[1] Vipul Goyal, Omkant Pandey, Amit Sahai, and Brent Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS ’06, page 89–98, 2006.
[2] Amit Sahai and Brent Waters. Fuzzy identitybased encryption. In Ronald Cramer, editor, Advances in Cryptology – EUROCRYPT 2005, pages 457–473, 2005.
[3] John Bethencourt, Amit Sahai, and Brent Waters. Ciphertext-policy attribute-based encryption. In IEEE Symposium on Security and Privacy – SP 2007, pages 321–334, 2007.
[4] Javier Herranz. Attribute-based encryption implies identity-based encryption. IET Information Security, pages 332–337, 2017.
[5] Javier Herranz. Attacking pairing-free attributebased encryption schemes. IEEE Access, pages 222226–222232, 2020.
[6] Syh-Yuan Tan, Kin-Woon Yeow, and Seong Oun Hwang. Enhancement of a lightweight attributebased encryption scheme for the internet of things. IEEE Internet of Things Journal, pages 6384–6395, 2019.
[7] Shashank Agrawal and Melissa Chase. Fame: Fast attribute-based message encryption. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, page 665–682, 2017.
[8] Doreen Riepel and Hoeteck Wee. Fabeo: Fast attribute-based encryption with optimal security. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, page 2491–2504, 2022.
[9] Ahmad Khoureich Ka. Easy-ABE: An easy ciphertext-policy attribute-based encryption. In Giampaolo Bella, Mihai Doinea, and Helge Janicke, editors, Innovative Security Solutions for Information Technology and Communications, pages 168–183, 2023.
[10] Wei Dai, Yarkın Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savaş, and Berk Sunar. Implementation and evaluation of a lattice-based key-policy ABE scheme. IEEE Transactions on Information Forensics and Security, pages 1169–1184, 2018.
[11] Geng Wang, Ming Wan, Zhen Liu, and Dawu Gu. Fully secure lattice-based ABE from noisy linear functional encryption. In Yu Yu and Moti Yung, editors, Information Security and Cryptology, pages 421–441, 2021.
[12] Boxue Huang, Juntao Gao, and Xuelian Li. Efficient lattice-based revocable attribute-based encryption against decryption key exposure for cloud file sharing. Journal of Cloud Computing, page 37, 2023.
[13] Vanga Odelu and Ashok Kumar Das. Design of a new CP-ABE with constant-size secret keys for lightweight devices using elliptic curve cryptography. Sec. and Commun. Netw., page 4048–4059, 2016. .
[14] Vanga Odelu, Ashok Kumar Das, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, and Minho Jo. Expressive CP-ABE scheme for mobile devices in IoT satisfying constant-size keys and ciphertexts. IEEE Access, pages 3273– 3283, 2017.
[15] Xuanxia Yao, Zhi Chen, and Ye Tian. A lightweight attribute-based encryption scheme for the internet of things. Future Generation Computer Systems, pages 104–112, 2015.
[16] Dan Boneh, Periklis Papakonstantinou, Charles Rackoff, Yevgeniy Vahlis, and Brent Waters. On the impossibility of basing identity based encryption on trapdoor permutations. In 2008 49th Annual IEEE Symposium on Foundations of Computer Science, pages 283–292, 2008.
[17] Periklis A. Papakonstantinou, Charles W. Rackoff, and Yevgeniy Vahlis. How powerful are the DDH hard groups? Cryptology ePrint Archive, Paper 2012/653, 2012.
[18] ShuichiKatsumataandShotaYamada. Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR. In Dongdai Lin and Kazue Sako, editors, Public-Key Cryptography – PKC 2019, pages 158–188, 2019.
[19] Zhedong Wang, Xiong Fan, and Feng-Hao Liu. FE for inner products and its application to decentralized ABE. In Dongdai Lin and Kazue Sako, editors, Public-Key Cryptography – PKC 2019, pages 97–127, 2019.
[20] Ahmad Khoureich Ka. M-Sel: A message selection functional encryption from simple tools. In Mark Manulis, Diana MaimuŢ, and George Teşeleanu, editors, Innovative Security Solutions for Information Technology and Communications, pages 79–96, 2024.
[21] Jonathan Katz, Amit Sahai, and Brent Waters. Predicate encryption supporting disjunctions, polynomial equations, and inner products. In Nigel Smart, editor, Advances in Cryptology – EUROCRYPT 2008, pages 146–162, 2008.
[22] Shweta Agrawal, Benoît Libert, and Damien Stehlé. Fully secure functional encryption for inner products, from standard assumptions. In Matthew Robshaw and Jonathan Katz, editors, Advances in Cryptology – CRYPTO 2016, pages 333–362, 2016.
[23] Sheng Ding, Chen Li, and Hui Li. A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access, pages 27336–27345, 2018.
[24] Yong Wang, Biwen Chen, Lei Li, Qiang Ma, Huicong Li, and Debiao He. Efficient and secure ciphertext-policy attribute-based encryptionwithoutpairingforcloud-assistedsmartgrid. IEEE Access, pages 40704–40713, 2020.
[25] Yi-Fan Tseng and Jheng-Jia Huang. Cryptanalysis on two pairing-free ciphertext-policy attribute-based encryption schemes. In 2020 International Computer Symposium (ICS), pages 403–407, 2020.
[26] Hamednejad Farnoosh, Mohajeri Javad, and Mohammad Reza A. Attacking two pairingfree ciphertext-policy attribute-based encryption schemes. The ISC International Journal of Information Security (ISeCure), page 151–160, 2025.
[27] Sangjukta Das and Suyel Namasudra. Multiauthority cp-abe-based access control model for iotenabled healthcare infrastructure. IEEE Transactions on Industrial Informatics, pages 821–829, 2023.
[28] K. Sowjanya and Mou Dasgupta. A ciphertextpolicy attribute based encryption scheme for wireless body area networks based on ecc. Journal of Information Security and Applications, 54: 102559, 2020. ISSN 2214-2126.
[29] Nico Döttling and Sanjam Garg. Identity-based encryption from the diffie-hellman assumption. In Jonathan Katz and Hovav Shacham, editors, Advances in Cryptology – CRYPTO 2017, pages 537–569, 2017.
[30] Olivier Blazy and Saqib A. Kakvi. Identitybased encryption in DDH hard groups. In Lejla Batina and Joan Daemen, editors, Progress in Cryptology – AFRICACRYPT 2022, pages 81– 102, 2022.
[31] Xuanxia Yao, Jinyuan Zhou, Xiaojiang Du, and Shurong Zhang. A cp-abe and iota-based lightweight sensitive data access control scheme for iot. IEEE Internet of Things Journal, pages 40831–40844, 2024. .
[32] Miao Wang, Zhenfu Cao, Xiaolei Dong, Runmeng Du, and Jiasheng Chen. Decentralized multiauthority kp-abe scheme without bilinear pairings. IEEE Internet of Things Journal,pages 726–738, 2025.
[33] Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval. Simple functional encryptionschemesforinnerproducts. InJonathan Katz, editor, Public-Key Cryptography – PKC 2015, pages 733–751, 2015.
[34] Adi Shamir. Identity-based cryptosystems and signatureschemes. InGeorgeRobertBlakleyand David Chaum, editors, Advances in Cryptology, pages 47–53, 1985.
[35] Lucas Kowalczyk and Hoeteck Wee. Compact adaptively secure ABE for NC1 from k-lin. In Yuval Ishai and Vincent Rijmen, editors, Advances in Cryptology – EUROCRYPT 2019, pages 3–33, 2019.
[36] Joseph A. Akinyele, Christina Garman, Ian Miers, Matthew W. Pagano, Michael Rushanan, Matthew Green, and Aviel D. Rubin. Charm: a framework for rapidly prototyping cryptosystems. Journal of Cryptographic Engineering, pages 111–128, 2013.
[37] Ahmad Khoureich Ka. EasyABE github, 2023. URL https://github.com/khoureich/ EasyABE.
[38] Ahmad Khoureich Ka. CIBE github, 2024. URL
https://github.com/khoureich/ClusteredIBE.
[39] Guilhem Castagnos, Fabien Laguillaumie, and Ida Tucker. Practical fully secure unrestricted innerproductfunctionalencryptionmodulop. In Thomas Peyrin and Steven D. Galbraith, editors, Advances in Cryptology – ASIACRYPT 2018, pages 733–764, 2018.
[40] Dan Boneh and Matt Franklin. Identity-based encryption from the weil pairing. In Joe Kilian, editor, Advances in Cryptology – CRYPTO 2001, pages 213–229, 2001.