A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
Lecture Notes in Computer Science
We introduce a broad lattice manipulation technique for expressive cryptography, and use it to realize functional encryption for access structures from post-quantum hardness assumptions. Specically, we build an ecient key-policy attribute-based encryption scheme, and prove its security in the selective sense from learning-with-errors intractability in the standard model. 0 This is a longer version with appendices of a paper to appear at TCC 2013.doi:10.1007/978-3-642-36594-2_8 fatcat:puklxgbuvza4dfidwgkep7e5li