Constant-size structure-preserving signatures: Generic constructions and simple assumptions
This paper presents efficient structure-preserving signature schemes based on simple
assumptions such as decisional linear. We first give two general frameworks for constructing …
assumptions such as decisional linear. We first give two general frameworks for constructing …
Shorter IBE and signatures via asymmetric pairings
Abstract We present efficient Identity-Based Encryption (IBE) and signature schemes under
the Symmetric External Diffie-Hellman (SXDH) assumption in bilinear groups. In both the IBE …
the Symmetric External Diffie-Hellman (SXDH) assumption in bilinear groups. In both the IBE …
ABE squared: accurately benchmarking efficiency of attribute-based encryption
Measuring efficiency is difficult. In the last decades, several works have contributed in the
quest to successfully determine and compare the efficiency of pairing-based attribute-based …
quest to successfully determine and compare the efficiency of pairing-based attribute-based …
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
Revoking corrupted users is a desirable functionality for cryptosystems. Since Boldyreva,
Goyal, and Kumar (ACM CCS 2008) proposed a notable result for scalable revocation …
Goyal, and Kumar (ACM CCS 2008) proposed a notable result for scalable revocation …
Software implementation of an attribute-based encryption scheme
E Zavattoni, LJD Perez, S Mitsunari… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
A ciphertext-policy attribute-based encryption protocol uses bilinear pairings to provide
control access mechanisms, where the set of user's attributes is specified by means of a …
control access mechanisms, where the set of user's attributes is specified by means of a …
Dual System Groups and its Applications---Compact HIBE and More
We introduce the notion of* dual system groups*.-We show how to derive compact HIBE by
instantiating the dual system framework in Waters (Crypto'09) and Lewko and Waters …
instantiating the dual system framework in Waters (Crypto'09) and Lewko and Waters …
Déjà Q: Using Dual Systems to Revisit q-Type Assumptions
M Chase, S Meiklejohn - … in Cryptology–EUROCRYPT 2014: 33rd Annual …, 2014 - Springer
After more than a decade of usage, bilinear groups have established their place in the
cryptographic canon by enabling the construction of many advanced cryptographic …
cryptographic canon by enabling the construction of many advanced cryptographic …
Converting cryptographic schemes from symmetric to asymmetric bilinear groups
M Abe, J Groth, M Ohkubo, T Tango - … , Santa Barbara, CA, USA, August 17 …, 2014 - Springer
We propose a method to convert schemes designed over symmetric bilinear groups into
schemes over asymmetric bilinear groups. The conversion assigns variables to one or both …
schemes over asymmetric bilinear groups. The conversion assigns variables to one or both …
Extended nested dual system groups, revisited
The notion of extended nested dual system groups (ENDSG) was recently proposed by
Hofheinz et al.[PKC 2015] for constructing almost-tight identity based encryptions (IBE) in the …
Hofheinz et al.[PKC 2015] for constructing almost-tight identity based encryptions (IBE) in the …
Automating fast and secure translations from type-i to type-iii pairing schemes
Pairing-based cryptography has exploded over the last decade, as this algebraic setting
offers good functionality and efficiency. However, there is a huge security gap between how …
offers good functionality and efficiency. However, there is a huge security gap between how …