搜索结果: 1-15 共查到“军队指挥学 Predicate Encryption”相关记录21条 . 查询时间(0.056 秒)
Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank
Predicate Encryption Bilinear Maps Probabilistic Rank
2019/9/19
In predicate encryption for a function ff, an authority can create ciphertexts and secret keys which are associated with `attributes'. A user with decryption key KyKy corresponding to attribute yy can...
Function Private Predicate Encryption for Low Min-Entropy Predicates
public-key cryptography ZIPE
2019/1/4
In this work, we propose new predicate encryption schemes for zero inner-product encryption (ZIPE) and non-zero inner-product encryption (NIPE) predicates from prime-order bilinear pairings, which are...
Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle)
Predicate Encryption Adaptive Security Standard Model
2018/12/11
In a recent work, Katz et al. (CANS'17) generalized the notion of Broadcast Encryption to define Subset Predicate Encryption (SPE) that emulates \emph{subset containment} predicate in the encrypted do...
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption
Attribute-Based Encryption Predicate Encryption
2018/11/16
We provide generic and black box transformations from any chosen plaintext secure Attribute-Based Encryption (ABE) or One-sided Predicate Encryption system into a chosen ciphertext secure system. Our ...
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption
predicate encryption partially-hiding simulation-based adaptive security
2018/11/13
This paper demonstrates how to achieve simulation-based strong attribute hiding against adaptive adversaries for predicate encryption (PE) schemes supporting expressive predicate families under standa...
New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption
Predicate Encryption Public-Key Function Privacy
2018/3/6
We present function private public-key predicate encryption schemes from standard cryptographic assumptions, that achieve new lower bounds on the min-entropy of underlying predicate distributions. Exi...
CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient
Predicate Encryption CCA Security Pair Encoding Scheme
2017/7/6
Attrapadung (Eurocrypt 2014) proposed a generic framework called pair encoding to simplify the design and proof of security of CPA-secure predicate encryption (PE) instantiated in composite order grou...
Subtleties in Security Definitions for Predicate Encryption with Public Index
predicate encryption with public index predicate key-encapsulation mechanism semantic security definition
2017/5/26
We take a critical look at established security definitions for predicate encryption (PE) with public index under chosen-plaintext attack (CPA) and under chosen-ciphertext attack (CCA). In contrast to...
Encrypt-Augment-Recover: Computationally Function Private Predicate Encryption in the Public-Key Setting
Predicate Encryption Public-Key Function Privacy
2017/4/17
We solve the open problem of constructing \emph{computationally function private} public-key predicate encryption schemes. Existing public-key constructions for predicate encryption satisfy a \emph{st...
Simplifying Design and Analysis of Complex Predicate Encryption Schemes
predicate encryption attribute-based encryption bilinear maps
2017/3/9
Wee (TCC'14) and Attrapadung (Eurocrypt'14) introduced predicate and pair encodings, respectively, as a simple way to construct and analyze attribute-based encryption schemes, or more generally predic...
Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption
functional encryption predicate encryption
2017/2/23
We present two practically efficient functional encryption schemes for a large class of quadratic functionalities. Specifically, our constructions enable the computation of so-called bilinear maps on ...
Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption
functional encryption quadratic functions predicate encryption
2016/12/7
We present a functional encryption scheme based on standard assumptions where ciphertexts are associated with a tuple of values (x 1 ,...,x n ) in Z p n, secret keys are associated with a degree-two p...
Predicate Encryption for Multi-Dimensional Range Queries from Lattices
public-key cryptography inner product
2016/1/5
We construct a lattice-based predicate encryption scheme for multi-dimensional range and multidimensional
subset queries. Our scheme is selectively secure and weakly attribute-hiding, and its securit...
In predicate encryption, a ciphertext is associated with descriptive attribute values x in addition to a plaintext μ, and a secret key is associated with a predicate f. Decryption returns plaintext μ ...
A study of Pair Encodings: Predicate Encryption in prime order groups
Predicate Encryption Attribute-based Encryption Pair Encoding Schemes
2015/12/31
Pair encodings and predicate encodings, recently introduced by Attrapadung (Eurocrypt 2014)
and Wee (TCC 2014) respectively, greatly simplify the process of designing and analyzing predicate
and att...