2019
DOI: 10.1007/978-3-030-17259-6_4
|View full text |Cite
|
Sign up to set email alerts
|

FE for Inner Products and Its Application to Decentralized ABE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 43 publications
0
8
0
Order By: Relevance
“…The scheme of [4] suffers from similar issues while it is only selectively-secure. In [39], authors tried to improve the standard deviation of error term (by using re-randomization technique of [24] instead of using multi-hint extended LWE assumption), but the size of the public key still grows quadratically w.r.t the length of the message and the LWE-parameter n. RLWE. The Ring-LWE (RLWE) problem, introduced by Lyubashevsky et al [28], is the problem of distinguishing between two distributions in a special ring of polynomials R q :…”
Section: Security Of Fe Indistinguishability (Ind)mentioning
confidence: 99%
“…The scheme of [4] suffers from similar issues while it is only selectively-secure. In [39], authors tried to improve the standard deviation of error term (by using re-randomization technique of [24] instead of using multi-hint extended LWE assumption), but the size of the public key still grows quadratically w.r.t the length of the message and the LWE-parameter n. RLWE. The Ring-LWE (RLWE) problem, introduced by Lyubashevsky et al [28], is the problem of distinguishing between two distributions in a special ring of polynomials R q :…”
Section: Security Of Fe Indistinguishability (Ind)mentioning
confidence: 99%
“…Multiple variants of LWE such as ring LWE [204], module LWE [188], cyclic LWE [150], continuous LWE [77], PRIM LWE [278], middle-product LWE [267], group LWE [127], entropic LWE [76], universal LWE [315], and polynomial-ring LWE [288] have been developed since 2010. Many cryptosystems rely on the hardness of LWE, including (identity-based, leakage-resilient, fully homomorphic, functional, publickey/key-encapsulation, updatable, attribute-based, inner product, predicate) encryption [28,176,306,265,138,12,204,6,74,143,96,44,59,60,61,71,120,63,199,200,49,212,53,275,125,264,171,145], oblivious transfer [247,70,260], (blind) signatures [138,202,268,203,20,…”
Section: Learning With Errorsmentioning
confidence: 99%
“…Zhang et al [20] presented a shorter MA-ABE where a ciphertext can be decrypted with a constant number of pairing operations. Wang et al [21] constructed a MA-ABE scheme from the LWE assumption. More recently, Xiong et al [22] presented a revocable MA-ABE with outsourced decryption.…”
Section: Introductionmentioning
confidence: 99%