Wee, "Attribute-based encryp- tion for circuits," J. ACM, vol. 62, no. 6, pp. 45:1-45:33, 2015.Sergey Gorbunov, Vinod Vaikuntanathan, and Hoeteck Wee. Attribute-based encryption for circuits. In STOC, pages 545-554, 2013.
Cannot distinguish between obfuscations of two input/output equivalent circuits • a (b+c) vs. ab + ac 7 Vision: IO as hub for cryptography Indistinguishabilty Obfuscation Standard Assumption (e.g. LWE) “Most” of cryptography This talk + OWFs How do we build public key encryption from...
However, in the traditional PRE systems, the communication model is one-to-one (i.e., one delegator to one delegatee), which means that a message can be re-encrypted for only a single public key. This limits their utility in many applications, where the re-encryption may be used for ...
Hierarchical ABE also allows for proxy re-encryption, but it forces a fixed structure for the access policies, limiting the flexibility of the access control system. In [18], Sedaghat et al. presented a decryption outsourceable Ciphertext-Policy Attribute-Based Signcryption (CP-ABSC) construction...
Boneh D, Gentry C, Gorbunov S, Halevi S, Nikolaenko V, Segev G, Vaikuntanathan V, Vinayagamurthy D (2014) Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. In: Nguyen P, Oswald E (eds) Advances in cryptology - EUROCRYPT 2014. Springer, Berlin/Heidelbe...
B. Waters, Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions, in Halevi, S. (ed.)CRYPTO 2009 Download references Acknowledgements We would like to thank the anonymous reviewers for their valuable comments on a previous version of this paper. Parts of Yuyu Wang...
Examples of such service operations include firewall operations, load balancing operations, intrusion detection operations, intrusion prevention operations, encryption operations, and other types of middlebox operations.As mentioned above, the first and second sets of attributes collected by the context-...
GGH+13c] Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 479–499. Springer, Heidelberg (2013)...
ABE for circuitsLWELattice-based cryptographyAttribute-based encryption (ABE) is a standard method for achieving access control using cryptography, and is related to many other powerful primitives such as functional encryption. While classical pairing based ABE schemes support only boolean formulas as ...
Attribute- based encryption for circuits from multilinear maps. In Ran Canetti and Juan A. Garay, editors, CRYPTO II, volume 8043 of LNCS, pages 479-499. Springer, 2013.Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear...