A Jain, H Lin, J Luo - Annual International Conference on the Theory and …, 2023 - Springer
We investigate the best-possible (asymptotic) efficiency of functional encryption (FE) and attribute-based encryption (ABE) by proving inherent space-time trade-offs and constructing …
N Attrapadung, J Tomida - Annual International Cryptology Conference, 2024 - Springer
Registered attribute-based encryption (Reg-ABE), introduced by Hohenberger et al.(Eurocrypt'23), emerges as a pivotal extension of attribute-based encryption (ABE), aimed …
H Li, H Lin, J Luo - Theory of Cryptography Conference, 2022 - Springer
An important theme in the research on attribute-based encryption (ABE) is minimizing the sizes of secret keys and ciphertexts. In this work, we present two new ABE schemes with …
Attribute-based encryption (ABE) cryptographically implements fine-grained access control on data. As such, data can be stored by an entity that is not necessarily trusted to enforce …
L Guo, Q Wang, WC Yau - IEEE Transactions on Cloud …, 2021 - ieeexplore.ieee.org
Policy-based chameleon hash (PCH) is one of the techniques used for rewriting transaction- level data stored in blockchains. This technique integrates the access policy of the attribute …
CCA security is desirable when designing encryption schemes because it captures active attackers. One efficient approach for achieving CCA security is to use generic conversions …
M Venema - Cryptographers' Track at the RSA Conference, 2023 - Springer
The pair encodings framework is an important result in the simplified design of complex attribute-based encryption schemes. In particular, it reduces the effort of proving security of a …
H Lin, J Luo - Advances in Cryptology–ASIACRYPT 2020: 26th …, 2020 - Springer
We present succinct and adaptively secure attribute-based encryption (ABE) schemes for arithmetic branching programs, based on k-Lin in pairing groups. Our key-policy ABE …
D Riepel, M Venema, T Verma - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Attribute-based encryption (ABE) is a powerful primitive that has found applications in important real-world settings requiring access control. Compared to traditional public-key …