REFERENCES
Agrawal, S. and Yamada, S. (2020). Cp-abe for circuits
(and more) in the symmetric key setting. In Theory of
Cryptography Conference, pages 117–148. Springer.
Albrecht, M. and Davidson, A. (2017). Are graded encod-
ing scheme broken yet.
Attrapadung, N. and Imai, H. (2009). Attribute-based en-
cryption supporting direct/indirect revocation modes.
In IMA international conference on cryptography and
coding, pages 278–300. Springer.
Beimel, A. (2011). Secret-sharing schemes: a survey. In
International conference on coding and cryptology,
pages 11–46. Springer.
Beimel, A. et al. (1996). Secure schemes for secret sharing
and key distribution.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In 2007
IEEE symposium on security and privacy (SP’07),
pages 321–334. IEEE.
Bolocan, D. (2020). Key-policy attribute-based encryption
scheme for general circuits. Proceedings of the Roma-
nian Academy Series A-Mathematics Physics Techni-
cal Sciences Information Science, 21(1):11–19.
Chase, M. (2007). Multi-authority attribute based encryp-
tion. In Theory of Cryptography Conference, pages
515–534. Springer.
Dr
˘
agan, C. C. and T¸ iplea, F. L. (2015). Key-policy attribute-
based encryption for general boolean circuits from se-
cret sharing and multi-linear maps. In International
Conference on Cryptography and Information Secu-
rity in the Balkans, pages 112–133. Springer.
ETSI (2018). Cyber; application of attribute based
encryption (abe) for pii and personal data
protection on iot devices, wlan, cloud and
mobile services - high level requirements.
https://www.etsi.org/deliver/etsi ts/103400 103499/
103458/01.01.01 60/ts 103458v010101p.pdf.
Ezhilarasi, T., Sudheer Kumar, N., Latchoumi, T., and Bal-
ayesu, N. (2021). A secure data sharing using idss
cp-abe in cloud storage. In Advances in Industrial
Automation and Smart Manufacturing, pages 1073–
1085. Springer.
Garg, S., Gentry, C., Halevi, S., Sahai, A., and Waters, B.
(2013). Attribute-based encryption for circuits from
multilinear maps. In Annual Cryptology Conference,
pages 479–499. Springer.
Ghodosi, H., Pieprzyk, J., and Safavi-Naini, R. (1998). Se-
cret sharing in multilevel and compartmented groups.
In Australasian Conference on Information Security
and Privacy, pages 367–378. Springer.
Gorbunov, S., Vaikuntanathan, V., and Wee, H. (2015).
Attribute-based encryption for circuits. Journal of the
ACM (JACM), 62(6):1–33.
Goyal, V., Jain, A., Pandey, O., and Sahai, A. (2008).
Bounded ciphertext policy attribute based encryp-
tion. In International Colloquium on Automata, Lan-
guages, and Programming, pages 579–591. Springer.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In Proceedings of the 13th
ACM conference on Computer and communications
security, pages 89–98.
Green, M., Hohenberger, S., Waters, B., et al. (2011). Out-
sourcing the decryption of abe ciphertexts. In USENIX
security symposium, volume 2011.
Hu, P. and Gao, H. (2017a). Ciphertext-policy attribute-
based encryption for general circuits from bilinear
maps. Wuhan University Journal of Natural Sciences,
22(2):171–177.
Hu, P. and Gao, H. (2017b). A key-policy attribute-based
encryption scheme for general circuit from bilinear
maps. IJ Network Security, 19(5):704–710.
Ionita, A., Banu, D.-A., and Oleniuc, I. (2023). Heuris-
tics optimization of boolean circuits with application
in attribute based encryption.
Kowalczyk, L. and Wee, H. (2019). Compact adaptively se-
cure abe for nc
1
from k-lin. In Annual International
Conference on the Theory and Applications of Cryp-
tographic Techniques, pages 3–33. Springer.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based
encryption. In Annual International Conference on
the Theory and Applications of Cryptographic Tech-
niques, pages 457–473. Springer.
Steinfeld, R., Sakzad, A., and Zhao, R. K. (2019). Practi-
cal mp-lwe-based encryption balancing security-risk
vs. efficiency. Cryptology ePrint Archive, Report
2019/1179. https://eprint.iacr.org/2019/1179.
T¸ iplea, F. L. and Dr
˘
agan, C. C. (2014). Key-policy attribute-
based encryption for boolean circuits from bilinear
maps. In International Conference on Cryptography
and Information Security in the Balkans, pages 175–
193. Springer.
Tiplea, F. L., Ionita, A., and Nica, A. (2020). Practically ef-
ficient attribute-based encryption for compartmented
access structures. In Samarati, P., di Vimercati, S.
D. C., Obaidat, M. S., and Ben-Othman, J., editors,
Proceedings of the 17th International Joint Confer-
ence on e-Business and Telecommunications, ICETE
2020 - Volume 2: SECRYPT, Lieusaint, Paris, France,
July 8-10, 2020, pages 201–212. ScitePress.
Touati, L. and Challal, Y. (2016). Collaborative kp-abe for
cloud-based internet of things applications. In 2016
IEEE International Conference on Communications
(ICC), pages 1–7. IEEE.
Waters, B. (2011). Ciphertext-policy attribute-based en-
cryption: An expressive, efficient, and provably se-
cure realization. In International Workshop on Public
Key Cryptography, pages 53–70. Springer.
Zhong, H., Zhu, W., Xu, Y., and Cui, J. (2018). Multi-
authority attribute-based encryption access control
scheme with policy hidden for cloud storage. Soft
Computing, 22(1):243–251.
T
,
iplea, F. L. (2018). Multi-linear maps in cryptography.
In Conference on Mathematical Foundations of Infor-
matics, pages 241–258.
SECRYPT 2023 - 20th International Conference on Security and Cryptography
240