Skip to main content

Questions tagged [abe]

Attribute-Based Encryption is a type of public-key encryption in which the key used for encryption is based on selected attributes of the readers. Decryption of the ciphertext is possible only if the set of attributes of the user includes all the attributes used to encrypt the ciphertext.

2 votes
1 answer
106 views

I have recently been reading "Constrained Pseudorandom Functions" by Boneh and Waters, and "Constrained Verifiable Random Functions" by Fuchsbauer. One of the claimed results is ...
Franklin Harding's user avatar
3 votes
1 answer
162 views

The following definitions are from Fuzzy Identity-based Encryption by Sahai and Waters (Eurocrypt 2005, Eprint). Definition 2 (Decisional Bilinear Diffie-Hellman (BDH) Assumption). Suppose a ...
Ky Phan Quoc's user avatar
4 votes
1 answer
109 views

I am performing some tests using the Palisade CP-ABE library, that is based on RLWE. The theoretical details are presented here. The library offers predefined security levels for the encryption, that ...
salbh's user avatar
  • 43
2 votes
0 answers
79 views

I'm reading page 16 of [BGG+'Eurocrypt2014, Section 4]. The ABE in this paper is one of the best lattice-based ABE scheme so far and the techniques used in it inspired other cryptographic primitives ...
user1035648's user avatar
3 votes
1 answer
90 views

In advanced primitives like circuit (policy) ABE [BGG+'Eurocrypt2014] or IPFE [ACGU'Asiacrypt2020, appedix A] based on lattices, parameters setting is quite puzzling and vague (for me). (Parameter ...
user1035648's user avatar
2 votes
0 answers
92 views

It seems that in most Attribute Based Encryption schemes, the keygen algorithm is probabilistic, which means that given the same public key, master secret key and attribute set (or access structure), ...
CHG's user avatar
  • 31
2 votes
1 answer
142 views

If we have a scheme for inner product predicate encryption (IPPE), then can we claim that we already have designed an attribute based encryption (ABE) scheme; So we do not need to design an ABE again. ...
user1035648's user avatar
1 vote
1 answer
133 views

In the preliminaries section of a paper$^\color{magenta}{\star}$ on lattice-based cryptography, the matrix norm $\| \cdot \|_{2}$ is used. Why do we define such norm? What's the purpose of defining ...
user1035648's user avatar
3 votes
1 answer
248 views

The general question is: Why are ABE schemes usually/sometimes proven in the selective-set of attributes model of security? Or even co-selective (both attributes and policy function)? Is it just ...
user1035648's user avatar
2 votes
1 answer
158 views

I rent a room in a building. There are also 9 others who rent other rooms in this building. Just like everyone else who rents a room I only have one key of this building. With my key I can open the ...
Quinten C's user avatar
  • 123
0 votes
0 answers
34 views

In Boneh et. al.'s ABE scheme (https://eprint.iacr.org/2013/669.pdf, https://link.springer.com/content/pdf/10.1007/978-3-642-55220-5_30.pdf), the result value for the arithmetic function is selected ...
Mahdi Mahdavi's user avatar
1 vote
1 answer
105 views

In the paper about ABE (like this), the access structure is defined as follow: Let ${P_1,P_2,...,P_n}$ be a set of parties. A collection $A⊆2^{\{P_1,P_2,...,P_n\}}$ is monotone if $∀B,C$: if $B∈A$ ...
Z. Chen's user avatar
  • 185
2 votes
1 answer
164 views

I've looked around but can't find any discussion on using both CP-ABE and KP-ABE by simply wrapping one with the other. It seems like you'd be able to get more fine grained access control with a ...
Zachary Whitley's user avatar
2 votes
1 answer
181 views

In Key Policy Attribute-based encryption if we need a targeted broadcast where the set of attributes are the same for a group of users. It means they all share the same secret key right? Or is it that ...
Crypto_Research's user avatar
1 vote
1 answer
122 views

Adaptive model: the attacker can adaptively query the challenger for private keys. The challenge message need not be revealed at the start of the security game Selective model: the attacker has to ...
Crypto_Research's user avatar

15 30 50 per page
1
2 3 4 5
7