Predicate encryption for circuits from LWE

S Gorbunov, V Vaikuntanathan, H Wee - Annual Cryptology Conference, 2015 - Springer
In predicate encryption, a ciphertext is associated with descriptive attribute values x in
addition to a plaintext μ μ, and a secret key is associated with a predicate f. Decryption …

A survey of lattice based expressive attribute based encryption

X Fu, Y Ding, H Li, J Ning, T Wu, F Li - Computer Science Review, 2022 - Elsevier
Abstract Attribute Based Encryption (ABE) can be employed to enforce fine grained access
control over encrypted data. Due to expressiveness, ABE schemes are currently employed …

Optimal broadcast encryption from pairings and LWE

S Agrawal, S Yamada - Advances in Cryptology–EUROCRYPT 2020: 39th …, 2020 - Springer
Abstract Boneh, Waters and Zhandry (CRYPTO 2014) used multilinear maps to provide a
solution to the long-standing problem of public-key broadcast encryption (BE) where all …

Decentralized multi-authority ABE for DNF s from LWE

P Datta, I Komargodski, B Waters - … on the theory and applications of …, 2021 - Springer
We construct the first decentralized multi-authority attribute-based encryption (MA-ABE)
scheme for a non-trivial class of access policies whose security is based (in the random …

Dual system encryption framework in prime-order groups via computational pair encodings

N Attrapadung - Advances in Cryptology–ASIACRYPT 2016: 22nd …, 2016 - Springer
We propose a new generic framework for achieving fully secure attribute based encryption
(ABE) in prime-order bilinear groups. Previous generic frameworks by Wee (TCC'14) and …

Multi-input attribute based encryption and predicate encryption

S Agrawal, A Yadav, S Yamada - Annual International Cryptology …, 2022 - Springer
Motivated by several new and natural applications, we initiate the study of multi-input
predicate encryption (miPE) and further develop multi-input attribute based encryption …

Two-round threshold signature from algebraic one-more learning with errors

T Espitau, S Katsumata, K Takemure - Annual International Cryptology …, 2024 - Springer
Threshold signatures have recently seen a renewed interest due to applications in
cryptocurrency while NIST has released a call for multi-party threshold schemes, with a …

Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques

S Yamada - Advances in Cryptology–CRYPTO 2017: 37th Annual …, 2017 - Springer
In this paper, we focus on the constructions of adaptively secure identity-based encryption
(IBE) from lattices and verifiable random function (VRF) with large input spaces. Existing …

Towards tightly secure lattice short signature and id-based encryption

X Boyen, Q Li - International Conference on the Theory and …, 2016 - Springer
Constructing short signatures with tight security from standard assumptions is a long-
standing open problem. We present an adaptively secure, short (and stateless) signature …

Optimal broadcast encryption from LWE and pairings in the standard model

S Agrawal, D Wichs, S Yamada - … TCC 2020, Durham, NC, USA, November …, 2020 - Springer
Broadcast Encryption with optimal parameters was a long-standing problem, whose first
solution was provided in an elegant work by Boneh, Waters and Zhandry [BWZ14]. However …