Registered attribute-based encryption
From MaRDI portal
Publication:6063531
DOI10.1007/978-3-031-30620-4_17zbMath1528.94058OpenAlexW4365807184MaRDI QIDQ6063531
George Lu, David J. Wu, Brent Waters, Susan Hohenberger
Publication date: 12 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-30620-4_17
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Registration-based encryption: removing private-key generator from IBE
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Verifiable registration-based encryption
- Optimizing registration based encryption
- Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)
- Subvector commitments with application to succinct arguments
- Registration-based encryption from standard assumptions
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption
- Identity-Based Cryptosystems and Signature Schemes
- On the Communication Complexity of Secure Function Evaluation with Long Output
- Identity-Based Encryption Secure against Selective Opening Attack
- Decentralizing Attribute-Based Encryption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Distributed Private-Key Generators for Identity-Based Cryptography
- Multi-authority Attribute Based Encryption
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities
- Reducing Trust in the PKG in Identity Based Cryptosystems
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Vector Commitments and Their Applications
- Fuzzy Identity-Based Encryption
- On the (im)possibility of obfuscating programs
- Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority
- Theory of Cryptography
- Advances in Cryptology - ASIACRYPT 2003
- Indistinguishability obfuscation from well-founded assumptions
- Batch arguments for \textsf{NP} and more from standard bilinear group assumptions
- Multi-authority ABE from lattices without random oracles
This page was built for publication: Registered attribute-based encryption