Simple Functional Encryption Schemes for Inner Products, PKC 2015, pp.733-751, 2015. ,
DOI : 10.1007/978-3-662-46447-2_33
URL : https://hal.archives-ouvertes.fr/hal-01108287
Functional Encryption for Inner Product Predicates from Learning with Errors, Asiacrypt 2011, pp.21-40, 2011. ,
DOI : 10.1007/978-3-642-25385-0_2
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Crypto 2016 Cryptology ePrint Archive, 2015. ,
DOI : 10.1007/978-3-662-49890-3_21
URL : https://hal.archives-ouvertes.fr/hal-01228559
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation, PKC 2010, pp.384-402, 2010. ,
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts, PKC 2011, pp.90-108, 2011. ,
DOI : 10.1007/978-3-642-19379-8_6
Identity-Based Encryption Secure against Selective Opening Attack, TCC 2011, pp.235-252, 2011. ,
DOI : 10.1007/978-3-642-19571-6_15
Function-Hiding Inner Product Encryption, Asiacrypt'15, pp.470-491, 2015. ,
DOI : 10.1007/978-3-662-48797-6_20
Short Signatures Without Random Oracles, Eurocrypt'04, pp.56-73, 2004. ,
DOI : 10.1007/978-3-540-24676-3_4
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles, Eurocrypt'04, pp.223-238, 2004. ,
DOI : 10.1007/978-3-540-24676-3_14
Short Group Signatures, Crypto'04, pp.41-55, 2004. ,
DOI : 10.1007/978-3-540-28628-8_3
Hierarchical Identity Based Encryption with Constant Size Ciphertext, Eurocrypt'05, pp.440-456, 2005. ,
DOI : 10.1007/11426639_26
Evaluating 2-DNF Formulas on Ciphertexts, TCC'05, pp.325-341, 2005. ,
DOI : 10.1007/978-3-540-30576-7_18
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, Crypto'05, pp.258-275, 2005. ,
DOI : 10.1007/11535218_16
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials, PKC'09, pp.481-500, 2009. ,
DOI : 10.1007/978-3-642-00468-1_27
Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases, Cryptology ePrint Archive, 2011. ,
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings, Eurocrypt 2015 LNCS 9057, pp.595-624 ,
DOI : 10.1007/978-3-662-46803-6_20
URL : https://hal.archives-ouvertes.fr/hal-01220358
D??j?? Q: Using Dual Systems to Revisit q-Type Assumptions, Eurocrypt 2014, pp.622-639, 2002. ,
DOI : 10.1007/978-3-642-55220-5_34
Security Analysis of the Strong Diffie-Hellman Problem, Eurocrypt'06, pp.1-11, 2006. ,
DOI : 10.1007/11761679_1
Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys, Asiacrypt 2007, pp.200-215, 2007. ,
DOI : 10.1007/978-3-540-76900-2_12
A Verifiable Random Function with Short Proofs and Keys, PKC 2005, pp.416-431, 2005. ,
DOI : 10.1007/978-3-540-30580-4_28
Attribute-based encryption for fine-grained access control of encrypted data, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, pp.89-98, 2006. ,
DOI : 10.1145/1180405.1180418
Blockwise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes, IMACC 2011, pp.431-450, 2011. ,
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products, Eurocrypt'08, pp.146-162 ,
Revocation Systems with Very Small Private Keys, 2010 IEEE Symposium on Security and Privacy, pp.273-285, 2010. ,
DOI : 10.1109/SP.2010.23
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption, Eurocrypt 2010, pp.62-91, 2010. ,
DOI : 10.1007/978-3-642-13190-5_4
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts, TCC 2010, 2010. ,
DOI : 10.1007/978-3-540-78967-3_9
Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions (Full Version) Available from https, ICALP 2016, 2016. ,
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs, TCC 2010, pp.499-517, 2010. ,
DOI : 10.1007/11426639_7
On Cryptographic Assumptions and Challenges, Crypto'03, pp.96-109, 2003. ,
DOI : 10.1007/978-3-540-45146-4_6
Efficient Trace and Revoke Schemes, In Financial Cryptography LNCS, pp.1-20, 1962. ,
Hierarchical Predicate Encryption for Inner-Products, Asiacrypt'09, pp.214-231, 2009. ,
DOI : 10.1007/978-3-642-10366-7_13
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption, Crypto'10, pp.191-208, 2010. ,
DOI : 10.1007/978-3-642-14623-7_11
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption, Euro- crypt'12, pp.591-608, 2012. ,
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption, Asi- acrypt'12, pp.349-366, 2012. ,
DOI : 10.1007/978-3-642-34961-4_22
Achieving short ciphertexts or short secret-keys for adaptively secure general innerproduct encryption. Designs, Codes and Cryptography 77, pp.2-3, 2015. ,
Fuzzy Identity-Based Encryption, Eurocrypt'05, pp.457-473, 2005. ,
DOI : 10.1007/11426639_27
Predicate Privacy in Encryption Systems, TCC'09, pp.457-473, 2009. ,
DOI : 10.1007/978-3-642-00457-5_27
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions, CRYPTO 2009, pp.619-636, 2009. ,
DOI : 10.1007/978-3-642-03356-8_36
Threshold and Revocation Cryptosystems via Extractable Hash Proofs, Eurocrypt 2011, pp.589-609, 2011. ,
DOI : 10.1007/978-3-642-20465-4_32
Dual System Encryption via Predicate Encodings, TCC 2014, pp.616-637, 2014. ,
DOI : 10.1007/978-3-642-54242-8_26
URL : https://hal.archives-ouvertes.fr/hal-01094703
A Framework and Compact Constructions for Nonmonotonic Attribute-Based Encryption, PKC 2014, pp.275-292, 2016. ,