Gaussian sampling in lattice-based cryptography

T Prest - 2015 - theses.hal.science
Although rather recent, lattice-based cryptography has stood out on numerous points, be it
by the variety of constructions that it allows, by its expected resistance to quantum …

Improved (hierarchical) inner-product encryption from lattices

K Xagawa - International Workshop on Public Key Cryptography, 2013 - Springer
Inner-product encryption (IPE) provides fine-grained access control and has attractive
applications. Agrawal, Freeman, and Vaikuntanathan (Asiacrypt 2011) proposed the first IPE …

Private and mutually authenticated key exchange

MF Abdalla, WP Chen - US Patent 10,205,713, 2019 - Google Patents
(57) ABSTRACT A method of private mutually authenticated key exchange is provided. The
method may include receiving, at the first device, a message transmitted from a second …

A generic construction of CCA-secure attribute-based encryption with equality test

K Asano, K Emura, A Takayasu, Y Watanabe - … Conference on Provable …, 2022 - Springer
Attribute-based encryption with equality test (ABEET) is an extension of the ordinary attribute-
based encryption (ABE), where trapdoors enable us to check whether two ciphertexts are …

Adaptively attribute-hiding (hierarchical) inner product encryption

T Okamoto, K Takashima - IEICE Transactions on Fundamentals of …, 2016 - search.ieice.org
This paper proposes the first (practical) inner product encryption (IPE) scheme that is
adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by …

Brain architecture for visual object identification

G Torres, K Jaime, F Ramos… - IEEE 10th International …, 2011 - ieeexplore.ieee.org
Visual objects identification is a key cognitive process for intelligent virtual agents that
evolve in virtual environments. This process allows the elaboration of intern representation …

Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis Without q-type Assumption

A Belel, R Dutta, S Mukhopadhyay - International Symposium on …, 2022 - Springer
Statistical analysis is a popular research tool used by scientists, industries, and governments
to summarize data in a meaningful way. It is an interesting problem to explore how statistical …

A generic construction of CCA-secure attribute-based encryption with equality test

K Asano, K Emura, A Takayasu… - Cryptology ePrint …, 2021 - eprint.iacr.org
Attribute-based encryption with equality test ($\mathsf {ABEET} $) is an extension of the
ordinary attribute-based encryption ($\mathsf {ABE} $), where trapdoors enable us to check …

Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud

L Zhang, Z Wang, Y Mu, Y Hu - International Journal of High …, 2018 - inderscienceonline.com
Cloud computing provides dynamically scalable resources provisioned as a service over
networks. But untrustworthy cloud service provider (CSP) offers a big obstacle for the …

Spatial encryption revisited: from delegatable multiple inner product encryption and more

HQ Le, DH Duong, W Susilo, J Pieprzyk - European Symposium on …, 2022 - Springer
Spatial encryption (SE), which involves encryption and decryption with affine/vector objects,
was introduced by Boneh and Hamburg at Asiacrypt 2008. Since its introduction, SE has …