Predicate encryption (PE) is a new primitive which supports exible control over access to encrypted data. In PE schemes, users' decryption keys are associated with predicates f and ciphertexts encode attributes a that are specified during the encryption procedure. A user can successfully decrypt if and only if f(a) = 1. In this thesis, we will investigate several properties that are crucial to PE. We focus on expressiveness of PE, Revocable PE and Hierarchical PE (HPE) with forward security. For all proposed systems, we provide a security model and analysis using the widely accepted computational complexity approach. Our first contribution is to explore the expressiveness of PE. Existing PE supports a wide class of predicates such as c...
With the fast development in Cloud storage technologies and ever increasing use of Cloud data centre...
Puncturable encryption (PE), proposed by Green and Miers at IEEE S&P 2015, is a kind of public key e...
In this paper, we propose a reasonable definition of predicate-hiding inner product encryption (IPE)...
We introduce the concept of Revocable Predicate Encryption (RPE), which extends current predicate en...
Predicate encryption has an advantage over traditional public-key or identity-based encryption, sinc...
Predicate Encryption (PE) is a new encryption paradigm which provides more sophisticated and flexibl...
In predicate encryption, a ciphertext is associated with descriptive attribute values x in addition ...
Abstract. Predicate encryption has an advantage over traditional public-key or identity-based encryp...
Predicate encryption (PE) that provides both the access control of ciphertexts and the privacy of ci...
Abstract. We introduce the notion of predicate encodings, an information-theoretic primitive reminis...
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. A...
Recently Attrapadung (Eurocrypt 2014) proposed a generic framework for fully (adaptively) secure pre...
Predicate encryption (PE), a generalization of attribute-based encryption (ABE), is a versatile tool...
In predicate encryption systems, given a capability, one can evaluate one or more predicates on the ...
We propose a generic construction for fully secure decentralized multiauthority predicate encryption...
With the fast development in Cloud storage technologies and ever increasing use of Cloud data centre...
Puncturable encryption (PE), proposed by Green and Miers at IEEE S&P 2015, is a kind of public key e...
In this paper, we propose a reasonable definition of predicate-hiding inner product encryption (IPE)...
We introduce the concept of Revocable Predicate Encryption (RPE), which extends current predicate en...
Predicate encryption has an advantage over traditional public-key or identity-based encryption, sinc...
Predicate Encryption (PE) is a new encryption paradigm which provides more sophisticated and flexibl...
In predicate encryption, a ciphertext is associated with descriptive attribute values x in addition ...
Abstract. Predicate encryption has an advantage over traditional public-key or identity-based encryp...
Predicate encryption (PE) that provides both the access control of ciphertexts and the privacy of ci...
Abstract. We introduce the notion of predicate encodings, an information-theoretic primitive reminis...
Efficient user revocation is a necessary but challenging problem in many multi-user cryptosystems. A...
Recently Attrapadung (Eurocrypt 2014) proposed a generic framework for fully (adaptively) secure pre...
Predicate encryption (PE), a generalization of attribute-based encryption (ABE), is a versatile tool...
In predicate encryption systems, given a capability, one can evaluate one or more predicates on the ...
We propose a generic construction for fully secure decentralized multiauthority predicate encryption...
With the fast development in Cloud storage technologies and ever increasing use of Cloud data centre...
Puncturable encryption (PE), proposed by Green and Miers at IEEE S&P 2015, is a kind of public key e...
In this paper, we propose a reasonable definition of predicate-hiding inner product encryption (IPE)...