Indistinguishability obfuscation from well-founded assumptions

A Jain, H Lin, A Sahai - Proceedings of the 53rd annual ACM SIGACT …, 2021 - dl.acm.org
Indistinguishability obfuscation, introduced by [Barak et. al. Crypto 2001], aims to compile
programs into unintelligible ones while preserving functionality. It is a fascinating and …

Improved dual system ABE in prime-order groups via predicate encodings

J Chen, R Gay, H Wee - Annual International Conference on the Theory …, 2015 - Springer
We present a modular framework for the design of efficient adaptively secure attribute-based
encryption (ABE) schemes for a large class of predicates under the standard k-Lin …

Practical functional encryption for quadratic functions with applications to predicate encryption

CEZ Baltico, D Catalano, D Fiore, R Gay - Annual International Cryptology …, 2017 - Springer
We present two practically efficient functional encryption schemes for a large class of
quadratic functionalities. Specifically, our constructions enable the computation of so-called …

Fully,(almost) tightly secure IBE and dual system groups

J Chen, H Wee - Annual Cryptology Conference, 2013 - Springer
We present the first fully secure Identity-Based Encryption scheme (IBE) from the standard
assumptions where the security loss depends only on the security parameter and is …

Shorter quasi-adaptive NIZK proofs for linear subspaces

CS Jutla, A Roy - Journal of Cryptology, 2017 - Springer
We define a novel notion of quasi-adaptive non-interactive zero-knowledge (NIZK) proofs for
probability distributions on parameterized languages. It is quasi-adaptive in the sense that …

Identity-based matchmaking encryption from standard assumptions

J Chen, Y Li, J Wen, J Weng - International Conference on the Theory and …, 2022 - Springer
In this work, we propose the first identity-based matchmaking encryption (IB-ME) scheme
under the standard assumptions in the standard model. This scheme is proven to be secure …

Algebraic MACs and keyed-verification anonymous credentials

M Chase, S Meiklejohn, G Zaverucha - Proceedings of the 2014 acm …, 2014 - dl.acm.org
We consider the problem of constructing anonymous credentials for use in a setting where
the issuer of credentials is also the verifier, or more generally where the issuer and verifier …

Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares

B Libert, M Joye, M Yung - Proceedings of the 2014 ACM symposium on …, 2014 - dl.acm.org
Threshold cryptography is a fundamental distributed computational paradigm for enhancing
the availability and the security of cryptographic public-key schemes. It does it by dividing …

A practical and efficient bidirectional access control scheme for cloud-edge data sharing

J Cui, B Li, H Zhong, G Min, Y Xu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The cloud computing paradigm provides numerous tempting advantages, enabling users to
store and share their data conveniently. However, users are naturally resistant to directly …

Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques

S Yamada - Advances in Cryptology–CRYPTO 2017: 37th Annual …, 2017 - Springer
In this paper, we focus on the constructions of adaptively secure identity-based encryption
(IBE) from lattices and verifiable random function (VRF) with large input spaces. Existing …