Attribute-based encryption for circuits

From MaRDI portal
Publication:5495825

DOI10.1145/2488608.2488677zbMath1293.68109OpenAlexW2008701790MaRDI QIDQ5495825

Hoeteck Wee, Vinod Vaikuntanathan, Sergey Gorbunov

Publication date: 7 August 2014

Published in: Proceedings of the forty-fifth annual ACM symposium on Theory of Computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/2488608.2488677




Related Items (85)

Adaptive Simulation Security for Inner Product Functional EncryptionPushing the limits of Valiant's universal circuits: simpler, tighter and more compactSmoothing out binary linear codes and worst-case sub-exponential hardness for LPNImpossibility of simulation secure functional encryption even with random oraclesGeneralized closest substring encryptionDeniable Attribute Based Encryption for Branching Programs from LWETargeted Homomorphic Attribute-Based EncryptionSemi-adaptive Security and Bundling Functionalities Made Generic and EasySingle-Key to Multi-Key Functional Encryption with Polynomial LossFaster Gaussian sampling for trapdoor lattices with arbitrary modulusMaking \textit{any} attribute-based encryption accountable, efficientlyQuantum algorithms for variants of average-case lattice problems via filteringOn the power of rewinding simulators in functional encryptionTowards a Simpler Lattice Gadget ToolkitAttribute based encryption for deterministic finite automata from DLINA survey of lattice based expressive attribute based encryptionKey-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear MapsAchieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryptionCryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-LinEfficient and scalable universal circuitsOn the optimal succinctness and efficiency of functional encryption and attribute-based encryptionBroadcast, trace and revoke with optimal parameters from polynomial hardnessSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionVerifiable Functional EncryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsElliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive surveyBounded functional encryption for Turing machines: adaptive security from general assumptionsABE for circuits with constant-size secret keys and adaptive security(Inner-product) functional encryption with updatable ciphertextsMulti-input attribute based encryption and predicate encryptionLeakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled CircuitsPost-quantum insecurity from LWEMore efficient verifiable functional encryptionLattice-based cryptography: a surveyAttribute-based multi-input FE (and more) for attribute-weighted sumsCompact lattice gadget and its applications to hash-and-sign signaturesAccess control encryption with efficient verifiable sanitized decryptionUnbounded dynamic predicate compositions in ABE from standard assumptionsInner-product functional encryption with fine-grained access controlSuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHABE for DFA from LWE against bounded collusions, revisitedDirect computation of branching programs and its applications to more efficient lattice-based cryptographyImproved inner-product encryption with adaptive security and full attribute-hidingCollusion Resistant Traitor Tracing from Learning with ErrorsExpanded Framework for Dual System Encryption and Its ApplicationCompact Inner Product Encryption from LWEFine-grained searchable encryption in multi-user settingVerifiability-based conversion from CPA to CCA-secure predicate encryptionA more efficient leveled strongly-unforgeable fully homomorphic signature schemeDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsBounded-Collusion Attribute-Based Encryption from Minimal AssumptionsPrivate Puncturable PRFs from Standard Lattice AssumptionsSimplifying Design and Analysis of Complex Predicate Encryption SchemesFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsFully secure functional encryption with a large class of relations from the decisional linear assumptionFunctional encryption for cascade automataWatermarking cryptographic functionalities from standard lattice assumptionsOutput-Compressing Randomized Encodings and ApplicationsAlgebraic Attacks Against Several Weak Variants of GVW’13 ABEFunctional Encryption for Cascade Automata (Extended Abstract)Candidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsOptimal broadcast encryption from pairings and LWEImpossibility results for lattice-based functional encryption schemesCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsCandidate obfuscation via oblivious LWE samplingChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionMore Efficient Constructions for Inner-Product EncryptionTuring Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded FunctionsGeneric negation of pair encodingsQuantum Homomorphic Encryption for Polynomial-Sized CircuitsFully Secure Functional Encryption for Inner Products, from Standard AssumptionsCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityEfficient fully CCA-secure predicate encryptions from pair encodingsFunctional encryption for attribute-weighted sums from \(k\)-LinUnnamed ItemGarbled Circuits as Randomized Encodings of Functions: a PrimerImplementation of lattice trapdoors on modules and applicationsHardness of LWE on general entropic distributionsIntegral matrix Gram root and lattice Gaussian sampling without floats




This page was built for publication: Attribute-based encryption for circuits