Secure attribute-based systems

M Pirretti, P Traynor, P McDaniel, B Waters - Proceedings of the 13th …, 2006 - dl.acm.org
Attributes define, classify, or annotate the datum to which they are assigned. However,
traditional attribute architectures and cryptosystems are ill-equipped to provide security in …

Multi-dimensional range query over encrypted data

E Shi, J Bethencourt, THH Chan… - … IEEE Symposium on …, 2007 - ieeexplore.ieee.org
We design an encryption scheme called Multi-dimensional Range Query over Encrypted
Data (MRQED), to address the privacy concerns related to the sharing of network audit logs …

Fast and private computation of cardinality of set intersection and union

E De Cristofaro, P Gasti, G Tsudik - International Conference on …, 2012 - Springer
In many everyday scenarios, sensitive information must be shared between parties without
complete mutual trust. Private set operations are particularly useful to enable sharing …

A secure data deduplication scheme for cloud storage

J Stanek, A Sorniotti, E Androulaki, L Kencl - Financial Cryptography and …, 2014 - Springer
As more corporate and private users outsource their data to cloud storage providers, recent
data breach incidents make end-to-end encryption an increasingly prominent requirement …

Structure-aware private set intersection, with applications to fuzzy matching

G Garimella, M Rosulek, J Singh - Annual International Cryptology …, 2022 - Springer
In two-party private set intersection (PSI), Alice holds a set X, Bob holds a set Y, and they
learn (only) the contents of X∩ Y. We introduce structure-aware PSI protocols, which take …

Match me if you can: Matchmaking encryption and its applications

G Ateniese, D Francati, D Nuñez, D Venturi - Advances in Cryptology …, 2019 - Springer
We introduce a new form of encryption that we name matchmaking encryption (ME). Using
ME, sender S and receiver R (each with its own attributes) can both specify policies the other …

Fuzzy identity-based matchmaking encryption and its application

A Wu, W Luo, J Weng, A Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Ateniese et al. introduced the primitive of matchmaking encryption (ME) at CRYPTO 2019
and left open several important questions, which include extending ME to fuzzy cases or …

Privacy, discovery, and authentication for the internet of things

DJ Wu, A Taly, A Shankar, D Boneh - … 26-30, 2016, Proceedings, Part II 21, 2016 - Springer
Automatic service discovery is essential to realizing the full potential of the Internet of Things
(IoT). While discovery protocols like Multicast DNS, Apple AirDrop, and Bluetooth Low …

Privacy-preserving profile matching for proximity-based mobile social networking

R Zhang, J Zhang, Y Zhang, J Sun… - IEEE Journal on …, 2013 - ieeexplore.ieee.org
Proximity-based mobile social networking (PMSN) refers to the social interaction among
physically proximate mobile users. The first step toward effective PMSN is for mobile users to …

Shorter IBE and signatures via asymmetric pairings

J Chen, HW Lim, S Ling, H Wang, H Wee - Pairing-Based Cryptography …, 2013 - Springer
Abstract We present efficient Identity-Based Encryption (IBE) and signature schemes under
the Symmetric External Diffie-Hellman (SXDH) assumption in bilinear groups. In both the IBE …