textWe develop the dual system encryption methodology to provide fully secure functional encryption systems. We introduce new proof techniques and explore their applications, resulting in systems that advance the state of the art in terms of functionality, security, and efficiency. Our approach constructs versatile tools for adapting the dual system encryption methodology to new functionalities and efficiency goals. As particular demonstrations of our techniques, we obtain fully secure ciphertext-policy attribute-based encryption systems in the single authority and decentralized settings. Our work has provided the first fully secure attribute-based encryption schemes as well as the first decentralized schemes achieving desired levels of fle...
Functional encryption is a novel paradigm for public-key encryption that enables both fine-grained a...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
We introduce a broad lattice manipulation technique for expressive cryptography, and use it to reali...
We develop a new methodology for utilizing the prior techniques to prove selective security for func...
Dual system encryption techniques introduced by Waters in Crypto’09 are powerful ap-proaches for con...
We introduce novel techniques to achieve a wide range of functional encryption schemes. For our work...
Functional encryption is an emerging paradigm for public-key encryption that enables fine-grained co...
This paper presents a fully secure functional encryption scheme for a wide class of relations, that ...
Confidentiality can be usually achieved by conventional encryption, which hides sensitive data from ...
Our work revisits public-key encryption in two ways: 1) we provide a stronger security guarantee tha...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
Recent advances in encryption schemes have allowed us to go far beyond point to point encryption, th...
Thesis: M. Eng. in Computer Science and Engineering, Massachusetts Institute of Technology, Departme...
We introduce a broad lattice manipulation technique for expressive cryptography, and use it to reali...
In this paper, we present two fully secure functional encryption schemes. Our first result is a full...
Functional encryption is a novel paradigm for public-key encryption that enables both fine-grained a...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
We introduce a broad lattice manipulation technique for expressive cryptography, and use it to reali...
We develop a new methodology for utilizing the prior techniques to prove selective security for func...
Dual system encryption techniques introduced by Waters in Crypto’09 are powerful ap-proaches for con...
We introduce novel techniques to achieve a wide range of functional encryption schemes. For our work...
Functional encryption is an emerging paradigm for public-key encryption that enables fine-grained co...
This paper presents a fully secure functional encryption scheme for a wide class of relations, that ...
Confidentiality can be usually achieved by conventional encryption, which hides sensitive data from ...
Our work revisits public-key encryption in two ways: 1) we provide a stronger security guarantee tha...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
Recent advances in encryption schemes have allowed us to go far beyond point to point encryption, th...
Thesis: M. Eng. in Computer Science and Engineering, Massachusetts Institute of Technology, Departme...
We introduce a broad lattice manipulation technique for expressive cryptography, and use it to reali...
In this paper, we present two fully secure functional encryption schemes. Our first result is a full...
Functional encryption is a novel paradigm for public-key encryption that enables both fine-grained a...
We construct a functional encryption scheme secure against an a priori bounded polynomial number of ...
We introduce a broad lattice manipulation technique for expressive cryptography, and use it to reali...