2016
DOI: 10.1007/978-3-662-53644-5_12
|View full text |Cite
|
Sign up to set email alerts
|

Deniable Attribute Based Encryption for Branching Programs from LWE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 33 publications
0
9
0
Order By: Relevance
“…In this way we achieve (n c , poly) bideniable FE for circuits assuming IND-secure FE for circuits and indistinguishability obfuscation. We remark that in the works of Apon et al [4,5] the notion of sender deniability achieved is multi-distributional. Relation to Simulation-Based Security.…”
Section: Introductionmentioning
confidence: 90%
See 2 more Smart Citations
“…In this way we achieve (n c , poly) bideniable FE for circuits assuming IND-secure FE for circuits and indistinguishability obfuscation. We remark that in the works of Apon et al [4,5] the notion of sender deniability achieved is multi-distributional. Relation to Simulation-Based Security.…”
Section: Introductionmentioning
confidence: 90%
“…The actual construction is more involved, and is presented in full details in Section 4. We point out that in some concurrent works Apon et al [4,5] construct bi-deniable inner-product and attribute-based encryption schemes in the multidistributional model from LWE. Sender deniability for FE from indistinguishability obfuscation.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Authors construct a flexibly bi-deniable Attribute-Based Encryption (ABE) scheme for all polynomial-size branching programs from learning with errors (LWE) [36]. The techniques involve new ways of manipulating Gaussian noise that may be of independent interest, and lead to a significantly sharper analysis of noise growth in Dual Regev type encryption schemes.…”
Section: Attribute-based Encryptionmentioning
confidence: 99%
“…Recent progress on more advanced cryptographic constructions based on lattices, like attribute-based encryption [17] and predicate encryption [34], are closely related to both the structure of the schemes and strategy in the proofs in [1,2,33]. The MP-PKE [45] inspires development in some latticebased constructions, like homomorphic encryption [3] and deniable attribute-based encryption [4].…”
Section: Contributionsmentioning
confidence: 99%