Expressive key-policy attribute-based encryption with constant-size ciphertexts

N Attrapadung, B Libert, E De Panafieu - … on Practice and Theory in Public …, 2011 - Springer
Abstract Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for
fine-grained access control on encrypted data. In its key-policy flavor, the primitive enables …

Full verifiability for outsourced decryption in attribute based encryption

J Li, Y Wang, Y Zhang, J Han - IEEE transactions on services …, 2017 - ieeexplore.ieee.org
Attribute based encryption (ABE) is a popular cryptographic technology to protect the
security of users' data. However, the decryption cost and ciphertext size restrict the …

Attribute-based encryption schemes with constant-size ciphertexts

N Attrapadung, J Herranz, F Laguillaumie… - Theoretical computer …, 2012 - Elsevier
Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for fine-
grained access control on encrypted data. In its key-policy flavor (the dual ciphertext-policy …

A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing

K Liang, MH Au, JK Liu, W Susilo… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
In this paper, for the first time, we define a general notion for proxy re-encryption (PRE),
which we call deterministic finite automata-based functional PRE (DFA-based FPRE) …

Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption

X Mao, J Lai, Q Mei, K Chen… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Attribute-based encryption (ABE) provides a mechanism for complex access control over
encrypted data. However in most ABE systems, the ciphertext size and the decryption …

Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost

C Chen, Z Zhang, D Feng - … 5th International Conference, ProvSec 2011, Xi …, 2011 - Springer
Attribute-based encryption provides good solutions to the problem of anonymous access
control by specifying access policies among private keys or ciphertexts over encrypted data …

Anonymous attribute-based encryption supporting efficient decryption test

Y Zhang, X Chen, J Li, DS Wong, H Li - Proceedings of the 8th ACM …, 2013 - dl.acm.org
Attribute-based encryption (ABE) has been widely studied recently to support fine-grained
access control of shared data. Anonymous ABE, which is a relevant notion to ABE, further …

Match me if you can: Matchmaking encryption and its applications

G Ateniese, D Francati, D Nunez, D Venturi - Advances in Cryptology …, 2019 - Springer
We introduce a new form of encryption that we name matchmaking encryption (ME). Using
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …

Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption

V Koppula, B Waters - Annual international cryptology conference, 2019 - Springer
We provide generic and black box transformations from any chosen plaintext secure
Attribute-Based Encryption (ABE) or One-sided Predicate Encryption system into a chosen …

Threshold ciphertext policy attribute-based encryption with constant size ciphertexts

A Ge, R Zhang, C Chen, C Ma, Z Zhang - … , NSW, Australia, July 9-11, 2012 …, 2012 - Springer
In PKC 2010, Herranz et al. proposed the first ciphertext policy attribute-based encryption
(CP-ABE) scheme with constant size ciphertexts for threshold predicates. However, their …