publication date: 15 April 2008

Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_9



Related Items

Attribute-Based Keyword Search from Lattices, Adaptive Simulation Security for Inner Product Functional Encryption, Verifiable Inner Product Encryption Scheme, A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials, Foundations of Functional Encryption, A New Functional Encryption for Multidimensional Range Query (Short Paper), Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts, Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption, Predicate Encryption for Circuits from LWE, From Selective to Adaptive Security in Functional Encryption, A Punctured Programming Approach to Adaptively Secure Functional Encryption, (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin, Multi-key and multi-input predicate encryption from learning with errors, Efficient and universally composable single secret leader election from pairings, Pattern matching in encrypted stream from inner product encryption, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, DFE-IP: delegatable functional encryption for inner product, Unbounded predicate inner product functional encryption from pairings, Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures, Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Attribute-based signatures for range of inner product and its applications, Key-policy ABE with switchable attributes, Multi-input attribute based encryption and predicate encryption, Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits, A survey on functional encryption, More efficient verifiable functional encryption, Spatial encryption revisited: from delegatable multiple inner product encryption and more, Achieving privacy-preserving sensitive attributes for large universe based on private set intersection, Attribute-based multi-input FE (and more) for attribute-weighted sums, Confidentiality-Preserving Publicly Verifiable Computation, Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems, Functional Encryption: Origins and Recent Developments, On the Semantic Security of Functional Encryption Schemes, Revocable Identity-Based Encryption Revisited: Security Model and Construction, Improved (Hierarchical) Inner-Product Encryption from Lattices, Robust Encryption, Revisited, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions, Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps, Private Puncturable PRFs from Standard Lattice Assumptions, Simplifying Design and Analysis of Complex Predicate Encryption Schemes, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, Cryptography with Updates, Generalized Identity Based and Broadcast Encryption Schemes, Hidden-Vector Encryption with Groups of Prime Order, Unnamed Item, Unbounded inner product functional encryption from bilinear maps, Watermarking cryptographic functionalities from standard lattice assumptions, Unbounded inner product functional encryption from bilinear maps, Match me if you can: matchmaking encryption and its applications, A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency, Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation, Impossibility of simulation secure functional encryption even with random oracles, Generalized closest substring encryption, Towards semantically secure outsourcing of association rule mining on categorical data, Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin, Multi-input quadratic functional encryption from pairings, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, Single-Key to Multi-Key Functional Encryption with Polynomial Loss, Cross-domain attribute-based access control encryption, CCA-secure ABE using tag and pair encoding, Simpler constructions of asymmetric primitives from obfuscation, A privacy-preserving multi-keyword search approach in cloud computing, Anonymous IBE, leakage resilience and circular security from new assumptions, Towards Forward Security Properties for PEKS and IBE, A novel model for lattice-based authorized searchable encryption with special keyword, Dynamic collusion bounded functional encryption from identity-based encryption, Efficient revocable identity-based encryption via subset difference methods, On the power of rewinding simulators in functional encryption, Anonymous and leakage resilient IBE and IPE, Predicate encryption from bilinear maps and one-sided probabilistic rank, Attribute based encryption for deterministic finite automata from DLIN, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption, Blind key-generation attribute-based encryption for general predicates, Verifiable Functional Encryption, Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice, Spatial encryption supporting non-monotone access structure, Shorter identity-based encryption via asymmetric pairings, Functional encryption for computational hiding in prime order groups via pair encodings, Automated analysis of cryptographic assumptions in generic group models, Attribute-based encryption schemes with constant-size ciphertexts, Inner-product encryption under standard assumptions, Improved hidden vector encryption with short ciphertexts and tokens, Identity-based revocation system: enhanced security model and scalable bounded IBRS construction with short parameters, Unbounded dynamic predicate compositions in ABE from standard assumptions, Inner-product functional encryption with fine-grained access control, Dual trapdoor identity-based encryption with keyword search, Revocable hierarchical identity-based encryption via history-free approach, Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions, Decentralized multi-client functional encryption for set intersection with improved efficiency, Multi-party functional encryption, Policy-compliant signatures, Fully secure unbounded zero inner product encryption with short ciphertexts and keys, Inner-product functional encryption from random linear codes: trial and challenges, Direct computation of branching programs and its applications to more efficient lattice-based cryptography, Adaptively simulation-secure attribute-hiding predicate encryption, Improved inner-product encryption with adaptive security and full attribute-hiding, Practical fully secure unrestricted inner product functional encryption modulo \(p\), Achieving IND-CCA Security for Functional Encryption for Inner Products, The relation and transformation between hierarchical inner product encryption and spatial encryption, Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups, Functional broadcast encryption with applications to data sharing for cloud storage, Compact (Targeted Homomorphic) Inner Product Encryption from LWE, Compact Inner Product Encryption from LWE, Minimizing locality of one-way functions via semi-private randomized encodings, Strongly full-hiding inner product encryption, Self-updatable encryption: time constrained access control with hidden attributes and better efficiency, Verifiability-based conversion from CPA to CCA-secure predicate encryption, Leakage-resilient attribute based encryption in prime-order groups via predicate encodings, Robust encryption, Doubly spatial encryption from DBDH, Anonymous HIBE with short ciphertexts: full security in prime order groups, Fully secure functional encryption with a large class of relations from the decisional linear assumption, Generic construction of designated tester public-key encryption with keyword search, Proxy re-encryption with keyword search, Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts, Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis, Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts, Functional Encryption for Turing Machines, Déjà Q: Encore! Un Petit IBE, A Study of Pair Encodings: Predicate Encryption in Prime Order Groups, Multi-input Functional Encryption and Its Application in Outsourcing Computation, Fully Secure IBE with Tighter Reduction in Prime Order Bilinear Groups, A multi-authority approach to various predicate encryption types, Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing, Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data, Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits, Secret Handshakes with Dynamic Expressive Matching Policy, Edit Distance Based Encryption and Its Application, An efficient CCA-secure access control encryption for any policy, Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, More Efficient Constructions for Inner-Product Encryption, Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions, Efficient Ciphertext Policy Attribute-Based Encryption with Constant-Size Ciphertext and Constant Computation-Cost, Generic negation of pair encodings, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Attribute-Based Encryption for Range Attributes, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Privacy-Aware Attribute-Based Encryption with User Accountability, Functional encryption for set intersection in the multi-client setting, Efficient fully CCA-secure predicate encryptions from pair encodings, Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting, Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes, New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, Robust Encryption, Functional encryption for attribute-weighted sums from \(k\)-Lin, Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE, Revocable hierarchical attribute-based signatures from lattices, Zero-knowledge proofs for committed symmetric Boolean functions