@inbook {19030,
title = {Delegating Capabilities in Predicate Encryption Systems},
booktitle = {Automata, Languages and Programming},
series = {Lecture Notes in Computer Science},
volume = {5126},
year = {2008},
month = {2008},
pages = {560 - 578},
publisher = {Springer Berlin / Heidelberg},
organization = {Springer Berlin / Heidelberg},
abstract = {In predicate encryption systems, given a capability, one can evaluate one or more predicates on the plaintext encrypted, while all other information about the plaintext remains hidden. We consider the role of delegation in such predicate encryption systems. Suppose Alice has a capability, and she wishes to delegate to Bob a more restrictive capability allowing the decryption of a subset of the information Alice can learn about the plaintext encrypted. We formally define delegation in predicate encryption systems, propose a new security definition for delegation, and give an efficient construction supporting conjunctive queries. The security of our construction can be reduced to the general 3-party Bilinear Diffie-Hellman assumption, and the Bilinear Decisional Diffie-Hellman assumption in composite order bilinear groups.},
keywords = {Computer science},
isbn = {978-3-540-70582-6},
url = {http://www.springerlink.com/content/w320422h15050004/abstract/},
author = {Elaine Shi and Waters,Brent},
editor = {Aceto,Luca and Damg{\r a}rd,Ivan and Goldberg,Leslie and Halld{\'o}rsson,Magn{\'u}s and Ing{\'o}lfsd{\'o}ttir,Anna and Walukiewicz,Igor}
}