{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:25:58Z","timestamp":1757618758083,"version":"3.44.0"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031972591"},{"type":"electronic","value":"9783031972607"}],"license":[{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T00:00:00Z","timestamp":1751414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-97260-7_17","type":"book-chapter","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T09:27:53Z","timestamp":1752571673000},"page":"370-394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Attribute-Based Encryption Using Sum-Product Decomposition of\u00a0Boolean Functions"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6956-9929","authenticated-orcid":false,"given":"Arani","family":"Raychaudhuri","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9907-3319","authenticated-orcid":false,"given":"Ramprasad","family":"Sarkar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8691-4185","authenticated-orcid":false,"given":"Mriganka","family":"Mandal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,2]]},"reference":[{"key":"17_CR1","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/TEC.1958.5222658","volume":"4","author":"S Abhyankar","year":"1958","unstructured":"Abhyankar, S.: Minimal sum of products of sums expressions of boolean functions. IRE Trans. Electron. Comput. 4, 268\u2013276 (1958)","journal-title":"IRE Trans. Electron. Comput."},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Kumari, S., Yamada, S.: Attribute based encryption for turing machines from lattices. In: Annual International Cryptology Conference, pp. 352\u2013386. Springer (2024)","DOI":"10.1007\/978-3-031-68382-4_11"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Yamada, S.: Optimal broadcast encryption from pairings and LWE. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 13\u201343. Springer (2020)","DOI":"10.1007\/978-3-030-45721-1_2"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Attrapadung, N., Tomida, J.: Unbounded dynamic predicate compositions in ABE from standard assumptions. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 405\u2013436. Springer (2020)","DOI":"10.1007\/978-3-030-64840-4_14"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Bogdanov, A., Rosen, A.: Pseudorandom functions: three decades later. In: Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich, pp. 79\u2013158. Springer (2017)","DOI":"10.1007\/978-3-319-57048-8_3"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Boyle, E., Goldwasser, S., Ivan, I.: Functional signatures and pseudorandom functions. In: International Workshop on Public Key Cryptography, pp. 501\u2013519. Springer (2014)","DOI":"10.1007\/978-3-642-54631-0_29"},{"key":"17_CR7","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Lattice-inspired broadcast encryption and succinct ciphertext-policy ABE. In: 13th Innovations in Theoretical Computer Science Conference (ITCS 2022). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik (2022)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Crama, Y., Hammer, P.L.: Boolean Functions: Theory, Algorithms, and Applications. Cambridge University Press (2011)","DOI":"10.1017\/CBO9780511852008"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Datta, P., Komargodski, I., Waters, B.: Decentralized multi-authority ABE for NC1 from computational-BDH. Cryptology ePrint Archive (2021)","DOI":"10.1007\/978-3-030-77870-5_7"},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Dupin, A., Abelard, S.: Broadcast encryption using sum-product decomposition of boolean functions. Cryptology ePrint Archive (2024)","DOI":"10.62056\/av4fe0iuc"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: Annual Cryptology Conference, pp. 479\u2013499. Springer (2013)","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Gong, J., Wee, H.: Adaptively secure ABE for DFA from k-lin and more. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 278\u2013308. Springer (2020)","DOI":"10.1007\/978-3-030-45727-3_10"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"issue":"11","key":"17_CR14","doi-asserted-by":"publisher","first-page":"2150","DOI":"10.1109\/TPDS.2012.50","volume":"23","author":"J Han","year":"2012","unstructured":"Han, J., Susilo, W., Mu, Y., Yan, J.: Privacy-preserving decentralized key-policy attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 23(11), 2150\u20132162 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Lai, J., Deng, R.H., Li, Y., Weng, J.: Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp. 239\u2013248 (2014)","DOI":"10.1145\/2590296.2590334"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 62\u201391. Springer (2010)","DOI":"10.1007\/978-3-642-13190-5_4"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Lewko, A., Waters, B.: New techniques for dual system encryption and fully secure hibe with short ciphertexts. In: Theory of Cryptography Conference, pp. 455\u2013479. Springer (2010)","DOI":"10.1007\/978-3-642-11799-2_27"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Lewko, A., Waters, B.: New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Annual Cryptology Conference, pp. 180\u2013198. Springer (2012)","DOI":"10.1007\/978-3-642-32009-5_12"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Lin, H., Luo, J.: Compact adaptively secure ABE from k-lin: beyond NC1 and towards NL. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 247\u2013277. Springer (2020)","DOI":"10.1007\/978-3-030-45727-3_9"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Annual Cryptology Conference, pp. 191\u2013208. Springer (2010)","DOI":"10.1007\/978-3-642-14623-7_11"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Okamoto, T., Takashima, K.: Fully secure unbounded inner-product and attribute-based encryption. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 349\u2013366. Springer (2012)","DOI":"10.1007\/978-3-642-34961-4_22"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457\u2013473. Springer (2005)","DOI":"10.1007\/11426639_27"},{"issue":"11","key":"17_CR23","doi-asserted-by":"publisher","first-page":"2577","DOI":"10.1007\/s10623-021-00939-8","volume":"89","author":"J Tomida","year":"2021","unstructured":"Tomida, J., Kawahara, Y., Nishimaki, R.: Fast, compact, and expressive attribute-based encryption. Des. Codes Crypt. 89(11), 2577\u20132626 (2021). https:\/\/doi.org\/10.1007\/s10623-021-00939-8","journal-title":"Des. Codes Crypt."},{"key":"17_CR24","doi-asserted-by":"crossref","unstructured":"Tsabary, R.: Fully secure attribute-based encryption for t-CNF from LWE. In: Annual International Cryptology Conference, pp. 62\u201385. Springer (2019)","DOI":"10.1007\/978-3-030-26948-7_3"},{"key":"17_CR25","doi-asserted-by":"crossref","unstructured":"Waters, B.: Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: International Workshop on Public Key Cryptography, pp. 53\u201370. Springer (2011)","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Waters, B.: Functional encryption for regular languages. In: Annual Cryptology Conference, pp. 218\u2013235. Springer (2012)","DOI":"10.1007\/978-3-642-32009-5_14"},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Wee, H.: Optimal broadcast encryption and CP-ABE from evasive lattice assumptions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 217\u2013241. Springer (2022)","DOI":"10.1007\/978-3-031-07085-3_8"},{"key":"17_CR28","doi-asserted-by":"crossref","unstructured":"Wee, H.: Circuit ABE with poly (depth, $$\\lambda $$)-sized ciphertexts and keys from lattices. In: Annual International Cryptology Conference, pp. 178\u2013209. Springer (2024)","DOI":"10.1007\/978-3-031-68382-4_6"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology - AFRICACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97260-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,7]],"date-time":"2025-09-07T07:24:49Z","timestamp":1757229889000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97260-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,2]]},"ISBN":["9783031972591","9783031972607"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97260-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,7,2]]},"assertion":[{"value":"2 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AFRICACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in Africa","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rabat","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Morocco","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"africacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/africacrypt2025.sciencesconf.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}