Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin
From MaRDI portal
Publication:6063536
DOI10.1007/978-3-031-30620-4_21zbMath1528.94054OpenAlexW4365806750MaRDI QIDQ6063536
Junqing Gong, Hoeteck Wee, J. Luo
Publication date: 12 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-30620-4_21
Cites Work
- Unnamed Item
- Traitor-tracing from LWE made simple and attribute-based
- Unbounded ABE via bilinear entropy expansion, revisited
- Risky traitor tracing and new differential privacy negative results
- Practical functional encryption for quadratic functions with applications to predicate encryption
- Attribute-hiding predicate encryption in bilinear groups, revisited
- Adaptively secure ABE for DFA from \(k\)-Lin and more
- Functional encryption for quadratic functions from \(k\)-lin, revisited
- New techniques for traitor tracing: size \(N^{1/3}\) and more from pairings
- Compact adaptively secure ABE for \(\mathrm{NC}^1\) from \(k\)-lin
- Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions
- Succinct and adaptively secure ABE for ABP from \(k\)-Lin
- Inner-product functional encryption with fine-grained access control
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- An Algebraic Framework for Diffie-Hellman Assumptions
- Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
- How to share a secret
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys
- Computational Concentration of Measure: Optimal Bounds, Reductions, and More
- Partial Garbling Schemes and Their Applications
- Collusion resistant traitor tracing from learning with errors
- Efficient Traitor Tracing from Collusion Secure Codes
This page was built for publication: Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin