Attribute-based encryption for circuits
From MaRDI portal
Publication:5495825
DOI10.1145/2488608.2488677zbMath1293.68109OpenAlexW2008701790MaRDI QIDQ5495825
Hoeteck Wee, Vinod Vaikuntanathan, Sergey Gorbunov
Publication date: 7 August 2014
Published in: Proceedings of the forty-fifth annual ACM symposium on Theory of Computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/2488608.2488677
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Complexity classes (hierarchies, relations among complexity classes, etc.) (68Q15)
Related Items (85)
Adaptive Simulation Security for Inner Product Functional Encryption ⋮ Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact ⋮ Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN ⋮ Impossibility of simulation secure functional encryption even with random oracles ⋮ Generalized closest substring encryption ⋮ Deniable Attribute Based Encryption for Branching Programs from LWE ⋮ Targeted Homomorphic Attribute-Based Encryption ⋮ Semi-adaptive Security and Bundling Functionalities Made Generic and Easy ⋮ Single-Key to Multi-Key Functional Encryption with Polynomial Loss ⋮ Faster Gaussian sampling for trapdoor lattices with arbitrary modulus ⋮ Making \textit{any} attribute-based encryption accountable, efficiently ⋮ Quantum algorithms for variants of average-case lattice problems via filtering ⋮ On the power of rewinding simulators in functional encryption ⋮ Towards a Simpler Lattice Gadget Toolkit ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ A survey of lattice based expressive attribute based encryption ⋮ Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps ⋮ Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption ⋮ Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 ⋮ Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin ⋮ Efficient and scalable universal circuits ⋮ On the optimal succinctness and efficiency of functional encryption and attribute-based encryption ⋮ Broadcast, trace and revoke with optimal parameters from polynomial hardness ⋮ Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications ⋮ Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions ⋮ Towards Tightly Secure Lattice Short Signature and Id-Based Encryption ⋮ Verifiable Functional Encryption ⋮ Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings ⋮ Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey ⋮ Bounded functional encryption for Turing machines: adaptive security from general assumptions ⋮ ABE for circuits with constant-size secret keys and adaptive security ⋮ (Inner-product) functional encryption with updatable ciphertexts ⋮ Multi-input attribute based encryption and predicate encryption ⋮ Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits ⋮ Post-quantum insecurity from LWE ⋮ More efficient verifiable functional encryption ⋮ Lattice-based cryptography: a survey ⋮ Attribute-based multi-input FE (and more) for attribute-weighted sums ⋮ Compact lattice gadget and its applications to hash-and-sign signatures ⋮ Access control encryption with efficient verifiable sanitized decryption ⋮ Unbounded dynamic predicate compositions in ABE from standard assumptions ⋮ Inner-product functional encryption with fine-grained access control ⋮ Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ ABE for DFA from LWE against bounded collusions, revisited ⋮ Direct computation of branching programs and its applications to more efficient lattice-based cryptography ⋮ Improved inner-product encryption with adaptive security and full attribute-hiding ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Expanded Framework for Dual System Encryption and Its Application ⋮ Compact Inner Product Encryption from LWE ⋮ Fine-grained searchable encryption in multi-user setting ⋮ Verifiability-based conversion from CPA to CCA-secure predicate encryption ⋮ A more efficient leveled strongly-unforgeable fully homomorphic signature scheme ⋮ Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits ⋮ Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions ⋮ Private Puncturable PRFs from Standard Lattice Assumptions ⋮ Simplifying Design and Analysis of Complex Predicate Encryption Schemes ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Functional encryption for cascade automata ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Output-Compressing Randomized Encodings and Applications ⋮ Algebraic Attacks Against Several Weak Variants of GVW’13 ABE ⋮ Functional Encryption for Cascade Automata (Extended Abstract) ⋮ Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits ⋮ Optimal broadcast encryption from pairings and LWE ⋮ Impossibility results for lattice-based functional encryption schemes ⋮ Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) ⋮ Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} ⋮ New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts ⋮ Candidate obfuscation via oblivious LWE sampling ⋮ Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption ⋮ More Efficient Constructions for Inner-Product Encryption ⋮ Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions ⋮ Generic negation of pair encodings ⋮ Quantum Homomorphic Encryption for Polynomial-Sized Circuits ⋮ Fully Secure Functional Encryption for Inner Products, from Standard Assumptions ⋮ Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security ⋮ Efficient fully CCA-secure predicate encryptions from pair encodings ⋮ Functional encryption for attribute-weighted sums from \(k\)-Lin ⋮ Unnamed Item ⋮ Garbled Circuits as Randomized Encodings of Functions: a Primer ⋮ Implementation of lattice trapdoors on modules and applications ⋮ Hardness of LWE on general entropic distributions ⋮ Integral matrix Gram root and lattice Gaussian sampling without floats
This page was built for publication: Attribute-based encryption for circuits