To label, or not to label (in generic groups)
M Zhandry - Annual International Cryptology Conference, 2022 - Springer
Generic groups are an important tool for analyzing the feasibility and in-feasibility of group-
based cryptosystems. There are two distinct wide-spread versions of generic groups …
based cryptosystems. There are two distinct wide-spread versions of generic groups …
Optimal broadcast encryption and CP-ABE from evasive lattice assumptions
H Wee - Annual International Conference on the Theory and …, 2022 - Springer
We present a new, simple candidate broadcast encryption scheme for N users with
parameter size poly (log N). We prove security of our scheme under a non-standard variant …
parameter size poly (log N). We prove security of our scheme under a non-standard variant …
A survey of lattice based expressive attribute based encryption
Abstract Attribute Based Encryption (ABE) can be employed to enforce fine grained access
control over encrypted data. Due to expressiveness, ABE schemes are currently employed …
control over encrypted data. Due to expressiveness, ABE schemes are currently employed …
Decentralized multi-authority ABE for DNF s from LWE
We construct the first decentralized multi-authority attribute-based encryption (MA-ABE)
scheme for a non-trivial class of access policies whose security is based (in the random …
scheme for a non-trivial class of access policies whose security is based (in the random …
Registered (inner-product) functional encryption
Registered encryption (Garg et al., TCC'18) is an emerging paradigm that tackles the key-
escrow problem associated with identity-based encryption by replacing the private-key …
escrow problem associated with identity-based encryption by replacing the private-key …
Multi-input attribute based encryption and predicate encryption
Motivated by several new and natural applications, we initiate the study of multi-input
predicate encryption (miPE) and further develop multi-input attribute based encryption …
predicate encryption (miPE) and further develop multi-input attribute based encryption …
Non-interactive zero-knowledge from LPN and MQ
We give the first construction of non-interactive zero-knowledge (NIZK) arguments from post-
quantum assumptions other than Learning with Errors. In particular, we achieve NIZK under …
quantum assumptions other than Learning with Errors. In particular, we achieve NIZK under …
Circuit ABE with -Sized Ciphertexts and Keys from Lattices
H Wee - Annual International Cryptology Conference, 2024 - Springer
We present new lattice-based attribute-based encryption (ABE) and laconic function
evaluation (LFE) schemes for circuits with sublinear ciphertext overhead. For depth d circuits …
evaluation (LFE) schemes for circuits with sublinear ciphertext overhead. For depth d circuits …
How to use (plain) witness encryption: Registered abe, flexible broadcast, and more
Witness encryption is a generalization of public-key encryption where the public key can be
any NP statement x and the associated decryption key is any witness w for x. While early …
any NP statement x and the associated decryption key is any witness w for x. While early …
Distributed broadcast encryption from bilinear groups
Distributed broadcast encryption (DBE) improves on the traditional notion of broadcast
encryption by eliminating the key-escrow problem: In a DBE system, users generate their …
encryption by eliminating the key-escrow problem: In a DBE system, users generate their …