A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
[chapter]
2009
Lecture Notes in Computer Science
These results are the first HIBE system and the first IBE system with short parameters under simple assumptions. ...
Our techniques result in fully secure Identity-Based Encryption (IBE) and Hierarchical Identity-Based Encryption (HIBE) systems under the simple and established decisional Bilinear Diffie-Hellman and decisional ...
Our techniques result in fully secure IBE and HIBE systems under the simple and established decisional Bilinear Diffie-Hellman and decisional Linear assumptions. ...
doi:10.1007/978-3-642-03356-8_36
fatcat:d3bc7cfsurawlphcxqfpyidiiy
Achieving Leakage Resilience through Dual System Encryption
[chapter]
2011
Lecture Notes in Computer Science
We demonstrate this concretely by providing fully secure IBE, HIBE, and ABE systems which are resilient to bounded leakage from each of many secret keys per user, as well as many master keys. ...
Our systems are obtained by applying a simple modification to previous dual system encryption constructions: essentially this provides a generic tool for making dual system encryption schemes leakage-resilient ...
Acknowledgments We are thankful to Joël Alwen and Yevgeniy Vahlis for useful observations. ...
doi:10.1007/978-3-642-19571-6_6
fatcat:sphqyprquvehjivaet5blzy5ra
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
[chapter]
2010
Lecture Notes in Computer Science
To overcome this challenge, we design a new method for realizing dual system encryption. ...
We construct a fully secure HIBE scheme with short ciphertexts. ...
This 3-tuple is inspired by a simplification of the Waters dual encryption IBE system [5] . We prove security under 3 new static assumptions. ...
doi:10.1007/978-3-642-11799-2_27
fatcat:cyh6bfc3pvb3bfvasuvvrhkryu
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More
[chapter]
2014
Lecture Notes in Computer Science
However, there are still some FE for certain predicates to which dual system encryption techniques seem inapplicable, and hence their fully-secure realization remains an important problem. ...
Dual system encryption techniques introduced by Waters in Crypto'09 are powerful approaches for constructing fully secure functional encryption (FE) for many predicates. ...
I would like to thank Michel Abdalla, Takahiro Matsuda, Shota Yamada, and reviewers for their helpful comments on previous versions. ...
doi:10.1007/978-3-642-55220-5_31
fatcat:bogsnlvadvb25bga7lm4en3rxa
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
[chapter]
2010
Lecture Notes in Computer Science
We present two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for inner-product ...
In both cases, previous constructions were only proven to be selectively secure. Both results use novel strategies to adapt the dual system encryption methodology introduced by Waters. ...
Waters [40] leveraged the dual system encryption methodology to obtain fully secure IBE and HIBE systems from simple assumptions. ...
doi:10.1007/978-3-642-13190-5_4
fatcat:sazrfsry65gpzh5bwxm2idfl7q
RHIBE: Constructing Revocable Hierarchical ID-Based Encryption from HIBE
2014
Informatica
Up to now, there was very little work on studying the revocation problem in existing hierarchical ID-based encryption (HIBE) systems. ...
We demonstrate that the proposed RHIBE scheme is fully secure while removing the requirement of secure channels for private key updating in Boneh and Franklin's revocation method. ...
., under contract No. NSC100-2221-E-018-027. ...
doi:10.15388/informatica.2014.16
fatcat:7eaihyb7fneqvd3ipt3mx5pm2y
Expressive Encryption Systems from Lattices
[chapter]
2011
Lecture Notes in Computer Science
In this survey, we review a number of the many "expressive" encryption systems that have recently appeared from lattices, and explore the innovative techniques that underpin them. ...
The full version of [1] describes the fully secure system and its proof. ...
to realize full homomorphism in his original system. 1 Around the same time, also appeared the first realization of "fully homomorphic encryption" [14] , a hugely significant breakthrough of both theoretical ...
doi:10.1007/978-3-642-25513-7_1
fatcat:pzyrmvtkpjhcjk6gq6yhcjm3xq
Fully, (Almost) Tightly Secure IBE and Dual System Groups
[chapter]
2013
Lecture Notes in Computer Science
We present the first fully secure Identity-Based Encryption scheme (IBE) from the standard assumptions where the security loss depends only on the security parameter and is independent of the number of ...
Along the way, we introduce a novel notion of dual system groups and a new randomization and parameter-hiding technique for prime-order bilinear groups. ...
We thank Dennis Hofheinz and the anonymous reviewers for helpful feedback on the write-up. ...
doi:10.1007/978-3-642-40084-1_25
fatcat:tpffl4jfjfgr7h3zm2m23nnhza
Extended Nested Dual System Groups, Revisited
[chapter]
2016
Lecture Notes in Computer Science
In particular, the dual system technique is now applied for establishing adaptive security of various types of functional encryptions, ranging from simple functionality, such as IBE [BKP14, CW14, JR13, ...
without any additional assumption and full adaptive secure under the d-linear assumption. • We also try to provide better solution by fine-tuning ENDSG again and realizing it following the work of Chen ...
In 2009, Waters [Wat09] proposed a new proof methodology, the dual system encryption, and presented an IBE scheme with short public key and proved its security under several simple assumptions in the ...
doi:10.1007/978-3-662-49384-7_6
fatcat:nbgaii2dzze7nnqbs45lxymlqu
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
2004
Proceedings of the 11th ACM conference on Computer and communications security - CCS '04
A forward-secure public-key encryption scheme has recently been presented by Canetti, Halevi and Katz [13]. ...
The security of our schemes is based on the bilinear Diffie-Hellman assumption in the random oracle model. ...
Gentry and Silverberg [22] extended BF-IBE scheme and presented a fully scalable hierarchical identity-based encryption (GS-HIBE) scheme. ...
doi:10.1145/1030083.1030130
dblp:conf/ccs/YaoFDL04
fatcat:eie6dpfsbbckhamncqa7lyakei
Forward-Secure Hierarchical Predicate Encryption
2013
Computer journal
It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions. ...
Furthermore, Okamoto and Takashima [28] investigated Functional Encryption that is adaptive security under standard assumptions. ...
He wishes further to acknowledge support from the Center of Advanced Security Research Darmstadt (CASED) and the European Center for Security and Privacy by Design (EC SPRIDE). ...
doi:10.1093/comjnl/bxt029
fatcat:urvxkctw2fcnlikfjawnmmp6b4
Forward-Secure Hierarchical Predicate Encryption
[chapter]
2013
Lecture Notes in Computer Science
It realizes zero-inner-product predicates and is proven adaptively secure under standard assumptions. ...
Furthermore, Okamoto and Takashima [28] investigated Functional Encryption that is adaptive security under standard assumptions. ...
He wishes further to acknowledge support from the Center of Advanced Security Research Darmstadt (CASED) and the European Center for Security and Privacy by Design (EC SPRIDE). ...
doi:10.1007/978-3-642-36334-4_6
fatcat:weuhheo4jzdlpkuvup4fout6v4
Revocable hierarchical identity-based broadcast encryption
2018
Tsinghua Science and Technology
The unbounded version of the scheme is also shown to be secure but a little weaker than the former under the decisional n-Weak Bilinear Diffie-Hellman inversion assumption. ...
Hierarchical Identity-Based Broadcast Encryption (HIBBE) organizes users into a tree-like structure, and it allows users to delegate their decryption ability to subordinates and enable encryption to any ...
Waters [11] proposed the dual system encryption to realize fully secure HIBE under simple assumptions. Since then, many fully secure IBE and HIBE schemes have been constructed [11, 12, 17, 18] . ...
doi:10.26599/tst.2018.9010023
fatcat:aoiis52uyzckrhxkafj7cedeyy
A Novel Commutative Blinding Identity Based Encryption Scheme
[chapter]
2012
Lecture Notes in Computer Science
In CRYPTO 2009, Waters [28] proposed dual system encryption which resulted in fully secure IBE and HIBE systems under simple assumption and with compact public parameters. ...
Motivation It is somewhat surprising to realize that BB 1 -IBE and Waters-IBE share the same framework but have quite different security results. The only ...
IBE [1] , and direct CCA-secure 1 encryption [10] . ...
doi:10.1007/978-3-642-27901-0_7
fatcat:7umy3ejkhrcgjf5tneophen2ii
Fully Secure Doubly-Spatial Encryption under Simple Assumptions
[chapter]
2012
Lecture Notes in Computer Science
Only a few spatial encryption schemes achieve adaptive security, but not under standard assumptions. And no fully secure doubly-spatial encryption scheme has been presented before. ...
To the best of our knowledge, our second scheme is the first fully secure construction of doubly-spatial encryption. [1] keywords: spatial encryption, adaptive security, dual system encryption ...
And later, dual system encryption used in [9] [10] [11] 13 ] to obtain adaptive security for IBE, HIBE, and ABE systems. ...
doi:10.1007/978-3-642-33272-2_16
fatcat:lixcqgytkfejbiel3tvcwg4kum
« Previous
Showing results 1 — 15 out of 67 results