Attribute Based Encryption for Deterministic Finite Automata from DLIN
暂无分享,去创建一个
[1] Shota Yamada,et al. Attribute Based Encryption for Deterministic Finite Automata from \mathsfDLIN , 2019, TCC.
[2] Brent Waters,et al. Practical constructions and new proof methods for large universe attribute-based encryption , 2013, CCS.
[3] Tatsuaki Okamoto,et al. Fully Secure Unbounded Inner-Product and Attribute-Based Encryption , 2012, ASIACRYPT.
[4] Shweta Agrawal,et al. FE and iO for Turing Machines from Minimal Assumptions , 2018, IACR Cryptol. ePrint Arch..
[5] Craig Gentry,et al. Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits , 2014, EUROCRYPT.
[6] Vinod Vaikuntanathan,et al. Predicate Encryption for Circuits from LWE , 2015, CRYPTO.
[7] Amit Sahai,et al. Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps , 2017, EUROCRYPT.
[8] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[9] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[10] Eric Miles,et al. Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 , 2016, CRYPTO.
[11] Nico Döttling,et al. Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 , 2016, ICALP.
[12] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[13] J. Cheon,et al. An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero , 2016, LMS J. Comput. Math..
[14] Hoeteck Wee,et al. Dual System Encryption via Predicate Encodings , 2014, TCC.
[15] Yael Tauman Kalai,et al. Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.
[16] Xiong Fan. Attribute Based Encryption with Sublinear Decryption from LWE Prabhanjan Ananth , 2018 .
[17] Hoeteck Wee,et al. Unbounded ABE via Bilinear Entropy Expansion, Revisited , 2018, IACR Cryptol. ePrint Arch..
[18] Allison Bishop,et al. Bilinear Entropy Expansion from the Decisional Linear Assumption , 2015, CRYPTO.
[19] Jean-Sébastien Coron,et al. Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 , 2017, Public Key Cryptography.
[20] Xavier Boyen,et al. Attribute-Based Encryption for Finite Automata from LWE , 2015, ProvSec.
[21] A. Lewko,et al. Fully Secure HIBE with Short Ciphertexts , 2009 .
[22] Allison Bishop,et al. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques , 2012, CRYPTO.
[23] Dhinakaran Vinayagamurthy,et al. Riding on Asymmetry: Efficient ABE for Branching Programs , 2015, ASIACRYPT.
[24] Amit Sahai,et al. Functional Encryption for Turing Machines , 2016, TCC.
[25] Shweta Agrawal,et al. Reusable Garbled Deterministic Finite Automata from Learning With Errors , 2017, ICALP.
[26] Nuttapong Attrapadung,et al. Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings , 2016, ASIACRYPT.
[27] Melissa Chase,et al. A Study of Pair Encodings: Predicate Encryption in Prime Order Groups , 2016, TCC.
[28] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[29] Hoeteck Wee,et al. Compact Adaptively Secure ABE for NC1 from k-Lin , 2019, IACR Cryptol. ePrint Arch..
[30] Hoeteck Wee,et al. Fully, (Almost) Tightly Secure IBE and Dual System Groups , 2013, CRYPTO.
[31] Vinod Vaikuntanathan,et al. Functional Encryption for Inner Product Predicates from Learning with Errors , 2011, IACR Cryptol. ePrint Arch..
[32] Allison Bishop,et al. Unbounded HIBE and Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..
[33] Allison Bishop,et al. Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption , 2010, EUROCRYPT.
[34] Yael Tauman Kalai,et al. How to Run Turing Machines on Encrypted Data , 2013, CRYPTO.
[35] Hoeteck Wee,et al. Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula , 2014, SCN.
[36] Brent Waters,et al. Semi-adaptive Security and Bundling Functionalities Made Generic and Easy , 2016, TCC.
[37] Vinod Vaikuntanathan,et al. Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security , 2016, CRYPTO.
[38] Brent Waters,et al. ABE for DFA from k-Lin , 2019, IACR Cryptol. ePrint Arch..
[39] Craig Gentry,et al. Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations , 2015, CRYPTO.
[40] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[41] Jung Hee Cheon,et al. Cryptanalysis of the Multilinear Map over the Integers , 2014, EUROCRYPT.
[42] Brent Waters,et al. Functional Encryption for Regular Languages , 2012, CRYPTO.
[43] Nuttapong Attrapadung,et al. Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More , 2014, IACR Cryptol. ePrint Arch..
[44] Fuyuki Kitagawa,et al. Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously , 2019, IACR Cryptol. ePrint Arch..
[45] Goichiro Hanaoka,et al. Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs , 2015, International Conference on the Theory and Application of Cryptology and Information Security.
[46] Hoeteck Wee,et al. Improved Dual System ABE in Prime-Order Groups via Predicate Encodings , 2015, EUROCRYPT.
[47] Vinod Vaikuntanathan,et al. Attribute-based encryption for circuits , 2013, STOC '13.
[48] Melissa Chase,et al. FAME: Fast Attribute-based Message Encryption , 2017, CCS.
[49] Allison Lewko,et al. Tools for simulating features of composite order bilinear groups in the prime order setting , 2012 .
[50] Brice Minaud,et al. Cryptanalysis of the New CLT Multilinear Map over the Integers , 2016, EUROCRYPT.
[51] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[52] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[53] Yupu Hu,et al. Cryptanalysis of GGH Map , 2016, EUROCRYPT.
[54] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[55] Brent Waters,et al. Witness encryption and its applications , 2013, STOC '13.
[56] Dan Boneh,et al. Generalized Identity Based and Broadcast Encryption Schemes , 2008, ASIACRYPT.