Dynamic collusion functional encryption and multi-authority attribute-based encryption
From MaRDI portal
Publication:6635893
DOI10.1007/978-3-031-57728-4_3MaRDI QIDQ6635893
Rachit Garg, George Lu, Rishab Goyal
Publication date: 12 November 2024
Cites Work
- Unnamed Item
- Unnamed Item
- Registration-based encryption: removing private-key generator from IBE
- Traitor-tracing from LWE made simple and attribute-based
- Anonymous IBE, leakage resilience and circular security from new assumptions
- Stronger security for reusable garbled circuits, general definitions and attacks
- Identity-based encryption from the Diffie-Hellman assumption
- Functional encryption for bounded collusions, revisited
- From selective IBE to full IBE and selective HIBE
- New constructions of identity-based and key-dependent message secure encryption schemes
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}
- Candidate obfuscation via oblivious LWE sampling
- Verifiable registration-based encryption
- Functional encryption for Turing machines with dynamic bounded collusion from LWE
- Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)
- Dynamic collusion bounded functional encryption from identity-based encryption
- Optimal bounded-collusion secure functional encryption
- Registration-based encryption from standard assumptions
- FE for inner products and its application to decentralized ABE
- Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption
- Multi-party functional encryption
- Succinct LWE sampling, random polynomials, and obfuscation
- ABE for DFA from LWE against bounded collusions, revisited
- Functional Encryption: New Perspectives and Lower Bounds
- How to Run Turing Machines on Encrypted Data
- Bounded-Collusion IBE from Key Homomorphism
- Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Identity-Based Cryptosystems and Signature Schemes
- Functional Encryption: Definitions and Challenges
- Decentralizing Attribute-Based Encryption
- Secret-Sharing Schemes: A Survey
- Semi-adaptive Security and Bundling Functionalities Made Generic and Easy
- Trapdoors for hard lattices and new cryptographic constructions
- Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Multi-authority Attribute Based Encryption
- New directions in cryptography
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Fuzzy Identity-Based Encryption
- Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
- Progress in Cryptology - INDOCRYPT 2003
- Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
- Bounded Collusion ABE for TMs from IBE
- Fully adaptive decentralized multi-authority \textsf{ABE}
- Indistinguishability obfuscation from well-founded assumptions
- Indistinguishability obfuscation from circular security
- Bounded functional encryption for Turing machines: adaptive security from general assumptions
This page was built for publication: Dynamic collusion functional encryption and multi-authority attribute-based encryption