搜索结果: 1-15 共查到“军队指挥学 ABE”相关记录25条 . 查询时间(0.089 秒)
ABE for DFA from k-Lin
ABE DFA
2019/6/4
We present the first attribute-based encryption (ABE) scheme for deterministic finite automaton (DFA) based on static assumptions in bilinear groups; this resolves an open problem posed by Waters (CRY...
Compact Adaptively Secure ABE for NC1 from k-Lin
attribute-based encryption adaptive security bilinear maps
2019/2/28
We present compact attribute-based encryption (ABE) schemes for NC1 that are adaptively secure under the k-Lin assumption with polynomial security loss. Our KP-ABE scheme achieves ciphertext size that...
FE for Inner Products and Its Application to Decentralized ABE
functional encryption ABE LWE DDH
2019/1/18
In this work, we revisit the primitive functional encryption (FE) for inner products and show its application to decentralized attribute- based encryption (ABE). Particularly, we derive an FE for inne...
Unbounded ABE via Bilinear Entropy Expansion, Revisited
public-key cryptography attribute-based encryption
2018/2/1
At the core of all of these constructions is a "bilinear entropy expansion" lemma that allows us to generate any polynomial amount of entropy starting from constant-size public parameters; the entropy...
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication
Group-based Secure Communication Ciphertext-Policy Attribute-Based Encryption ID Revocation
2017/11/20
Ciphertext-Policy Attribute-Based Encryp- tion (CP-ABE) is an access control mechanism over encrypted data and well suited for secure group-based communication. However, it also suffers from the fol- ...
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing
Attribute-Based Access Control Encryption CP-ABE
2017/11/20
Ciphertext Policy Attribute-Based Encryption (CP- ABE) has been proposed to implement the attribute-based access control model. In CP-ABE, data owners encrypt the data with a certain access policy suc...
ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups
Attribute-based encryption Predicate encoding Prime-order bilinear group
2017/9/13
Among all existing identity-based encryption (IBE) schemes in the bilinear group, Wat-IBE proposed by Waters [CRYPTO, 2009] and JR-IBE proposed by Jutla and Roy [AsiaCrypt, 2013] are quite special. A ...
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme
lattice-based cryptography attribute-based encryption GPU computing
2017/6/26
In this paper, we report on our implementation of a lattice-based Key-Policy Attribute-Based Encryption (KP-ABE) scheme, which uses short secret keys. The particular KP-ABE scheme can be used directly...
Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability
mix-nets witness indistinguishability Benes network
2017/6/9
We show that the simple and appealing unconditionally sound mix-net due to Abe (Asiacrypt'99) can be augmented to further guarantee anonymity against malicious verifiers. This additional guarantee imp...
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits
Attribute-based encryption Full security Unbounded-size Circuits
2017/2/20
We propose a new generic framework for constructing fully secure attribute based encryption (ABE) in multilinear settings. It is applicable in a generic manner to any predicates. Previous generic fram...
Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters
ABE KP-ABE Multi Authority
2016/3/9
Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms.
In our proposal, a Multiple-Authorities Key-Policy Attribute-Based Encryption
scheme is constructed in which the...
Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security
public-key cryptography attribute-based encryption
2016/2/23
We construct an LWE-based key-policy attribute-based encryption (ABE) scheme that supports
attributes of unbounded polynomial length. Namely, the size of the public parameters is a
fixed polynomial ...
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits
Attribute Based Encryption ABE Key-Homomorphic Public Key Encryption
2016/1/9
We construct the first (key-policy) attribute-based encryption (ABE) system with short
secret keys: the size of keys in our system depends only on the depth of the policy circuit,
not its size. Our ...
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption
CP-ABE decentralization privacy
2016/1/9
Cipher-policy attribute-based encryption (CP-ABE) is a more
efficient and flexible encryption system as the encryptor can control the
access structure when encrypting a message. In this paper, we pr...
Riding on Asymmetry: Efficient ABE for Branching Programs
LWE Attribute-Based Encryption Branching Programs
2016/1/6
In an Attribute-Based Encryption (ABE) scheme the ciphertext encrypting a message ?
is associated with a public attribute vector x and a secret key skP is associated with a predicate P.
The decrypti...