Constant-size structure-preserving signatures: Generic constructions and simple assumptions

M Abe, M Chase, B David, M Kohlweiss… - Journal of …, 2016 - Springer
This paper presents efficient structure-preserving signature schemes based on simple
assumptions such as decisional linear. We first give two general frameworks for constructing …

Structure-preserving signatures and commitments to group elements

M Abe, G Fuchsbauer, J Groth, K Haralambiev… - Journal of …, 2016 - Springer
A modular approach to constructing cryptographic protocols leads to simple designs but
often inefficient instantiations. On the other hand, ad hoc constructions may yield efficient …

Structure-preserving chosen-ciphertext security with shorter verifiable ciphertexts

B Libert, T Peters, C Qian - IACR International Workshop on Public Key …, 2017 - Springer
Abstract Structure-preserving cryptography is a world where messages, signatures,
ciphertexts and public keys are entirely made of elements of a group over which a bilinear …

Adaptive oblivious transfer with access control from lattice assumptions

B Libert, S Ling, F Mouhartem, K Nguyen… - Advances in Cryptology …, 2017 - Springer
Adaptive oblivious transfer (OT) is a protocol where a sender initially commits to a database
{M_i\} _ i= 1^ NM ii= 1 N. Then, a receiver can query the sender up to k times with private …

Blind attribute-based encryption and oblivious transfer with fine-grained access control

A Rial - Designs, Codes and Cryptography, 2016 - Springer
We propose two constructions of oblivious transfer with access control (OTAC), ie, oblivious
transfer schemes in which a receiver can obtain a message only if her attributes, which are …

Adaptive oblivious transfer with access control from lattice assumptions

B Libert, S Ling, F Mouhartem, K Nguyen… - Theoretical Computer …, 2021 - Elsevier
Adaptive oblivious transfer (OT) is a protocol where a sender initially commits to a database
{M i} i= 1 N. Then, a receiver can query the sender up to k times with private indexes ρ 1 …

Unlinkable updatable databases and oblivious transfer with access control

A Damodaran, A Rial - … Conference on Information Security and Privacy, 2020 - Springer
An oblivious transfer with access control protocol (OTAC) allows us to protect privacy of
accesses to a database while enforcing access control policies. Existing OTAC have several …

Universally composable issuer‐free adaptive oblivious transfer with access policy

V Guleria, R Dutta - Security and Communication Networks, 2015 - Wiley Online Library
In today's Internet world, security, privacy and efficiency are three prime concerns in
designing any cryptographic protocol. Adaptive oblivious transfer with access policy (AOT …

Pirmission: Single-server PIR with Access Control

A Beams, S Angel - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Databases often require the flexibility to control which entities can access specific database
records. Such access control is absent in works that provide private access to databases …

UC updatable databases and applications

A Damodaran, A Rial - International Conference on Cryptology in Africa, 2020 - Springer
We define an ideal functionality F _ UD and a construction Π _ UD for an updatable
database (UD). UD is a two-party protocol between an updater and a reader. The updater …