{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T04:51:37Z","timestamp":1768452697132,"version":"3.49.0"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031683817","type":"print"},{"value":"9783031683824","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-68382-4_5","type":"book-chapter","created":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T09:02:41Z","timestamp":1723712561000},"page":"143-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Reducing the\u00a0CRS Size in\u00a0Registered ABE Systems"],"prefix":"10.1007","author":[{"given":"Rachit","family":"Garg","sequence":"first","affiliation":[]},{"given":"George","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Brent","family":"Waters","sequence":"additional","affiliation":[]},{"given":"David J.","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,8,16]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Attrapadung, N.: Dual system encryption via doubly selective security: framework, fully secure functional encryption for regular languages, and more. In: EUROCRYPT (2014)","DOI":"10.1007\/978-3-642-55220-5_31"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Behrend, F.: On sets of integers which contain no three terms in arithmetical progression. Proc. Nat. Acad. Sci. 32(12), 331\u2013332 (1946)","DOI":"10.1073\/pnas.32.12.331"},{"key":"5_CR3","unstructured":"Beimel, A.: Secure Schemes for Secret Sharing and Key Distribution. PhD thesis, Technion (1996)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X.: Efficient selective-id secure identity-based encryption without random oracles. In: EUROCRYPT, pp. 223\u2013238 (2004)","DOI":"10.1007\/978-3-540-24676-3_14"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical identity based encryption with constant size ciphertext. In: EUROCRYPT (2005)","DOI":"10.1007\/11426639_26"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: CRYPTO (2005)","DOI":"10.1007\/11535218_16"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: TCC (2005)","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., Zhandry, M.: Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In: CRYPTO (2014)","DOI":"10.1007\/978-3-662-44371-2_27"},{"key":"5_CR9","unstructured":"Bowe, S., Gabizon, A., Miers, I.: Scalable multi-party computation for zk-SNARK parameters in the random beacon model. IACR Cryptol. ePrint Arch, pp. 1050 (2017)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Boyen, X.: The uber-assumption family: a unified complexity framework for bilinear groups. In: International Conference on Pairing-Based Cryptography, pp. 39\u201356 (2008)","DOI":"10.1007\/978-3-540-85538-5_3"},{"key":"5_CR11","unstructured":"Branco, P., Lai, R.W.F., Maitra, M., Malavolta, G., Rahimi, A., Woo, I.K.Y.: Traitor tracing without trusted authority from registered functional encryption. IACR Cryptol. ePrint Arch. (2024)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Catalano, D., Fiore, D.: Vector commitments and their applications. In: PKC (2013)","DOI":"10.1007\/978-3-642-36362-7_5"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Chen, J., Gay, R., Wee, H.: Improved dual system ABE in prime-order groups via predicate encodings. In: EUROCRYPT (2015)","DOI":"10.1007\/978-3-662-46803-6_20"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Cong, K., Eldefrawy, K., Smart, N.P.: Optimizing registration based encryption. In: IMACC (2021)","DOI":"10.1007\/978-3-030-92641-0_7"},{"key":"5_CR15","unstructured":"Datta, P., Pal, T.: Registration-based functional encryption. IACR Cryptol. ePrint Arch., pp. 457 (2023)"},{"key":"5_CR16","unstructured":"Datta, P., Pal, T., Yamada, S.: Registered FE beyond predicates:(attribute-based) linear functions and more. Cryptology ePrint Archive (2023)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"D\u00f6ttling, N., Kolonelos, D., Lai, R.W.F., Lin, C., Malavolta, G., Rahimi, A.: Efficient laconic cryptography from learning with errors. In: EUROCRYPT, pp. 417\u2013446 (2023)","DOI":"10.1007\/978-3-031-30620-4_14"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Elkin, M.: An improved construction of progression-free sets. In: SODA (2010)","DOI":"10.1137\/1.9781611973075.72"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Erd\u00f6s, P., Tur\u00e1n, P.: On some sequences of integers. J. London Math. Soc. 1(4), 261\u2013264 (1936)","DOI":"10.1112\/jlms\/s1-11.4.261"},{"key":"5_CR20","volume-title":"and Paola de Perthuis","author":"D Fiore","year":"2023","unstructured":"Fiore, D., Kolonelos, D.: and Paola de Perthuis. Registration-based encryption and key-value map commitments for large spaces. In ASIACRYPT, Cuckoo commitments (2023)"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Francati, D., Friolo, D., Maitra, M., Malavolta, G., Rahimi, A., Venturi, D.: Registered (inner-product) functional encryption. In: ASIACRYPT, pp. 98\u2013133 (2023)","DOI":"10.1007\/978-981-99-8733-7_4"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Freitag, C., Waters, B., Wu, D.J.: How to use (plain) witness encryption: Registered ABE, flexible broadcast, and more. In: CRYPTO, pp. 498\u2013531 (2023)","DOI":"10.1007\/978-3-031-38551-3_16"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Garg, R., Lu, G., Waters, B., Wu, D.J.: Realizing flexible broadcast encryption: how to broadcast to a public-key directory. In: ACM CCS, pp. 1093\u20131107 (2023)","DOI":"10.1145\/3576915.3623168"},{"key":"5_CR24","unstructured":"Garg, R., Lu, G., Waters, B., Wu, D.J.: Reducing the CRS size in registered ABE systems. IACR Cryptol. ePrint Arch. (2024). https:\/\/eprint.iacr.org\/2024\/749.pdf"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Garg, S., Hajiabadi, M., Mahmoody, M., Rahimi, A.: Registration-based encryption: Removing private-key generator from IBE. In: TCC (2018)","DOI":"10.1007\/978-3-030-03807-6_25"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Garg, S., Hajiabadi, M., Mahmoody, M., Rahimi, A., Sekar, S.: Registration-based encryption from standard assumptions. In: PKC (2019)","DOI":"10.1007\/978-3-030-17259-6_3"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Glaeser, N., Kolonelos, D., Malavolta, G., Rahimi, A.: Efficient registration-based encryption. IACR Cryptol. ePrint Arch. (2022)","DOI":"10.1145\/3576915.3616596"},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Goyal, R., Vusirikala, S.: Verifiable registration-based encryption. In: CRYPTO (2020)","DOI":"10.1007\/978-3-030-56784-2_21"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Hohenberger, S., Lu, G., Waters, B., Wu, D.J.: Registered attribute-based encryption. In: EUROCRYPT (2023)","DOI":"10.1007\/978-3-031-30620-4_17"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Kalai, Y., Lombardi, A., Vaikuntanathan, V., Wichs, D.: Boosting batch arguments and RAM delegation. In: STOC, pp. 1545\u20131552 (2023)","DOI":"10.1145\/3564246.3585200"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Kalai, Y.T., Paneth, O., Yang, L.: How to delegate computations publicly. In: STOC, pp. 1115\u20131124 (2019)","DOI":"10.1145\/3313276.3316411"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Kolonelos, D., Malavolta, G., Wee, H.: Distributed broadcast encryption from bilinear groups. In: ASIACRYPT, pp. 407\u2013441 (2023)","DOI":"10.1007\/978-981-99-8733-7_13"},{"key":"5_CR34","unstructured":"Russell, W.F., Lai., Malavolta, G.: Subvector commitments with application to succinct arguments. In: CRYPTO (2019)"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Lewko, A.B., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: EUROCRYPT (2010)","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"5_CR36","doi-asserted-by":"crossref","unstructured":"Lewko, A.B., Waters, B.: New techniques for dual system encryption and fully secure HIBE with short ciphertexts. In: TCC (2010)","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Lewko, A.B., Waters, B.: Decentralizing attribute-based encryption. In: EUROCRYPT (2011)","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"5_CR38","doi-asserted-by":"crossref","unstructured":"Lipmaa, H.: Progression-free sets and sublinear pairing-based non-interactive zero-knowledge arguments. In: TCC (2012)","DOI":"10.1007\/978-3-642-28914-9_10"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Mahmoody, M., Qi, W., Rahimi, A.: Lower bounds for the number of decryption updates in registration-based encryption. In: TCC (2022)","DOI":"10.1007\/978-3-031-22318-1_20"},{"key":"5_CR40","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: EUROCRYPT (2005)","DOI":"10.1007\/11426639_27"},{"key":"5_CR41","unstructured":"Sakemi, Y., Kobayashi, T., Saito, T., Wahby, R.: Pairing-friendly curves. I-d, IETF, 9 (2020)"},{"key":"5_CR42","doi-asserted-by":"crossref","unstructured":"Salem, R., Spencer, D.C.: On sets of integers which contain no three in arithmetic progression. Proc. Nat. Acad. Sci. 32(12), 331\u2013332 (1946)","DOI":"10.1073\/pnas.32.12.331"},{"key":"5_CR43","doi-asserted-by":"crossref","unstructured":"Shoup, V.: Lower bounds for discrete logarithms and related problems. In: EUROCRYPT, pp. 256\u2013266 (1997)","DOI":"10.1007\/3-540-69053-0_18"},{"key":"5_CR44","doi-asserted-by":"crossref","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: EUROCRYPT, pp. 114\u2013127 (2005)","DOI":"10.1007\/11426639_7"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Waters, B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In: CRYPTO (2009)","DOI":"10.1007\/978-3-642-03356-8_36"},{"key":"5_CR46","doi-asserted-by":"crossref","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: PKC (2011)","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"5_CR47","doi-asserted-by":"crossref","unstructured":"Waters, B., Wu, D.J.: Batch arguments for NP and more from standard bilinear group assumptions. In: CRYPTO (2022)","DOI":"10.1007\/978-3-031-15979-4_15"},{"key":"5_CR48","doi-asserted-by":"crossref","unstructured":"Wee, H.: Dual system encryption via predicate encodings. In: TCC (2014)","DOI":"10.1007\/978-3-642-54242-8_26"},{"key":"5_CR49","doi-asserted-by":"crossref","unstructured":"Zhu, Z., Zhang, K., Gong, J., Qian, H.: Registered ABE via predicate encodings. In: ASIACRYPT (2023)","DOI":"10.1007\/978-981-99-8733-7_3"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-68382-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,15]],"date-time":"2024-08-15T09:07:04Z","timestamp":1723712824000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-68382-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031683817","9783031683824"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-68382-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"16 August 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"44","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crypto.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}