搜索结果: 1-11 共查到“simple assumptions”相关记录11条 . 查询时间(0.078 秒)
Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions
Functional Encryption Attribute Based Encryption Inner Product
2019/7/23
Functional encryption (FE) that bases on user attributes has many useful practical applications. For example, a company may only authorize department heads of other sections to query the average sale ...
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management
Group Signatures Anonymity Revocation
2019/1/26
Group signatures are signatures providing signer anonymity where signers can produce signatures on behalf of the group that they belong to. Although such anonymity is quite attractive considering priv...
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions
Aggregator Oblivious Encryption Public Verifiability
2017/5/31
Aggregator oblivious encryption was proposed by Shi et al. (NDSS 2011), where an aggregator can compute an aggregated sum of data and is unable to learn anything else (aggregator obliviousness). Since...
Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions
Commitment schemes functional commitments accumulators
2016/12/10
We propose a construction of functional commitment (FC) for linear functions based on constant-size assumptions in composite order groups endowed with a bilinear map. The construction has commitments ...
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
functional encryption randomized functionalities malicious security
2016/5/24
Functional encryption (FE) enables fine-grained control of encrypted data by allowing users to compute only those functions for which they have a key. Until recently, FE schemes could only support det...
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions
Group signatures standard model simple assumptions
2015/12/24
Group signatures are a central cryptographic primitive which allows users to sign messages
while hiding their identity within a crowd of group members. In the standard model (without the random
orac...
Identity-Based Revocation from Subset Difference Methods under Simple Assumptions
Broadcast encryption Identity-based revocation Subset cover framework
2015/12/22
Identity-based revocation (IBR) is a specific kind of broadcast encryption that can effectively send
a ciphertext to a set of receivers. In IBR, a ciphertext is associated with a set of revoked users...
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts
Jie Chen Hoon Wei Lim San Ling Huaxiong Wang
2012/6/14
In this paper, we propose two new spatial encryption (SE) schemes based on existing inner product encryption (IPE) schemes. Both of our SE schemes are fully secure under simple assumptions and in prim...
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts
public-key cryptography / Functional Encryption Spatial Encryption Inner Product Encryption
2012/3/22
In this paper, we propose two new spatial encryption (SE) schemes based on existing inner product encryption (IPE) schemes. Both of our SE schemes are fully secure under simple assumptions and in prim...
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts
public-key cryptography / Functional Encryption Spatial Encryption Inner Product Encryption
2012/3/21
In this paper, we propose two new spatial encryption (SE) schemes based on existing inner product encryption (IPE) schemes. Both of our SE schemes are fully secure under simple assumptions and in prim...
Dual System Encryption:Realizing Fully Secure IBE and HIBE under Simple Assumptions
Dual System Encryption Secure IBE HIBE
2009/8/18
We present a new methodology for proving security of encryption systems using what we call
Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption (IBE)
and Hierarchi...