Zhao, Feixiang; Weng, Jian; Xie, Wenli; Li, Ming; Weng, Jiasi HRA-secure attribute-based threshold proxy re-encryption from lattices. (English) Zbl 07803414 Inf. Sci. 655, Article ID 119900, 16 p. (2024). MSC: 94A60 68P25 68M25 PDFBibTeX XMLCite \textit{F. Zhao} et al., Inf. Sci. 655, Article ID 119900, 16 p. (2024; Zbl 07803414) Full Text: DOI
Pan, Jiaxin; Qian, Chen; Wagner, Benedikt Generic constructions of master-key KDM secure attribute-based encryption. (English) Zbl 07787704 Des. Codes Cryptography 92, No. 1, 51-92 (2024). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Pan} et al., Des. Codes Cryptography 92, No. 1, 51--92 (2024; Zbl 07787704) Full Text: DOI
Agrawal, Shweta; Rossi, Mélissa; Yadav, Anshu; Yamada, Shota Constant input attribute based (and predicate) encryption from evasive and tensor LWE. (English) Zbl 07800220 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14084, 532-564 (2023). MSC: 94A60 68P25 68N20 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 14084, 532--564 (2023; Zbl 07800220) Full Text: DOI
Agrawal, Shweta; Kitagawa, Fuyuki; Nishimaki, Ryo; Yamada, Shota; Yamakawa, Takashi Public key encryption with secure key leasing. (English) Zbl 07789173 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14004, 581-610 (2023). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 14004, 581--610 (2023; Zbl 07789173) Full Text: DOI arXiv
Datta, Pratish; Komargodski, Ilan; Waters, Brent Fully adaptive decentralized multi-authority ABE. (English) Zbl 1528.94041 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14006, 447-478 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Datta} et al., Lect. Notes Comput. Sci. 14006, 447--478 (2023; Zbl 1528.94041) Full Text: DOI
Venema, Marloes; Alpár, Greg GLUE: generalizing unbounded attribute-based encryption for flexible efficiency trade-offs. (English) Zbl 1527.94070 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 652-682 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Venema} and \textit{G. Alpár}, Lect. Notes Comput. Sci. 13940, 652--682 (2023; Zbl 1527.94070) Full Text: DOI
Datta, Pratish; Pal, Tapas Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded. (English) Zbl 1527.94031 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13940, 587-621 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Datta} and \textit{T. Pal}, Lect. Notes Comput. Sci. 13940, 587--621 (2023; Zbl 1527.94031) Full Text: DOI
Venema, Marloes A practical compiler for attribute-based encryption: new decentralized constructions and more. (English) Zbl 07745604 Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 132-159 (2023). MSC: 68P25 68N20 94A60 PDFBibTeX XMLCite \textit{M. Venema}, Lect. Notes Comput. Sci. 13871, 132--159 (2023; Zbl 07745604) Full Text: DOI
Samadder Chaudhury, Shion; Samanta, Asmita; Maitra, Arpita Quantum attribute-based encryption: a comprehensive study. (English) Zbl 07739413 Quantum Inf. Process. 22, No. 9, Paper No. 335, 34 p. (2023). MSC: 81P68 81P68 94A60 94A62 PDFBibTeX XMLCite \textit{S. Samadder Chaudhury} et al., Quantum Inf. Process. 22, No. 9, Paper No. 335, 34 p. (2023; Zbl 07739413) Full Text: DOI
Wang, Yuyu; Pan, Jiaxin; Chen, Yu Fine-grained secure attribute-based encryption. (English) Zbl 1519.94195 J. Cryptology 36, No. 4, Paper No. 33, 45 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Wang} et al., J. Cryptology 36, No. 4, Paper No. 33, 45 p. (2023; Zbl 1519.94195) Full Text: DOI
Ishizaka, Masahito; Fukushima, Kazuhide Attribute-based signatures for range of inner product and its applications. (English) Zbl 07730586 Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 382-407 (2023). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{M. Ishizaka} and \textit{K. Fukushima}, Lect. Notes Comput. Sci. 13849, 382--407 (2023; Zbl 07730586) Full Text: DOI
Li, Hanjun; Lin, Huijia; Luo, Ji ABE for circuits with constant-size secret keys and adaptive security. (English) Zbl 1519.94157 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13747, 680-710 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Li} et al., Lect. Notes Comput. Sci. 13747, 680--710 (2023; Zbl 1519.94157) Full Text: DOI
Waters, Brent; Wee, Hoeteck; Wu, David J. Multi-authority ABE from lattices without random oracles. (English) Zbl 1517.94163 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13747, 651-679 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Waters} et al., Lect. Notes Comput. Sci. 13747, 651--679 (2023; Zbl 1517.94163) Full Text: DOI
Agrawal, Shweta; Kitagawa, Fuyuki; Modi, Anuja; Nishimaki, Ryo; Yamada, Shota; Yamakawa, Takashi Bounded functional encryption for Turing machines: adaptive security from general assumptions. (English) Zbl 1519.94027 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13747, 618-647 (2023). MSC: 94A60 68Q04 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 13747, 618--647 (2023; Zbl 1519.94027) Full Text: DOI
Mascia, Carla; Sala, Massimiliano; Villa, Irene A survey on functional encryption. (English) Zbl 1517.94131 Adv. Math. Commun. 17, No. 5, 1251-1289 (2023). MSC: 94A60 11T71 14G50 PDFBibTeX XMLCite \textit{C. Mascia} et al., Adv. Math. Commun. 17, No. 5, 1251--1289 (2023; Zbl 1517.94131) Full Text: DOI arXiv
Ullah, Shamsher; Zheng, Jiangbin; Din, Nizamud; Hussain, Muhammad Tanveer; Ullah, Farhan; Yousaf, Mahwish Elliptic curve cryptography; applications, challenges, recent advances, and future trends: a comprehensive survey. (English) Zbl 07698735 Comput. Sci. Rev. 47, Article ID 100530, 28 p. (2023). MSC: 68-02 68-XX PDFBibTeX XMLCite \textit{S. Ullah} et al., Comput. Sci. Rev. 47, Article ID 100530, 28 p. (2023; Zbl 07698735) Full Text: DOI
Zhao, Jun; Yang, Minghao; Gong, Junqing; Zhang, Kai; Qian, Haifeng Bounded-collusion decentralized ABE with sublinear parameters. (English) Zbl 07687173 Theor. Comput. Sci. 960, Article ID 113897, 17 p. (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Zhao} et al., Theor. Comput. Sci. 960, Article ID 113897, 17 p. (2023; Zbl 07687173) Full Text: DOI
Katsumata, Shuichi; Tomita, Toi; Yamada, Shota Direct computation of branching programs and its applications to more efficient lattice-based cryptography. (English) Zbl 1511.94119 Des. Codes Cryptography 91, No. 2, 391-431 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Katsumata} et al., Des. Codes Cryptography 91, No. 2, 391--431 (2023; Zbl 1511.94119) Full Text: DOI
Datta, Pratish; Komargodski, Ilan; Waters, Brent Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH. (English) Zbl 1511.94084 J. Cryptology 36, No. 2, Paper No. 6, 31 p. (2023). Reviewer: Janaka Alawatugoda (Peradeniya) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{P. Datta} et al., J. Cryptology 36, No. 2, Paper No. 6, 31 p. (2023; Zbl 1511.94084) Full Text: DOI
Venema, Marloes; Alpár, Greg; Hoepman, Jaap-Henk Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice. (English) Zbl 1506.94070 Des. Codes Cryptography 91, No. 1, 165-220 (2023). MSC: 94A60 68P27 68M25 PDFBibTeX XMLCite \textit{M. Venema} et al., Des. Codes Cryptography 91, No. 1, 165--220 (2023; Zbl 1506.94070) Full Text: DOI
Zhang, Ruyuan; Li, Jiguo; Lu, Yang; Han, Jinguang; Zhang, Yichen Key escrow-free attribute based encryption with user revocation. (English) Zbl 07810840 Inf. Sci. 600, 59-72 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Zhang} et al., Inf. Sci. 600, 59--72 (2022; Zbl 07810840) Full Text: DOI
Perera, Maharage Nisansala Sevwandi; Nakamura, Toru; Matsunaka, Takashi; Yokoyama, Hiroyuki; Sakurai, Kouichi Attribute based tracing for securing group signatures against centralized authorities. (English) Zbl 07722523 Su, Chunhua (ed.) et al., Information security practice and experience. 17th international conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13620, 554-572 (2022). Reviewer: Jaak Henno (Tallinn) MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{M. N. S. Perera} et al., Lect. Notes Comput. Sci. 13620, 554--572 (2022; Zbl 07722523) Full Text: DOI
Delerablée, Cécile; Gouriou, Lénaïck; Pointcheval, David Key-policy ABE with switchable attributes. (English) Zbl 1518.94054 Galdi, Clemente (ed.) et al., Security and cryptography for networks. 13th International conference, SCN 2022, Amalfi (SA), Italy, September 12–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13409, 147-171 (2022). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Delerablée} et al., Lect. Notes Comput. Sci. 13409, 147--171 (2022; Zbl 1518.94054) Full Text: DOI
Luo, Fucai; Al-Kuwari, Saif; Wang, Haiyan; Han, Weihong Generic construction of trace-and-revoke inner product functional encryption. (English) Zbl 1523.68027 Atluri, Vijayalakshmi (ed.) et al., Computer security – ESORICS 2022. 27th European symposium on research in computer security, Copenhagen, Denmark, September 26–30, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13554, 259-282 (2022). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{F. Luo} et al., Lect. Notes Comput. Sci. 13554, 259--282 (2022; Zbl 1523.68027) Full Text: DOI
Asano, Kyoichi; Emura, Keita; Takayasu, Atsushi; Watanabe, Yohei A generic construction of CCA-secure attribute-based encryption with equality test. (English) Zbl 1518.94041 Ge, Chunpeng (ed.) et al., Provable and practical security. 16th international conference, ProvSec 2022, Nanjing, China, November 11–12, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13600, 3-19 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Asano} et al., Lect. Notes Comput. Sci. 13600, 3--19 (2022; Zbl 1518.94041) Full Text: DOI
Agrawal, Shweta; Yadav, Anshu; Yamada, Shota Multi-input attribute based encryption and predicate encryption. (English) Zbl 1516.94020 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13507, 590-621 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 13507, 590--621 (2022; Zbl 1516.94020) Full Text: DOI
Venema, Marloes; Alpár, Greg TinyABE: unrestricted ciphertext-policy attribute-based encryption for embedded devices and low-quality networks. (English) Zbl 1515.94095 Batina, Lejla (ed.) et al., Progress in cryptology – AFRICACRYPT 2022. 13th international conference on cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18–20, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13503, 103-129 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Venema} and \textit{G. Alpár}, Lect. Notes Comput. Sci. 13503, 103--129 (2022; Zbl 1515.94095) Full Text: DOI
Agrawal, Shweta; Biswas, Rajarshi; Nishimaki, Ryo; Xagawa, Keita; Xie, Xiang; Yamada, Shota Cryptanalysis of Boyen’s attribute-based encryption scheme in TCC 2013. (English) Zbl 1497.94073 Des. Codes Cryptography 90, No. 10, 2301-2318 (2022). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Des. Codes Cryptography 90, No. 10, 2301--2318 (2022; Zbl 1497.94073) Full Text: DOI
Wee, Hoeteck Optimal broadcast encryption and CP-ABE from evasive lattice assumptions. (English) Zbl 1496.94069 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13276, 217-241 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Wee}, Lect. Notes Comput. Sci. 13276, 217--241 (2022; Zbl 1496.94069) Full Text: DOI
Dutta, Priyanka; Susilo, Willy; Dung Hoang Duong; Roy, Partha Sarathi Puncturable identity-based and attribute-based encryption from lattices. (English) Zbl 07575078 Theor. Comput. Sci. 929, 18-38 (2022). MSC: 68Qxx PDFBibTeX XMLCite \textit{P. Dutta} et al., Theor. Comput. Sci. 929, 18--38 (2022; Zbl 07575078) Full Text: DOI
Fu, Xingbing; Ding, Yong; Li, Haifeng; Ning, Jianting; Wu, Ting; Li, Fagen A survey of lattice based expressive attribute based encryption. (English) Zbl 1486.68054 Comput. Sci. Rev. 43, Article ID 100438, 13 p. (2022). MSC: 68P25 94A60 68-02 94-02 PDFBibTeX XMLCite \textit{X. Fu} et al., Comput. Sci. Rev. 43, Article ID 100438, 13 p. (2022; Zbl 1486.68054) Full Text: DOI
Goyal, Rishab; Liu, Jiahui; Waters, Brent Adaptive security via deletion in attribute-based encryption: solutions from search assumptions in bilinear groups. (English) Zbl 1515.94070 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13093, 311-341 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Goyal} et al., Lect. Notes Comput. Sci. 13093, 311--341 (2021; Zbl 1515.94070) Full Text: DOI
Dutta, Priyanka; Susilo, Willy; Dung Hoang Duong; Roy, Partha Sarathi Puncturable identity-based encryption from lattices. (English) Zbl 1521.94041 Baek, Joonsang (ed.) et al., Information security and privacy. 26th Australasian conference, ACISP 2021, virtual event, December 1–3, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13083, 571-589 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Dutta} et al., Lect. Notes Comput. Sci. 13083, 571--589 (2021; Zbl 1521.94041) Full Text: DOI
Zhang, Zongyang; Li, Tong; Wang, Zhuo; Liu, Jianwei Redactable transactions in consortium blockchain: controlled by multi-authority CP-ABE. (English) Zbl 1522.94094 Baek, Joonsang (ed.) et al., Information security and privacy. 26th Australasian conference, ACISP 2021, virtual event, December 1–3, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13083, 408-429 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Zhang} et al., Lect. Notes Comput. Sci. 13083, 408--429 (2021; Zbl 1522.94094) Full Text: DOI
Kumar, Dilip; Kumar, Manoj; Gupta, Gaurav An outsourced decryption ABE model using ECC in Internet of Things. (English) Zbl 1503.94036 Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 29, No. 6, 949-964 (2021). MSC: 94A60 68M11 94A62 PDFBibTeX XMLCite \textit{D. Kumar} et al., Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 29, No. 6, 949--964 (2021; Zbl 1503.94036) Full Text: DOI
Karale, Ankita; Poulkov, Vladimir; Lazarova, Milena Attribute-based encryption. (English) Zbl 1504.94156 Bin Ahmad, Khairol Amali (ed.) et al., Functional encryption. Cham: Springer. EAI/Springer Innov. Commun. Comput., 225-242 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Karale} et al., in: Functional encryption. Cham: Springer. 225--242 (2021; Zbl 1504.94156) Full Text: DOI
Sedaghat, Mahdi; Preneel, Bart Cross-domain attribute-based access control encryption. (English) Zbl 1496.68075 Conti, Mauro (ed.) et al., Cryptology and network security. 20th international conference, CANS 2021, Vienna, Austria, December 13–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13099, 3-23 (2021). MSC: 68M25 68P25 68Q10 94A60 94A62 PDFBibTeX XMLCite \textit{M. Sedaghat} and \textit{B. Preneel}, Lect. Notes Comput. Sci. 13099, 3--23 (2021; Zbl 1496.68075) Full Text: DOI
Cheng, Leixiao; Meng, Fei Server-aided revocable attribute-based encryption revised: multi-user setting and fully secure. (English) Zbl 1519.68025 Bertino, Elisa (ed.) et al., Computer security – ESORICS 2021. 26th European symposium on research in computer security, Darmstadt, Germany, October 4–8, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12973, 192-212 (2021). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{L. Cheng} and \textit{F. Meng}, Lect. Notes Comput. Sci. 12973, 192--212 (2021; Zbl 1519.68025) Full Text: DOI
Susilo, Willy; Dutta, Priyanka; Dung Hoang Duong; Roy, Partha Sarathi Lattice-based HRA-secure attribute-based proxy re-encryption in standard model. (English) Zbl 1498.68059 Bertino, Elisa (ed.) et al., Computer security – ESORICS 2021. 26th European symposium on research in computer security, Darmstadt, Germany, October 4–8, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12973, 169-191 (2021). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{W. Susilo} et al., Lect. Notes Comput. Sci. 12973, 169--191 (2021; Zbl 1498.68059) Full Text: DOI
Xu, Shengmin; Ning, Jianting; Ma, Jinhua; Xu, Guowen; Yuan, Jiaming; Deng, Robert H. Revocable policy-based chameleon hash. (English) Zbl 1500.94057 Bertino, Elisa (ed.) et al., Computer security – ESORICS 2021. 26th European symposium on research in computer security, Darmstadt, Germany, October 4–8, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12972, 327-347 (2021). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Xu} et al., Lect. Notes Comput. Sci. 12972, 327--347 (2021; Zbl 1500.94057) Full Text: DOI Link
Pal, Tapas; Dutta, Ratna Attribute-based access control for inner product functional encryption from LWE. (English) Zbl 1491.94062 Longa, Patrick (ed.) et al., Progress in cryptology – LATINCRYPT 2021. 7th international conference on cryptology and information security in Latin America, Bogotá, Colombia, October 6–8, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12912, 127-148 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Pal} and \textit{R. Dutta}, Lect. Notes Comput. Sci. 12912, 127--148 (2021; Zbl 1491.94062) Full Text: DOI
Avizheh, Sepideh; Nabi, Mahmudun; Rahman, Saoreen; Sharifian, Setareh; Safavi-Naini, Reihaneh Privacy-preserving resource sharing using permissioned blockchains (the case of smart neighbourhood). (English) Zbl 1492.91151 Bernhard, Matthew (ed.) et al., Financial cryptography and data security. FC 2021 international workshops. Codecfin, DeFi, VOTING, and WTSC, virtual event, March 5, 2021. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 12676, 482-504 (2021). MSC: 91B32 94A60 94A62 PDFBibTeX XMLCite \textit{S. Avizheh} et al., Lect. Notes Comput. Sci. 12676, 482--504 (2021; Zbl 1492.91151) Full Text: DOI
Wang, Yuyu; Pan, Jiaxin; Chen, Yu Fine-grained secure attribute-based encryption. (English) Zbl 1489.94111 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 179-207 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Wang} et al., Lect. Notes Comput. Sci. 12828, 179--207 (2021; Zbl 1489.94111) Full Text: DOI
Wee, Hoeteck Broadcast encryption with size \(N^{1/3}\) and more from \(k\)-Lin. (English) Zbl 1489.94113 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 155-178 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Wee}, Lect. Notes Comput. Sci. 12828, 155--178 (2021; Zbl 1489.94113) Full Text: DOI
Vécsi, Á.; Pethő, A. Formal language identity-based cryptography. (English) Zbl 1482.94072 Rad Hrvat. Akad. Znan. Umjet. 546, Mat. Znan. 25, 143-159 (2021). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{Á. Vécsi} and \textit{A. Pethő}, Rad Hrvat. Akad. Znan. Umjet., Mat. Znan. 546(25), 143--159 (2021; Zbl 1482.94072) Full Text: DOI Link
Ambrona, Miguel Generic negation of pair encodings. (English) Zbl 1479.94110 Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12711, 120-146 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Ambrona}, Lect. Notes Comput. Sci. 12711, 120--146 (2021; Zbl 1479.94110) Full Text: DOI
Venema, Marloes; Alpár, Greg A bunch of broken schemes: a simple yet powerful linear approach to analyzing security of attribute-based encryption. (English) Zbl 1479.94262 Paterson, Kenneth G. (ed.), Topics in cryptology – CT-RSA 2021. Cryptographers’ track at the RSA conference 2021, virtual event, May 17–20, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12704, 100-125 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Venema} and \textit{G. Alpár}, Lect. Notes Comput. Sci. 12704, 100--125 (2021; Zbl 1479.94262) Full Text: DOI
Wang, Ti; Zhou, Yongbin; Ma, Hui; Liu, Yuejun; Zhang, Rui Fully secure ABE with outsourced decryption against chosen ciphertext attack. (English) Zbl 1479.94266 Wu, Yongdong (ed.) et al., Information security and cryptology. 16th international conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12612, 83-103 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Wang} et al., Lect. Notes Comput. Sci. 12612, 83--103 (2021; Zbl 1479.94266) Full Text: DOI
Datta, Pratish; Komargodski, Ilan; Waters, Brent Decentralized multi-authority ABE for DNFs from LWE. (English) Zbl 1479.94153 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12696, 177-209 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Datta} et al., Lect. Notes Comput. Sci. 12696, 177--209 (2021; Zbl 1479.94153) Full Text: DOI
Tomida, Junichi; Kawahara, Yuto; Nishimaki, Ryo Fast, compact, and expressive attribute-based encryption. (English) Zbl 1475.94171 Des. Codes Cryptography 89, No. 11, 2577-2626 (2021). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Tomida} et al., Des. Codes Cryptography 89, No. 11, 2577--2626 (2021; Zbl 1475.94171) Full Text: DOI
Du, Gang; Zhang, Lei; Ma, Chunguang; Zhang, Guoyin Location privacy protection method based on attribute-based privacy information retrieval. (Chinese. English summary) Zbl 1488.68022 J. Harbin Eng. Univ. 42, No. 5, 680-686 (2021). MSC: 68P25 68P20 68P27 PDFBibTeX XMLCite \textit{G. Du} et al., J. Harbin Eng. Univ. 42, No. 5, 680--686 (2021; Zbl 1488.68022) Full Text: DOI
Luo, Fucai; Al-Kuwari, Saif Revocable attribute-based proxy re-encryption. (English) Zbl 1482.94053 J. Math. Cryptol. 15, 465-482 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Luo} and \textit{S. Al-Kuwari}, J. Math. Cryptol. 15, 465--482 (2021; Zbl 1482.94053) Full Text: DOI
Takayasu, Atsushi Tag-based ABE in prime-order groups via pair encoding. (English) Zbl 1469.94115 Des. Codes Cryptography 89, No. 8, 1927-1963 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Takayasu}, Des. Codes Cryptography 89, No. 8, 1927--1963 (2021; Zbl 1469.94115) Full Text: DOI
Ateniese, Giuseppe; Francati, Danilo; Nuñez, David; Venturi, Daniele Match me if you can: matchmaking encryption and its applications. (English) Zbl 1467.94027 J. Cryptology 34, No. 3, Paper No. 16, 50 p. (2021). Reviewer: Manish Kumar (Hyderabad) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{G. Ateniese} et al., J. Cryptology 34, No. 3, Paper No. 16, 50 p. (2021; Zbl 1467.94027) Full Text: DOI
Luo, Fucai; Al-Kuwari, Saif; Wang, Fuqun; Chen, Kefei Attribute-based proxy re-encryption from standard lattices. (English) Zbl 1497.68161 Theor. Comput. Sci. 865, 52-62 (2021). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{F. Luo} et al., Theor. Comput. Sci. 865, 52--62 (2021; Zbl 1497.68161) Full Text: DOI
Lin, Huijia; Luo, Ji Succinct and adaptively secure ABE for ABP from \(k\)-Lin. (English) Zbl 1511.94128 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12493, 437-466 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Lin} and \textit{J. Luo}, Lect. Notes Comput. Sci. 12493, 437--466 (2020; Zbl 1511.94128) Full Text: DOI
Attrapadung, Nuttapong; Tomida, Junichi Unbounded dynamic predicate compositions in ABE from standard assumptions. (English) Zbl 1508.94057 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12493, 405-436 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Attrapadung} and \textit{J. Tomida}, Lect. Notes Comput. Sci. 12493, 405--436 (2020; Zbl 1508.94057) Full Text: DOI
Katsumata, Shuichi; Nishimaki, Ryo; Yamada, Shota; Yamakawa, Takashi Adaptively secure inner product encryption from LWE. (English) Zbl 1511.94118 Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12493, 375-404 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Katsumata} et al., Lect. Notes Comput. Sci. 12493, 375--404 (2020; Zbl 1511.94118) Full Text: DOI
Pal, Tapas; Dutta, Ratna Chosen-ciphertext secure multi-identity and multi-attribute pure FHE. (English) Zbl 1519.68031 Krenn, Stephan (ed.) et al., Cryptology and network security. 19th international conference, CANS 2020, Vienna, Austria, December 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12579, 387-408 (2020). MSC: 68M25 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{T. Pal} and \textit{R. Dutta}, Lect. Notes Comput. Sci. 12579, 387--408 (2020; Zbl 1519.68031) Full Text: DOI
Susilo, Willy; Duong, Dung Hoang; Le, Huy Quoc; Pieprzyk, Josef Puncturable encryption: a generic construction from delegatable fully key-homomorphic encryption. (English) Zbl 1522.68187 Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12309, 107-127 (2020). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{W. Susilo} et al., Lect. Notes Comput. Sci. 12309, 107--127 (2020; Zbl 1522.68187) Full Text: DOI arXiv
Li, Jie; Ma, Mimi; Zhang, Jiang; Fan, Shuqin; Li, Shuaigang Attribute-based keyword search from lattices. (English) Zbl 1500.94038 Liu, Zhe (ed.) et al., Information security and cryptology. 15th international conference, Inscrypt 2019, Nanjing, China, December 6–8, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12020, 66-85 (2020). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{J. Li} et al., Lect. Notes Comput. Sci. 12020, 66--85 (2020; Zbl 1500.94038) Full Text: DOI
Tomida, Junichi; Kawahara, Yuto; Nishimaki, Ryo Fast, compact, and expressive attribute-based encryption. (English) Zbl 1500.94054 Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12110, 3-33 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Tomida} et al., Lect. Notes Comput. Sci. 12110, 3--33 (2020; Zbl 1500.94054) Full Text: DOI
Blazy, Olivier; Mukherjee, Sayantan CCA-secure ABE using tag and pair encoding. (English) Zbl 1492.94066 Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 691-714 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{O. Blazy} and \textit{S. Mukherjee}, Lect. Notes Comput. Sci. 12578, 691--714 (2020; Zbl 1492.94066) Full Text: DOI
Paul, Arinjita; Selvi, S. Sharmila Deva; Rangan, C. Pandu Efficient attribute-based proxy re-encryption with constant size ciphertexts. (English) Zbl 1492.94157 Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 644-665 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Paul} et al., Lect. Notes Comput. Sci. 12578, 644--665 (2020; Zbl 1492.94157) Full Text: DOI
Agrawal, Shweta; Yamada, Shota CP-ABE for circuits (and More) in the symmetric key setting. (English) Zbl 1479.94106 Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12550, 117-148 (2020). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Agrawal} and \textit{S. Yamada}, Lect. Notes Comput. Sci. 12550, 117--148 (2020; Zbl 1479.94106) Full Text: DOI
Lin, Huijia; Luo, Ji Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \). (English) Zbl 1479.94217 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 247-277 (2020). MSC: 94A60 68P25 68Q04 PDFBibTeX XMLCite \textit{H. Lin} and \textit{J. Luo}, Lect. Notes Comput. Sci. 12107, 247--277 (2020; Zbl 1479.94217) Full Text: DOI
Agrawal, Shweta; Yamada, Shota Optimal broadcast encryption from pairings and LWE. (English) Zbl 1479.94105 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 13-43 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Agrawal} and \textit{S. Yamada}, Lect. Notes Comput. Sci. 12105, 13--43 (2020; Zbl 1479.94105) Full Text: DOI
Ali, Mohammad; Mohajeri, Javad; Sadeghi, Mohammad-Reza; Liu, Ximeng Attribute-based fine-grained access control for outscored private set intersection computation. (English) Zbl 1474.68135 Inf. Sci. 536, 222-243 (2020). MSC: 68P25 68M11 94A60 PDFBibTeX XMLCite \textit{M. Ali} et al., Inf. Sci. 536, 222--243 (2020; Zbl 1474.68135) Full Text: DOI Link
Xu, Shengmin; Yuan, Jiaming; Xu, Guowen; Li, Yingjiu; Liu, Ximeng; Zhang, Yinghui; Ying, Zuobin Efficient ciphertext-policy attribute-based encryption with blackbox traceability. (English) Zbl 1474.68140 Inf. Sci. 538, 19-38 (2020). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{S. Xu} et al., Inf. Sci. 538, 19--38 (2020; Zbl 1474.68140) Full Text: DOI Link
Luo, Wangping; Feng, Chaosheng; Zou, Liping; Yuan, Ding; Wu, Tangmei; Li, Min; Wang, Guangjie Attribute-based encryption scheme with fast encryption. (Chinese. English summary) Zbl 1474.68137 J. Softw. 31, No. 12, 3923-3936 (2020). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{W. Luo} et al., J. Softw. 31, No. 12, 3923--3936 (2020; Zbl 1474.68137) Full Text: DOI
Deng, Hua; Qin, Zheng; Wu, Qianhong; Guan, Zhenyu; Zhou, Yunya Flexible attribute-based proxy re-encryption for efficient data sharing. (English) Zbl 1456.68030 Inf. Sci. 511, 94-113 (2020). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{H. Deng} et al., Inf. Sci. 511, 94--113 (2020; Zbl 1456.68030) Full Text: DOI
Goyal, Rishab; Koppula, Venkata; Waters, Brent Collusion resistant traitor tracing from learning with errors. (English) Zbl 1490.68068 SIAM J. Comput. 49, No. 5, STOC18-94-STOC18-241 (2020). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{R. Goyal} et al., SIAM J. Comput. 49, No. 5, STOC18--94-STOC18--241 (2020; Zbl 1490.68068) Full Text: DOI
Li, Jiguo; Hu, Shengzhou; Zhang, Yichen; Han, Jinguang A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation. (English) Zbl 1436.94079 Soft Comput. 24, No. 3, 1869-1882 (2020). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Li} et al., Soft Comput. 24, No. 3, 1869--1882 (2020; Zbl 1436.94079) Full Text: DOI
Kowalczyk, Lucas; Wee, Hoeteck Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin. (English) Zbl 1457.94153 J. Cryptology 33, No. 3, 954-1002 (2020). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{L. Kowalczyk} and \textit{H. Wee}, J. Cryptology 33, No. 3, 954--1002 (2020; Zbl 1457.94153) Full Text: DOI
Ali, Mohammad; Mohajeri, Javad; Sadeghi, Mohammad-Reza; Liu, Ximeng A fully distributed hierarchical attribute-based encryption scheme. (English) Zbl 1436.68094 Theor. Comput. Sci. 815, 25-46 (2020). Reviewer: Ion Iancu (Craiova) MSC: 68P25 68M11 68M25 94A60 PDFBibTeX XMLCite \textit{M. Ali} et al., Theor. Comput. Sci. 815, 25--46 (2020; Zbl 1436.68094) Full Text: DOI Link
Le, Minh Ha; Tran, Vinh Duc; Trinh, Van Anh; Trinh, Viet Cuong Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption. (English) Zbl 1455.94179 Theor. Comput. Sci. 804, 219-235 (2020). MSC: 94A60 94A40 PDFBibTeX XMLCite \textit{M. H. Le} et al., Theor. Comput. Sci. 804, 219--235 (2020; Zbl 1455.94179) Full Text: DOI
Qin, Baodong; Zhao, Qinglan; Zheng, Dong; Cui, Hui (Dual) server-aided revocable attribute-based encryption with decryption key exposure resistance. (English) Zbl 1451.68094 Inf. Sci. 490, 74-92 (2019). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{B. Qin} et al., Inf. Sci. 490, 74--92 (2019; Zbl 1451.68094) Full Text: DOI
Li, Jiguo; Yu, Qihong; Zhang, Yichen Hierarchical attribute based encryption with continuous leakage-resilience. (English) Zbl 1448.68233 Inf. Sci. 484, 113-134 (2019). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Li} et al., Inf. Sci. 484, 113--134 (2019; Zbl 1448.68233) Full Text: DOI
Xue, Liang; Yu, Yong; Li, Yannan; Au, Man Ho; Du, Xiaojiang; Yang, Bo Efficient attribute-based encryption with attribute revocation for assured data deletion. (English) Zbl 1443.68056 Inf. Sci. 479, 640-650 (2019). MSC: 68P25 68M11 68P20 PDFBibTeX XMLCite \textit{L. Xue} et al., Inf. Sci. 479, 640--650 (2019; Zbl 1443.68056) Full Text: DOI
Xu, Shengmin; Yang, Guomin; Mu, Yi Revocable attribute-based encryption with decryption key exposure resistance and ciphertext delegation. (English) Zbl 1443.68057 Inf. Sci. 479, 116-134 (2019). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{S. Xu} et al., Inf. Sci. 479, 116--134 (2019; Zbl 1443.68057) Full Text: DOI Link
Li, Jiguo; Yu, Qihong; Zhang, Yichen; Shen, Jian Key-policy attribute-based encryption against continual auxiliary input leakage. (English) Zbl 1441.68032 Inf. Sci. 470, 175-188 (2019). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Li} et al., Inf. Sci. 470, 175--188 (2019; Zbl 1441.68032) Full Text: DOI
Pradhan, Ankit; Sethi, Kamalakanta; Mohapatra, Shrohan; Bera, Padmalochan Distributed multi-authority attribute-based encryption using cellular automata. (English) Zbl 1437.68054 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 434-456 (2019). MSC: 68P25 68Q80 94A60 PDFBibTeX XMLCite \textit{A. Pradhan} et al., Lect. Notes Comput. Sci. 11829, 434--456 (2019; Zbl 1437.68054) Full Text: DOI
Haböck, Ulrich; Krenn, Stephan Breaking and fixing anonymous credentials for the cloud. (English) Zbl 1437.68053 Mu, Yi (ed.) et al., Cryptology and network security. 18th international conference, CANS 2019, Fuzhou, China, October 25–27, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11829, 249-269 (2019). MSC: 68P25 68P27 94A62 PDFBibTeX XMLCite \textit{U. Haböck} and \textit{S. Krenn}, Lect. Notes Comput. Sci. 11829, 249--269 (2019; Zbl 1437.68053) Full Text: DOI
Chen, Hongjie; Liao, Yongjian Improvement of an outsourced attribute-based encryption scheme. (English) Zbl 1437.94056 Soft Comput. 23, No. 22, 11409-11417 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Chen} and \textit{Y. Liao}, Soft Comput. 23, No. 22, 11409--11417 (2019; Zbl 1437.94056) Full Text: DOI
Kim, Jongkil; Susilo, Willy; Baek, Joonsang; Nepal, Surya; Liu, Dongxi Ciphertext-delegatable CP-ABE for a dynamic credential: a modular approach. (English) Zbl 1443.68053 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 3-20 (2019). MSC: 68P25 68M25 PDFBibTeX XMLCite \textit{J. Kim} et al., Lect. Notes Comput. Sci. 11547, 3--20 (2019; Zbl 1443.68053) Full Text: DOI
Ananth, Prabhanjan; Fan, Xiong; Shi, Elaine Towards attribute-based encryption for RAMs from LWE: sub-linear decryption, and more. (English) Zbl 1456.94042 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11921, 112-141 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{P. Ananth} et al., Lect. Notes Comput. Sci. 11921, 112--141 (2019; Zbl 1456.94042) Full Text: DOI
Agrawal, Shweta; Maitra, Monosij; Yamada, Shota Attribute-based encryption (and more) for nondeterministic finite automata from LWE. (English) Zbl 1509.94053 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 765-797 (2019). MSC: 94A60 68Q04 PDFBibTeX XMLCite \textit{S. Agrawal} et al., Lect. Notes Comput. Sci. 11693, 765--797 (2019; Zbl 1509.94053) Full Text: DOI
Gong, Junqing; Waters, Brent; Wee, Hoeteck ABE for DFA from \(k\)-lin. (English) Zbl 1509.94092 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 732-764 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Gong} et al., Lect. Notes Comput. Sci. 11693, 732--764 (2019; Zbl 1509.94092) Full Text: DOI
Ateniese, Giuseppe; Francati, Danilo; Nuñez, David; Venturi, Daniele Match me if you can: matchmaking encryption and its applications. (English) Zbl 1509.94058 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 701-731 (2019). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{G. Ateniese} et al., Lect. Notes Comput. Sci. 11693, 701--731 (2019; Zbl 1509.94058) Full Text: DOI
Koppula, Venkata; Waters, Brent Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. (English) Zbl 1509.94105 Boldyreva, Alexandra (ed.) et al., Advances in cryptology – CRYPTO 2019. 39th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11693, 671-700 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{V. Koppula} and \textit{B. Waters}, Lect. Notes Comput. Sci. 11693, 671--700 (2019; Zbl 1509.94105) Full Text: DOI
Li, Juyan; Ma, Chunguang; Zhang, Kejia A novel lattice-based ciphertext-policy attribute-based proxy re-encryption for cloud sharing. (English) Zbl 1430.68092 Meng, Weizhi (ed.) et al., Security and privacy in social networks and big data. 5th international symposium, SocialSec 2019, Copenhagen, Denmark, July 14–17, 2019. Revised selected papers. Singapore: Springer. Commun. Comput. Inf. Sci. 1095, 32-46 (2019). MSC: 68P25 PDFBibTeX XMLCite \textit{J. Li} et al., Commun. Comput. Inf. Sci. 1095, 32--46 (2019; Zbl 1430.68092) Full Text: DOI
Liu, Jiming; Cao, Zhenfu; Dong, Xiaolei; Shen, Jiachen DMU-ABSE: dynamic multi-user attribute-based searchable encryption with file deletion and user revocation. (English) Zbl 1430.68093 Meng, Weizhi (ed.) et al., Security and privacy in social networks and big data. 5th international symposium, SocialSec 2019, Copenhagen, Denmark, July 14–17, 2019. Revised selected papers. Singapore: Springer. Commun. Comput. Inf. Sci. 1095, 17-31 (2019). MSC: 68P25 PDFBibTeX XMLCite \textit{J. Liu} et al., Commun. Comput. Inf. Sci. 1095, 17--31 (2019; Zbl 1430.68093) Full Text: DOI
Kim, Jongkil; Susilo, Willy; Guo, Fuchun; Baek, Joonsang; Li, Nan A new encoding framework for predicate encryption with non-linear structures in prime order groups. (English) Zbl 1458.94250 Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 406-425 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Kim} et al., Lect. Notes Comput. Sci. 11464, 406--425 (2019; Zbl 1458.94250) Full Text: DOI
Blazy, Olivier; Germouty, Paul; Phan, Duong Hieu Downgradable identity-based encryption and applications. (English) Zbl 1453.94061 Matsui, Mitsuru (ed.), Topics in cryptology – CT-RSA 2019. The cryptographers’ track at the RSA conference 2019, San Francisco, CA, USA, March 4–8, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11405, 44-61 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{O. Blazy} et al., Lect. Notes Comput. Sci. 11405, 44--61 (2019; Zbl 1453.94061) Full Text: DOI
Zhang, Wenfang; Chen, Zhen; Liu, Xudong; Wang, Xiaomin CP-ABE scheme supporting fine-grained attribute direct revocation. (Chinese. English summary) Zbl 1449.94069 J. Softw. 30, No. 9, 2760-2771 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Zhang} et al., J. Softw. 30, No. 9, 2760--2771 (2019; Zbl 1449.94069) Full Text: DOI
Luo, Wangping; Feng, Chaosheng; Qin, Zhiguang; Yuan, Ding; Liao, Juanping; Liu, Xia Ciphertext sharing scheme for the public cloud. (Chinese. English summary) Zbl 1449.94072 J. Softw. 30, No. 8, 2517-2527 (2019). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{W. Luo} et al., J. Softw. 30, No. 8, 2517--2527 (2019; Zbl 1449.94072) Full Text: DOI
Hu, Yupu; Lian, Zhizhu; Chen, Jiangshan; Wang, Baocang; Zhang, Shanshan Algebraic attacks against several weak variants of GVW’13 ABE. (English) Zbl 1439.94034 Int. J. Found. Comput. Sci. 30, No. 4, 607-618 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Hu} et al., Int. J. Found. Comput. Sci. 30, No. 4, 607--618 (2019; Zbl 1439.94034) Full Text: DOI
Okamoto, Tatsuaki; Takashima, Katsuyuki Fully secure functional encryption with a large class of relations from the decisional linear assumption. (English) Zbl 1435.94138 J. Cryptology 32, No. 4, 1491-1573 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Okamoto} and \textit{K. Takashima}, J. Cryptology 32, No. 4, 1491--1573 (2019; Zbl 1435.94138) Full Text: DOI
Wang, Xiuli; Jiang, Xiaozhou; Li, Yang Model for data access control and sharing based on blockchain. (Chinese. English summary) Zbl 1438.68053 J. Softw. 30, No. 6, 1661-1669 (2019). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{X. Wang} et al., J. Softw. 30, No. 6, 1661--1669 (2019; Zbl 1438.68053) Full Text: DOI
Han, Yiliang Attribute-based encryption with adaptive policy. (English) Zbl 1418.94049 Soft Comput. 23, No. 12, 4009-4017 (2019). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Han}, Soft Comput. 23, No. 12, 4009--4017 (2019; Zbl 1418.94049) Full Text: DOI