Fully adaptive decentralized multi-authority \textsf{ABE}
From MaRDI portal
Publication:6063528
DOI10.1007/978-3-031-30620-4_15zbMath1528.94041OpenAlexW4365806694MaRDI QIDQ6063528
Ilan Komargodski, Pratish Datta, Brent Waters
Publication date: 12 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-30620-4_15
Cites Work
- Unnamed Item
- Unnamed Item
- An algebraic framework for Diffie-Hellman assumptions
- Unbounded ABE via bilinear entropy expansion, revisited
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)
- Adaptively secure ABE for DFA from \(k\)-Lin and more
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups
- An Algebraic Framework for Diffie-Hellman Assumptions
- Pseudorandomness
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings
- Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting
- Unbounded HIBE and Attribute-Based Encryption
- Decentralizing Attribute-Based Encryption
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Bilinear Entropy Expansion from the Decisional Linear Assumption
- From Selective to Adaptive Security in Functional Encryption
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Multi-authority Attribute Based Encryption
- Secure Hybrid Encryption from Weakened Key Encapsulation
- Fully Secure Unbounded Inner-Product and Attribute-Based Encryption
- ON MULTI-AUTHORITY CIPHERTEXT-POLICY ATTRIBUTE-BASED ENCRYPTION
- Advances in Cryptology – CRYPTO 2004
- Fuzzy Identity-Based Encryption
- Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
- Theory of Cryptography
- Multi-authority ABE from lattices without random oracles
- Candidate witness encryption from lattice techniques
This page was built for publication: Fully adaptive decentralized multi-authority \textsf{ABE}