Match me if you can: matchmaking encryption and its applications
From MaRDI portal
Publication:5918327
DOI10.1007/s00145-021-09381-4zbMath1467.94027OpenAlexW2967445128WikidataQ121459864 ScholiaQ121459864MaRDI QIDQ5918327
Giuseppe Ateniese, Daniele Venturi, Danilo Francati, David Nuñez
Publication date: 2 July 2021
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-021-09381-4
Related Items (2)
Multi-key and multi-input predicate encryption from learning with errors ⋮ Public key based searchable encryption with fine-grained sender permission control
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Pairings for cryptographers
- Practical functional encryption for quadratic functions with applications to predicate encryption
- Attribute-hiding predicate encryption in bilinear groups, revisited
- Registration-based encryption from standard assumptions
- Attribute-based on-demand multicast group setup with membership anonymity
- Access control encryption for general policies from standard assumptions
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
- Secret Handshakes with Dynamic Expressive Matching Policy
- On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption
- Predicate Encryption for Multi-dimensional Range Queries from Lattices
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
- Functional Encryption: Definitions and Challenges
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
- Affiliation-Hiding Authentication with Minimal Bandwidth Consumption
- Access Control Encryption: Enforcing Information Flow with Cryptography
- Conjunctive Broadcast and Attribute-Based Encryption
- Predicate Encryption for Circuits from LWE
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
- Delegating Capabilities in Predicate Encryption Systems
- Bounded Ciphertext Policy Attribute Based Encryption
- Defending against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems
- Affiliation-Hiding Key Exchange with Untrusted Group Authorities
- Privacy-Preserving Group Discovery with Linear Complexity
- Taming Big Brother Ambitions: More Privacy for Secret Handshakes
- Fixed Argument Pairings
- Multi-authority Attribute Based Encryption
- Predicate Privacy in Encryption Systems
- Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes
- Removing Escrow from Identity-Based Encryption
- Hierarchical Predicate Encryption for Inner-Products
- Functional Encryption for Randomized Functionalities
- Fuzzy Identity-Based Encryption
- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
- Multi-input Functional Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
- Secret Handshakes from CA-Oblivious Encryption
- Access Control Encryption for Equality, Comparison, and More
- Simplifying Design and Analysis of Complex Predicate Encryption Schemes
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
- Dual System Encryption via Predicate Encodings
- Coding and Cryptography
- Applied Cryptography and Network Security
This page was built for publication: Match me if you can: matchmaking encryption and its applications