Sciweavers

2108 search results - page 2 / 422
» Encrypted
Sort
View
EUROCRYPT
2010
Springer
14 years 3 months ago
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based encryption (ABE) scheme. Previous constructions of AB...
Allison B. Lewko, Tatsuaki Okamoto, Amit Sahai, Ka...
CRYPTO
2010
Springer
195views Cryptology» more  CRYPTO 2010»
13 years 12 months ago
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
This paper presents a fully secure functional encryption scheme for a wide class of relations, that are specified by non-monotone access structures combined with inner-product rel...
Tatsuaki Okamoto, Katsuyuki Takashima
IJNSEC
2007
109views more  IJNSEC 2007»
13 years 10 months ago
Related-Mode Attacks on CTR Encryption Mode
In this paper, we discuss using CTR mode, another standard encryption mode, to attack other standard encryption modes and using other standard encryption modes to attack CTR mode ...
Dayin Wang, Dongdai Lin, Wenling Wu
IJDE
2002
82views more  IJDE 2002»
13 years 10 months ago
Practical Approaches to Recovering Encrypted Digital Evidence
As more criminals use encryption to conceal incriminating evidence, forensic examiners require practical methods for recovering some or all of the encrypted data. This paper prese...
Eoghan Casey
ASIACRYPT
2009
Springer
14 years 5 months ago
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations
Abstract. Predicate encryption is a recent generalization of identitybased encryption (IBE), broadcast encryption, attribute-based encryption, and more. A natural question is wheth...
Jonathan Katz, Arkady Yerukhimovich