On the optimal succinctness and efficiency of functional encryption and attribute-based encryption

A Jain, H Lin, J Luo - Annual International Conference on the Theory and …, 2023 - Springer
We investigate the best-possible (asymptotic) efficiency of functional encryption (FE) and
attribute-based encryption (ABE) by proving inherent space-time trade-offs and constructing …

Revocable attribute-based encryption from standard lattices

F Luo, S Al-Kuwari, H Wang, F Wang, K Chen - Computer Standards & …, 2023 - Elsevier
Attribute-based encryption (ABE) is an attractive extension of public key encryption, which
provides fine-grained and role-based access to encrypted data. In its key-policy flavor, the …

Attribute based encryption (and more) for nondeterministic finite automata from LWE

S Agrawal, M Maitra, S Yamada - Annual International Cryptology …, 2019 - Springer
Abstract Constructing Attribute Based Encryption (ABE) 56 for uniform models of
computation from standard assumptions, is an important problem, about which very little is …

Laconic function evaluation for turing machines

N Döttling, P Gajland, G Malavolta - IACR International Conference on …, 2023 - Springer
Laconic function evaluation (LFE) allows Alice to compress a large circuit C into a small
digest d. Given Alice's digest, Bob can encrypt some input x under d in a way that enables …

Laconic function evaluation and ABE for RAMs from (ring-) LWE

F Dong, Z Hao, E Mook, H Wee, D Wichs - Annual International Cryptology …, 2024 - Springer
Laconic function evaluation (LFE) allows us to compress a circuit f into a short digest.
Anybody can use this digest as a public-key to efficiently encrypt some input x. Decrypting …

CP-ABE for circuits (and more) in the symmetric key setting

S Agrawal, S Yamada - … 18th International Conference, TCC 2020, Durham …, 2020 - Springer
The celebrated work of Gorbunov, Vaikuntanathan and Wee GVW13 provided the first key
policy attribute based encryption scheme (ABE) for circuits from the Learning With Errors …

Attribute based encryption for deterministic finite automata from

S Agrawal, M Maitra, S Yamada - Theory of Cryptography Conference, 2019 - Springer
Waters Crypto, 2012 provided the first attribute based encryption scheme ABE for
Deterministic Finite Automata (DFA) from a parametrized or “q-type” assumption over …

Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification

VS Sehrawat, FY Yeo, Y Desmedt - Theoretical Computer Science, 2021 - Elsevier
Secret sharing allows a dealer to distribute a secret among a set of parties such that only
authorized subsets, specified by an access structure, can reconstruct the secret. Sehrawat …

Differentially oblivious database joins: Overcoming the worst-case curse of fully oblivious algorithms

S Chu, D Zhuo, E Shi, THH Chan - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Numerous high-profile works have shown that access patterns to even encrypted databases
can leak secret information and sometimes even lead to reconstruction of the entire …

Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data

F Luo, H Wang, X Yan, J Wu - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Fine-grained access control systems facilitate granting differential access rights to a set of
users and allow flexibility in specifying the access rights of individual users. As an important …