搜索结果: 1-11 共查到“Short Ciphertexts”相关记录11条 . 查询时间(0.055 秒)
Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys
broadcast encryption bilinear group
2018/5/2
We present a new public key broadcast encryption scheme where both the ciphertext and secret keys consist of a constant number of group elements. Our result improves upon the work of Boneh, Gentry, an...
Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts
public-key cryptography Ring-LWE
2017/4/27
We provide a tight security proof for an IND-CCA Ring-LWE based Key Encapsulation Mechanism that is derived from a generic construction of Dent (IMA Cryptography and Coding, 2003). Such a tight reduct...
Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts
public-key cryptography fully homomorphic encryption
2016/4/7
We present a multi-key fully homomorphic encryption scheme that supports an unbounded number of homomorphic operations for an unbounded number of parties. Namely, it allows to perform arbitrarily many...
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts
Identity-based encryption Bounded-CCA security
2016/1/26
Identity-based encryption (IBE) is a special case of public-key encryption where
user identities replace public keys. Every user is given a corresponding secret key for decryption,
and encryptions f...
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
Resistant Broadcast Encryption Short Ciphertexts
2015/8/5
We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. In our first construction both ciphertexts and priva...
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
Inner-Product Encryption Functional Encryption Predicate Encryption
2012/6/14
In this paper, we present two non-zero inner-product encryption (NIPE) schemes that are adaptively secure under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. O...
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
public-key cryptography / Inner-Product Encryption Functional Encryption Predicate Encryption Attribute-Hiding
2012/3/21
In this paper, we present two non-zero inner-product encryption (NIPE) schemes that are adaptively secure under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. O...
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption
public-key cryptography / Inner-Product Encryption Functional Encryption Predicate Encryption Attribute-Hiding
2012/3/22
In this paper, we present two non-zero inner-product encryption (NIPE) schemes that are adaptively secure under a standard assumption, the decisional linear (DLIN) assumption, in the standard model. O...
We construct a fully secure HIBE scheme with short ciphertexts. The previous construction
of Boneh, Boyen, and Goh was only proven to be secure in the selective model,
under a non-static assumption ...
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
Broadcast Encryption Short Ciphertexts Private Keys
2009/1/13
We describe two new public key broadcast encryption systems for stateless receivers. Both
systems are fully secure against any number of colluders. In our first construction both ciphertexts and priv...
Direct Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts
Chosen-ciphertext security Identity-Based Encryption Bilinear Maps
2008/11/12
We describe a practical identity-based encryption scheme that is secure in the standard model
against chosen-ciphertext (IND-CCA2) attacks. Security is based on an assumption comparable to
(but slig...