Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Registered ABE via predicate encodings
This paper presents the first generic black-box construction of registered attribute-based
encryption (Reg-ABE) via predicate encoding [TCC'14]. The generic scheme is based on k …
encryption (Reg-ABE) via predicate encoding [TCC'14]. The generic scheme is based on k …
Decentralized multi-authority ABE for DNF s from LWE
We construct the first decentralized multi-authority attribute-based encryption (MA-ABE)
scheme for a non-trivial class of access policies whose security is based (in the random …
scheme for a non-trivial class of access policies whose security is based (in the random …
A modular approach to registered ABE for unbounded predicates
Registered attribute-based encryption (Reg-ABE), introduced by Hohenberger et
al.(Eurocrypt'23), emerges as a pivotal extension of attribute-based encryption (ABE), aimed …
al.(Eurocrypt'23), emerges as a pivotal extension of attribute-based encryption (ABE), aimed …
Fast, compact, and expressive attribute-based encryption
Attribute-based encryption (ABE) is an advanced cryptographic tool and useful to build
various types of access control systems. Toward the goal of making ABE more practical, we …
various types of access control systems. Toward the goal of making ABE more practical, we …
ABE for DFA from k-Lin
We present the first attribute-based encryption (ABE) scheme for deterministic finite
automaton (DFA) based on static assumptions in bilinear groups; this resolves an open …
automaton (DFA) based on static assumptions in bilinear groups; this resolves an open …
Compact NIZKs from standard assumptions on bilinear maps
A non-interactive zero-knowledge (NIZK) protocol enables a prover to convince a verifier of
the truth of a statement without leaking any other information by sending a single message …
the truth of a statement without leaking any other information by sending a single message …
Improved fully adaptive decentralized MA-ABE for NC1 from MDDH
J Chen, Q Chu, Y Gao, J Ning, L Wang - … on the theory and application of …, 2023 - Springer
We improve the first and the only existing prime-order fully adaptively secure decentralized
Multi-Authority Attribute-Based Encryption (MA-ABE) scheme for NC1 in Datta-Komargodski …
Multi-Authority Attribute-Based Encryption (MA-ABE) scheme for NC1 in Datta-Komargodski …
CP-ABE for circuits (and more) in the symmetric key setting
The celebrated work of Gorbunov, Vaikuntanathan and Wee GVW13 provided the first key
policy attribute based encryption scheme (ABE) for circuits from the Learning With Errors …
policy attribute based encryption scheme (ABE) for circuits from the Learning With Errors …
Succinct and Adaptively Secure ABE for ABP from k-Lin
We present succinct and adaptively secure attribute-based encryption (ABE) schemes for
arithmetic branching programs, based on k-Lin in pairing groups. Our key-policy ABE …
arithmetic branching programs, based on k-Lin in pairing groups. Our key-policy ABE …
Bounded collusion abe for tms from ibe
We give an attribute-based encryption system for Turing Machines that is provably secure
assuming only the existence of identity-based encryption (IBE) for large identity spaces …
assuming only the existence of identity-based encryption (IBE) for large identity spaces …