We build a concretely efficient threshold encryption scheme where the joint public key of a set of parties is computed as a deterministic function of their locally computed public keys …
Abstract Registration-Based Encryption (RBE)[Garg et al. TCC'18] is a public-key encryption mechanism in which users generate their own public and secret keys, and register their …
Traitor-tracing systems allow identifying the users who contributed to building a rogue decoder in a broadcast environment. In a traditional traitor-tracing system, a key authority is …
Registered encryption (Garg et al., TCC'18) is an emerging paradigm that tackles the key- escrow problem associated with identity-based encryption by replacing the private-key …
Attribute-based encryption (ABE) is a generalization of public-key encryption that enables fine-grained access control to encrypted data. In (ciphertext-policy) ABE, a central trusted …
Z Zhu, K Zhang, J Gong, H Qian - … on the Theory and Application of …, 2023 - Springer
This paper presents the first generic black-box construction of registered attribute-based encryption (Reg-ABE) via predicate encoding [TCC'14]. The generic scheme is based on k …
C Freitag, B Waters, DJ Wu - Annual International Cryptology Conference, 2023 - Springer
Witness encryption is a generalization of public-key encryption where the public key can be any NP statement x and the associated decryption key is any witness w for x. While early …
N Attrapadung, J Tomida - Annual International Cryptology Conference, 2024 - Springer
Registered attribute-based encryption (Reg-ABE), introduced by Hohenberger et al.(Eurocrypt'23), emerges as a pivotal extension of attribute-based encryption (ABE), aimed …
Distributed broadcast encryption (DBE) improves on the traditional notion of broadcast encryption by eliminating the key-escrow problem: In a DBE system, users generate their …