In predicate encryption, a ciphertext is associated with descriptive attribute values x in addition to a plaintext μ, and a secret key is associated with a predicate f. Decryption returns plaintext μ if and only if f(x)=1. Moreover, security of predicate encryption guarantees that an adversary learns nothing about the attribute x or the plaintext μ from a ciphertext, given arbitrary many secret keys that are not authorized to decrypt the ciphertext individually. We construct a leveled predicate encryption scheme for all circuits, assuming the hardness of the subexponential learning with errors (LWE) problem. That is, for any polynomial function d=d(λ), we construct a predicate encryption scheme for the class of all circuits with depth boun...
In this paper, we propose a reasonable definition of predicate-hiding inner product encryption (IPE)...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract. Predicate encryption schemes are encryption schemes in which each ciphertext Ct is associa...
In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an ℓ-bit public index...
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypte...
The celebrated work of Gorbunov, Vaikuntanathan and Wee provided the first key policy attribute base...
Predicates are used in cryptography as a fundamental tool to control the disclosure of secrets. Howe...
Wee (TCC\u2714) and Attrapadung (Eurocrypt\u2714) introduced predicate and pair encodings, respectiv...
We construct an LWE-based key-policy attribute-based encryption (ABE) scheme that supports attribute...
Predicate encryption has an advantage over traditional public-key or identity-based encryption, sinc...
We present a new class of public-key predicate encryption schemes that are provably function private...
Abstract. We introduce the notion of predicate encodings, an information-theoretic primitive reminis...
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret keys: ...
Predicate encryption (PE) is a type of public-key encryption that captures many useful primitives su...
Predicate Encryption (PE) is a new encryption paradigm which provides more sophisticated and flexibl...
In this paper, we propose a reasonable definition of predicate-hiding inner product encryption (IPE)...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract. Predicate encryption schemes are encryption schemes in which each ciphertext Ct is associa...
In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an ℓ-bit public index...
Predicate encryption (PE) is a new primitive which supports exible control over access to encrypte...
The celebrated work of Gorbunov, Vaikuntanathan and Wee provided the first key policy attribute base...
Predicates are used in cryptography as a fundamental tool to control the disclosure of secrets. Howe...
Wee (TCC\u2714) and Attrapadung (Eurocrypt\u2714) introduced predicate and pair encodings, respectiv...
We construct an LWE-based key-policy attribute-based encryption (ABE) scheme that supports attribute...
Predicate encryption has an advantage over traditional public-key or identity-based encryption, sinc...
We present a new class of public-key predicate encryption schemes that are provably function private...
Abstract. We introduce the notion of predicate encodings, an information-theoretic primitive reminis...
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret keys: ...
Predicate encryption (PE) is a type of public-key encryption that captures many useful primitives su...
Predicate Encryption (PE) is a new encryption paradigm which provides more sophisticated and flexibl...
In this paper, we propose a reasonable definition of predicate-hiding inner product encryption (IPE)...
This electronic version was submitted by the student author. The certified thesis is available in th...
Abstract. Predicate encryption schemes are encryption schemes in which each ciphertext Ct is associa...