Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication

@inproceedings{Yamada2012VerifiablePE,
  title={Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication},
  author={Shota Yamada and Nuttapong Attrapadung and Bagus Santoso and Jacob C. N. Schuldt and Goichiro Hanaoka and Noboru Kunihiro},
  booktitle={Public Key Cryptography},
  year={2012}
}
In this paper, we focus on verifiability of predicate encryption. A verifiable predicate encryption scheme guarantees that all legitimate receivers of a ciphertext will obtain the same message upon decryption. While verifiability of predicate encryption might be a desirable property by itself, we furthermore show that this property enables interesting applications. Specifically, we provide two applications of verifiable predicate encryption. Firstly, we show that for a large class of verifiable… CONTINUE READING
Recent Discussions
This paper has been referenced on Twitter 3 times over the past 90 days. VIEW TWEETS

From This Paper

Figures, tables, and topics from this paper.
10 Citations
36 References
Similar Papers

Citations

Publications citing this paper.
Showing 1-10 of 10 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 36 references

New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts

  • A. Lewko, B.Waters
  • In TCC’10, LNCS 5978,
  • 2010
Highly Influential
1 Excerpt

Similar Papers

Loading similar papers…