FAME: Fast attribute-based message encryption

S Agrawal, M Chase - Proceedings of the 2017 ACM SIGSAC …, 2017 - dl.acm.org
Time and again, attribute-based encryption has been shown to be the natural cryptographic
tool for building various types of conditional access systems with far-reaching applications …

How to obfuscate programs directly

J Zimmerman - Annual International Conference on the Theory and …, 2015 - Springer
We propose a new way to obfuscate programs, via composite-order multilinear maps. Our
construction operates directly on straight-line programs (arithmetic circuits), rather than …

Dual system encryption framework in prime-order groups via computational pair encodings

N Attrapadung - Advances in Cryptology–ASIACRYPT 2016: 22nd …, 2016 - Springer
We propose a new generic framework for achieving fully secure attribute based encryption
(ABE) in prime-order bilinear groups. Previous generic frameworks by Wee (TCC'14) and …

The kernel matrix Diffie-Hellman assumption

P Morillo, C Ràfols, JL Villar - International Conference on the Theory and …, 2016 - Springer
We put forward a new family of computational assumptions, the Kernel Matrix Diffie-Hellman
Assumption. Given some matrix A sampled from some distribution D, the kernel assumption …

A study of pair encodings: predicate encryption in prime order groups

S Agrawal, M Chase - … : 13th International Conference, TCC 2016-A, Tel …, 2016 - Springer
Pair encodings and predicate encodings, recently introduced by Attrapadung [2] and Wee
[36] respectively, greatly simplify the process of designing and analyzing predicate and …

Simplifying design and analysis of complex predicate encryption schemes

S Agrawal, M Chase - Advances in Cryptology–EUROCRYPT 2017: 36th …, 2017 - Springer
Abstract Wee (TCC'14) and Attrapadung (Eurocrypt'14) introduced predicate and pair
encodings, respectively, as a simple way to construct and analyze attribute-based …

A framework for identity-based encryption with almost tight security

N Attrapadung, G Hanaoka, S Yamada - … on the Theory and Application of …, 2015 - Springer
We show a framework for constructing identity-based encryption (IBE) schemes that are
(almost) tightly secure in the multi-challenge and multi-instance setting. In particular, we …

Efficient two-level homomorphic encryption in prime-order bilinear groups and a fast implementation in webassembly

N Attrapadung, G Hanaoka, S Mitsunari… - Proceedings of the …, 2018 - dl.acm.org
We construct an efficient two-level homomorphic public-key encryption in prime-order
bilinear groups. Such a scheme supports polynomially many homomorphic additions and …

[KNJIGA][B] Advances in Cryptology–EUROCRYPT 2015: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia …

E Oswald, M Fischlin - 2015 - books.google.com
The two-volume proceedings LNCS 9056+ 9057 constitutes the proceedings of the 34th
Annual International Conference on the Theory and Applications of Cryptographic …

BBA+ Improving the Security and Applicability of Privacy-Preserving Point Collection

G Hartung, M Hoffmann, M Nagel, A Rupp - Proceedings of the 2017 …, 2017 - dl.acm.org
Black-box accumulation (BBA) has recently been introduced as a building-block for a variety
of user-centric protocols such as loyalty, refund, and incentive systems. Loosely speaking …