Unbounded and efficient revocable attribute-based encryption with adaptive security for cloud-assisted internet of things

H Xiong, X Huang, M Yang, L Wang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Existing attribute-based encryption (ABE) schemes with revocation to secure the cloud-
assisted Internet of Things (IoTs) raise challenges, such as eliminating the need for …

On the optimal succinctness and efficiency of functional encryption and attribute-based encryption

A Jain, H Lin, J Luo - Annual International Conference on the Theory and …, 2023 - Springer
We investigate the best-possible (asymptotic) efficiency of functional encryption (FE) and
attribute-based encryption (ABE) by proving inherent space-time trade-offs and constructing …

A modular approach to registered ABE for unbounded predicates

N Attrapadung, J Tomida - Annual International Cryptology Conference, 2024 - Springer
Registered attribute-based encryption (Reg-ABE), introduced by Hohenberger et
al.(Eurocrypt'23), emerges as a pivotal extension of attribute-based encryption (ABE), aimed …

ABE for circuits with constant-size secret keys and adaptive security

H Li, H Lin, J Luo - Theory of Cryptography Conference, 2022 - Springer
An important theme in the research on attribute-based encryption (ABE) is minimizing the
sizes of secret keys and ciphertexts. In this work, we present two new ABE schemes with …

Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice

M Venema, G Alpár, JH Hoepman - Designs, Codes and Cryptography, 2023 - Springer
Attribute-based encryption (ABE) cryptographically implements fine-grained access control
on data. As such, data can be stored by an entity that is not necessarily trusted to enforce …

Online/offline rewritable blockchain with auditable outsourced computation

L Guo, Q Wang, WC Yau - IEEE Transactions on Cloud …, 2021 - ieeexplore.ieee.org
Policy-based chameleon hash (PCH) is one of the techniques used for rewriting transaction-
level data stored in blockchains. This technique integrates the access policy of the attribute …

Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts

J Lai, F Guo, W Susilo, P Jiang, G Yang, X Huang - Information Sciences, 2022 - Elsevier
CCA security is desirable when designing encryption schemes because it captures active
attackers. One efficient approach for achieving CCA security is to use generic conversions …

A practical compiler for attribute-based encryption: New decentralized constructions and more

M Venema - Cryptographers' Track at the RSA Conference, 2023 - Springer
The pair encodings framework is an important result in the simplified design of complex
attribute-based encryption schemes. In particular, it reduces the effort of proving security of a …

Succinct and Adaptively Secure ABE for ABP from k-Lin

H Lin, J Luo - Advances in Cryptology–ASIACRYPT 2020: 26th …, 2020 - Springer
We present succinct and adaptively secure attribute-based encryption (ABE) schemes for
arithmetic branching programs, based on k-Lin in pairing groups. Our key-policy ABE …

ISABELLA: Improving Structures of Attribute-Based Encryption Leveraging Linear Algebra

D Riepel, M Venema, T Verma - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Attribute-based encryption (ABE) is a powerful primitive that has found applications in
important real-world settings requiring access control. Compared to traditional public-key …