We propose new fully secure attribute based encryption (ABE) systems for polynomial-size circuits in both key-policy and ciphertext-policy flavors. All the previous ABE systems for circuits were proved only selectively secure. Our schemes are based on asymmetric graded encoding systems in composite-order settings. The assumptions consist of the Subgroup Decision assumptions and two assumptions which are similar to Multi-linear Decisional Diffie-Hellman assumption (but more complex) and are proved to hold in the generic graded encoding model. Both of our systems enjoy succinctness: key and ciphertext sizes are proportional to their corresponding circuit and input string sizes. Our ciphertext-policy ABE for circuits is the first to achieve su...
Abstract. This paper demonstrates new technique for managing revocation in the context of attribute-...
International audienceAttribute-based encryption (ABE), as introduced by Sahai and Waters, allows fo...
Designing attribute-based systems supporting highly expressive access policies has been one of the p...
In this work, we provide the first construction of Attribute-Based Encryption (ABE) for general circ...
Abstract. Designing attribute-based systems supporting highly expressive access policies has been on...
In this paper, we present two fully secure functional encryption schemes. Our first result is a full...
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret keys: ...
We propose a key-policy attribute-based encryption (KP-ABE) scheme with constant-size ciphertexts, w...
Abstract. We propose the first Key-policy Attribute-based Encryption (KP-ABE) scheme for (monotone) ...
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret keys: ...
Sahai and Waters [34] proposed Attribute-Based Encryption (ABE) as a new paradigm of encryption algo...
Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for fine- grained access...
In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an ℓ-bit public index...
We present attribute-based encryption (ABE) schemes for Boolean formulas that are adaptively secure ...
AbstractAttribute-based encryption (ABE), as introduced by Sahai and Waters, allows for fine-grained...
Abstract. This paper demonstrates new technique for managing revocation in the context of attribute-...
International audienceAttribute-based encryption (ABE), as introduced by Sahai and Waters, allows fo...
Designing attribute-based systems supporting highly expressive access policies has been one of the p...
In this work, we provide the first construction of Attribute-Based Encryption (ABE) for general circ...
Abstract. Designing attribute-based systems supporting highly expressive access policies has been on...
In this paper, we present two fully secure functional encryption schemes. Our first result is a full...
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret keys: ...
We propose a key-policy attribute-based encryption (KP-ABE) scheme with constant-size ciphertexts, w...
Abstract. We propose the first Key-policy Attribute-based Encryption (KP-ABE) scheme for (monotone) ...
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret keys: ...
Sahai and Waters [34] proposed Attribute-Based Encryption (ABE) as a new paradigm of encryption algo...
Attribute-based encryption (ABE), as introduced by Sahai and Waters, allows for fine- grained access...
In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an ℓ-bit public index...
We present attribute-based encryption (ABE) schemes for Boolean formulas that are adaptively secure ...
AbstractAttribute-based encryption (ABE), as introduced by Sahai and Waters, allows for fine-grained...
Abstract. This paper demonstrates new technique for managing revocation in the context of attribute-...
International audienceAttribute-based encryption (ABE), as introduced by Sahai and Waters, allows fo...
Designing attribute-based systems supporting highly expressive access policies has been one of the p...