International audienceWe propose new constructions for inner product encryption – IPE1 and IPE2, both secure under the eXternal Diffie-Hellman assumption (SXDH) in asymmetric pairing groups. The first scheme has constant-size ciphertexts whereas the second one is weakly attribute hiding. IPE2 is derived from the identity-based encryption scheme of Jutla Roy (Asiacrypt 2013), that was extended from tag-based quasi-adaptive non-interactive zero-knowledge (QA-NIZK) proofs for linear subspaces of vector spaces over bilinear groups. The verifier common reference string (CRS) in these tag-based systems are split into two parts, that are combined during verification. We consider an alternate form of the tag-based QA-NIZK proof with a single verifi...
International audienceVerifiability is central to building protocols and systems with integrity. Ini...
Over the past decade, the emerging of pairing-based cryptography has attracted not only the attentio...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
International audienceWe propose new constructions for inner product encryption – IPE1 and IPE2, bot...
International audienceWe describe two constructions of non-zero inner product encryption (NIPE) syst...
Non-zero inner product encryption (NIPE) allows a user to encrypt a message with an attribute vector...
We present efficient Identity-Based Encryption (IBE) and signature schemes under the Symmetric Exter...
In this paper, we present the first inner-product encryption (IPE) schemes that are unbounded in the...
International audienceFunctional encryption is a modern public-key paradigm where a master secret ke...
In this work, we propose two IPE schemes achieving both adaptive security and full attribute-hiding ...
International audienceInner product functional encryption (IPFE) is a primitive which produces, from...
In this paper, we propose a reasonable definition of predicate-hiding inner product encryption (IPE)...
Abstract. We present efficient Identity-Based Encryption (IBE) and signature schemes under the Symme...
With the rise of technology in recent years, more people are studying distributed system architectur...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
International audienceVerifiability is central to building protocols and systems with integrity. Ini...
Over the past decade, the emerging of pairing-based cryptography has attracted not only the attentio...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
International audienceWe propose new constructions for inner product encryption – IPE1 and IPE2, bot...
International audienceWe describe two constructions of non-zero inner product encryption (NIPE) syst...
Non-zero inner product encryption (NIPE) allows a user to encrypt a message with an attribute vector...
We present efficient Identity-Based Encryption (IBE) and signature schemes under the Symmetric Exter...
In this paper, we present the first inner-product encryption (IPE) schemes that are unbounded in the...
International audienceFunctional encryption is a modern public-key paradigm where a master secret ke...
In this work, we propose two IPE schemes achieving both adaptive security and full attribute-hiding ...
International audienceInner product functional encryption (IPFE) is a primitive which produces, from...
In this paper, we propose a reasonable definition of predicate-hiding inner product encryption (IPE)...
Abstract. We present efficient Identity-Based Encryption (IBE) and signature schemes under the Symme...
With the rise of technology in recent years, more people are studying distributed system architectur...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...
International audienceVerifiability is central to building protocols and systems with integrity. Ini...
Over the past decade, the emerging of pairing-based cryptography has attracted not only the attentio...
We show a framework for constructing identity-based encryption (IBE) schemes that are (almost) tight...