Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits

D Boneh, C Gentry, S Gorbunov, S Halevi… - Advances in Cryptology …, 2014 - Springer
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret
keys: the size of keys in our system depends only on the depth of the policy circuit, not its …

Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps

P Ananth, A Sahai - Annual International Conference on the Theory and …, 2017 - Springer
In this work, we propose a variant of functional encryption called projective arithmetic
functional encryption (PAFE). Roughly speaking, our notion is like functional encryption for …

Simpler efficient group signatures from lattices

PQ Nguyen, J Zhang, Z Zhang - IACR international workshop on public …, 2015 - Springer
A group signature allows a group member to anonymously sign messages on behalf of the
group. In the past few years, new group signatures based on lattice problems have …

A privacy preserve big data analysis system for wearable wireless sensor network

C Ge, C Yin, Z Liu, L Fang, J Zhu, H Ling - Computers & Security, 2020 - Elsevier
Big data and artificial intelligence develop rapidly. Big data analysis has been applied in
many fields of smart healthcare. Once these data are leaked or modified during …

Flexible attribute-based encryption applicable to secure e-healthcare records

B Qin, H Deng, Q Wu, J Domingo-Ferrer… - International Journal of …, 2015 - Springer
In e-healthcare record systems (EHRS), attribute-based encryption (ABE) appears as a
natural way to achieve fine-grained access control on health records. Some proposals …

Fine-grained flexible access control: ciphertext policy attribute based encryption for arithmetic circuits

M MahdaviOliaee, Z Ahmadian - Journal of Computer Virology and …, 2023 - Springer
Applying access structure to encrypted sensitive data is one of the challenges in
communication networks and cloud computing. Various methods have been proposed to …

[PDF][PDF] Applied Attribute-based Encryption Schemes.

S Zickau, D Thatmann, A Butyrtschik, I Denisow… - ICIN, 2016 - opendl.ifip-tc6.org
The advent of new cryptographic methods in recent years also includes schemes related to
functional encryption. Within these schemes Attribute-based Encryption (ABE) became the …

[图书][B] Lattice-Based Cryptosystems

J Zhang, Z Zhang - 2020 - Springer
As we enter into the post-quantum era, traditional public-key cryptosystems face great
challenges and will fail to protect our private information over the Internet. Due to several …

LSSS matrix-based attribute-based encryption on lattices

J Zhao, H Gao - 2017 13th International Conference on …, 2017 - ieeexplore.ieee.org
Attribute-Based Encryption (ABE) schemes show unprecedented flexibility and
expressiveness through the introduction of access policies. Compared to ABE schemes for …

A lower bound for proving hardness of learning with rounding with polynomial modulus

P Newton, S Richelson - Annual International Cryptology Conference, 2023 - Springer
Abstract Regev's Learning with Errors (LWE) problem (STOC 2005) is a fundamental
hardness assumption for modern cryptography. The Learning with Rounding (LWR) …