메뉴 건너뛰기




Volumn 8642, Issue , 2014, Pages 298-317

Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption

Author keywords

[No Author keywords available]

Indexed keywords

CHROMIUM COMPOUNDS; NETWORK SECURITY; VECTOR SPACES;

EID: 84925442175     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-10879-7_17     Document Type: Conference Paper
Times cited : (35)

References (30)
  • 1
    • 84901650094 scopus 로고    scopus 로고
    • Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more
    • In: Nguyen, P.Q., Oswald, E. (eds.), Springer, Heidelberg
    • Attrapadung, N.: Dual system encryption via doubly selective security: Framework, fully secure functional encryption for regular languages, and more. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 557-577. Springer, Heidelberg (2014)
    • (2014) EUROCRYPT 2014. LNCS , vol.8441 , pp. 557-577
    • Attrapadung, N.1
  • 5
    • 35048887476 scopus 로고    scopus 로고
    • Short group signatures
    • In: Franklin, M. (ed.), Springer, Heidelberg
    • Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41-55. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004. LNCS , vol.3152 , pp. 41-55
    • Boneh, D.1    Boyen, X.2    Shacham, H.3
  • 6
    • 33745166648 scopus 로고    scopus 로고
    • Collusion resistant broadcast encryption with short ciphertexts and private keys
    • In: Shoup, V. (ed.), Springer, Heidelberg
    • Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 258-275. Springer, Heidelberg (2005)
    • (2005) CRYPTO 2005. LNCS , vol.3621 , pp. 258-275
    • Boneh, D.1    Gentry, C.2    Waters, B.3
  • 8
    • 84874307015 scopus 로고    scopus 로고
    • Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
    • In: Dawson, E. (ed.), Springer, Heidelberg
    • Chen, C., Chen, J., Lim, H.W., Zhang, Z., Feng, D., Ling, S., Wang, H.: Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures. In: Dawson, E. (ed.) RSA 2013. LNCS, vol. 7779, pp. 50-67. Springer, Heidelberg (2013)
    • (2013) RSA 2013. LNCS , vol.7779 , pp. 50-67
    • Chen, C.1    Chen, J.2    Lim, H.W.3    Zhang, Z.4    Feng, D.5    Ling, S.6    Wang, H.7
  • 9
    • 84927631425 scopus 로고    scopus 로고
    • Semi-adaptive attribute-based encryption and improved delegation for boolean formula. To appear in SCN 2014
    • Chen, J., Wee, H.: Semi-adaptive attribute-based encryption and improved delegation for boolean formula. To appear in SCN 2014. IACR Cryptology ePrint Archive 2014, 465 (2014)
    • (2014) IACR Cryptology Eprint Archive , vol.2014 , pp. 465
    • Chen, J.1    Wee, H.2
  • 11
    • 77958051471 scopus 로고    scopus 로고
    • (ed.), Springer, Heidelberg
    • Cramer, R. (ed.): EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
    • (2005) EUROCRYPT 2005. LNCS , vol.3494
    • Cramer, R.1
  • 12
    • 38149117029 scopus 로고    scopus 로고
    • Identity-based broadcast encryption with constant size ciphertexts and private keys
    • In: Kurosawa, K. (ed.), Springer, Heidelberg
    • Delerablèe, C.: Identity-based broadcast encryption with constant size ciphertexts and private keys. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 200-215. Springer, Heidelberg (2007)
    • (2007) ASIACRYPT 2007. LNCS , vol.4833 , pp. 200-215
    • Delerablèe, C.1
  • 13
    • 70350635850 scopus 로고    scopus 로고
    • A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
    • In: Bao, F., Li, H., Wang, G. (eds.), Springer, Heidelberg
    • Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: Bao, F., Li, H., Wang, G. (eds.) ISPEC 2009. LNCS, vol. 5451, pp. 13-23. Springer, Heidelberg (2009)
    • (2009) ISPEC 2009. LNCS , vol.5451 , pp. 13-23
    • Emura, K.1    Miyaji, A.2    Nomura, A.3    Omote, K.4    Soshi, M.5
  • 14
    • 84884481521 scopus 로고    scopus 로고
    • Attribute-based encryption for circuits from multilinear maps
    • In: Canetti, R., Garay, J.A. (eds.), Springer, Heidelberg
    • Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 479-499. Springer, Heidelberg (2013)
    • (2013) CRYPTO 2013, Part II. LNCS , vol.8043 , pp. 479-499
    • Garg, S.1    Gentry, C.2    Halevi, S.3    Sahai, A.4    Waters, B.5
  • 16
    • 84879825205 scopus 로고    scopus 로고
    • Attribute-based encryption for circuits
    • Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.), ACM
    • Gorbunov, S., Vaikuntanathan, V., Wee, H.: Attribute-based encryption for circuits. In: Boneh, D., Roughgarden, T., Feigenbaum, J. (eds.) STOC, pp. 545-554. ACM (2013)
    • (2013) STOC , pp. 545-554
    • Gorbunov, S.1    Vaikuntanathan, V.2    Wee, H.3
  • 17
    • 79952523217 scopus 로고    scopus 로고
    • R`afols, C.: Constant size ciphertexts in threshold attribute-based encryption
    • In: Nguyen, P.Q., Pointcheval, D. (eds.), Springer, Heidelberg
    • Herranz, J., Laguillaumie, F., R`afols, C.: Constant size ciphertexts in threshold attribute-based encryption. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 19-34. Springer, Heidelberg (2010)
    • (2010) PKC 2010. LNCS , vol.6056 , pp. 19-34
    • Herranz, J.1    Laguillaumie, F.2
  • 18
    • 79951783454 scopus 로고    scopus 로고
    • Attribute-based signatures
    • In: Kiayias, A. (ed.), Springer, Heidelberg
    • Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376-392. Springer, Heidelberg (2011)
    • (2011) CT-RSA 2011. LNCS , vol.6558 , pp. 376-392
    • Maji, H.K.1    Prabhakaran, M.2    Rosulek, M.3
  • 20
    • 84871859795 scopus 로고    scopus 로고
    • Efficient (Hierarchical) inner-product encryption tightly reduced from the decisional linear assumption. IEICE Trans
    • Okamoto, T., Takashima, K.: Efficient (hierarchical) inner-product encryption tightly reduced from the decisional linear assumption. IEICE Trans. Fundamentals E96-A(1), 42-52 (2013)
    • (2013) Fundamentals E96-A(1) , pp. 42-52
    • Okamoto, T.1    Takashima, K.2
  • 21
    • 72449208663 scopus 로고    scopus 로고
    • Hierarchical predicate encryption for inner-products
    • In: Matsui, M. (ed.), Springer, Heidelberg
    • Okamoto, T., Takashima, K.: Hierarchical predicate encryption for inner-products. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 214-231. Springer, Heidelberg (2009)
    • (2009) ASIACRYPT 2009. LNCS , vol.5912 , pp. 214-231
    • Okamoto, T.1    Takashima, K.2
  • 22
    • 77957011503 scopus 로고    scopus 로고
    • Fully secure functional encryption with general relations from the decisional linear assumption
    • In: Rabin, T. (ed.), Springer, Heidelberg, full version
    • Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191-208. Springer, Heidelberg (2010), full version is available at http://eprint.iacr.org/2010/563
    • (2010) CRYPTO 2010. LNCS , vol.6223 , pp. 191-208
    • Okamoto, T.1    Takashima, K.2
  • 23
    • 83755161618 scopus 로고    scopus 로고
    • Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
    • In: Lin, D., Tsudik, G., Wang, X. (eds.), Springer, Heidelberg, full version
    • Okamoto, T., Takashima, K.: Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption. In: Lin, D., Tsudik, G., Wang, X. (eds.) CANS 2011. LNCS, vol. 7092, pp. 138-159. Springer, Heidelberg (2011), full version is available at http://eprint.iacr.org/2011/648
    • (2011) CANS 2011. LNCS , vol.7092 , pp. 138-159
    • Okamoto, T.1    Takashima, K.2
  • 26
    • 84861691788 scopus 로고    scopus 로고
    • Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve
    • In: Fischlin, M., Buchmann, J., Manulis, M. (eds.), Springer, Heidelberg
    • Sakemi, Y., Hanaoka, G., Izu, T., Takenaka, M., Yasuda, M.: Solving a discrete logarithm problem with auxiliary input on a 160-bit elliptic curve. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 595-608. Springer, Heidelberg (2012)
    • (2012) PKC 2012. LNCS , vol.7293 , pp. 595-608
    • Sakemi, Y.1    Hanaoka, G.2    Izu, T.3    Takenaka, M.4    Yasuda, M.5
  • 27
    • 84927612467 scopus 로고    scopus 로고
    • Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption
    • Takashima, K.: Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption. IACR Cryptology ePrint Archive 2014, 207 (2014)
    • (2014) IACR Cryptology Eprint Archive , vol.2014 , pp. 207
    • Takashima, K.1
  • 28
    • 84899059463 scopus 로고    scopus 로고
    • Vaudenay, S. (ed.), Springer, Heidelberg
    • Vaudenay, S. (ed.): EUROCRYPT 2006. LNCS, vol. 4004. Springer, Heidelberg (2006)
    • (2006) EUROCRYPT 2006. LNCS , vol.4004
  • 29
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions
    • In: Halevi, S. (ed.), Springer, Heidelberg
    • Waters, B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619-636. Springer, Heidelberg (2009)
    • (2009) CRYPTO 2009. LNCS , vol.5677 , pp. 619-636
    • Waters, B.1
  • 30
    • 84958551684 scopus 로고    scopus 로고
    • A framework and compact constructions for non-monotonic attribute-based encryption
    • In: Krawczyk, H. (ed.), Springer, Heidelberg
    • Yamada, S., Attrapadung, N., Hanaoka, G., Kunihiro, N.: A framework and compact constructions for non-monotonic attribute-based encryption. In: Krawczyk, H. (ed.) PKC 2014. LNCS, vol. 8383, pp. 275-292. Springer, Heidelberg (2014)
    • (2014) PKC 2014. LNCS , vol.8383 , pp. 275-292
    • Yamada, S.1    Attrapadung, N.2    Hanaoka, G.3    Kunihiro, N.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.