Pages that link to "Item:Q3000543"
From MaRDI portal
The following pages link to Functional Encryption: Definitions and Challenges (Q3000543):
Displaying 40 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Self-updatable encryption with short public parameters and its extensions (Q264135) (← links)
- Generalized closest substring encryption (Q300391) (← links)
- Spatial encryption supporting non-monotone access structure (Q404924) (← links)
- Shorter identity-based encryption via asymmetric pairings (Q404944) (← links)
- Attribute-based encryption schemes with constant-size ciphertexts (Q417988) (← links)
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- Strongly full-hiding inner product encryption (Q511916) (← links)
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency (Q511917) (← links)
- Secure computation without computers (Q517015) (← links)
- Verifiability-based conversion from CPA to CCA-secure predicate encryption (Q683914) (← links)
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation (Q780319) (← links)
- Post-quantum secure inner product functional encryption using multivariate public key cryptography (Q821514) (← links)
- Balancing access control and privacy for data deduplication via functional encryption (Q826391) (← links)
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps (Q831181) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Revocable hierarchical identity-based encryption via history-free approach (Q906383) (← links)
- Cutting-edge cryptography through the lens of secret sharing (Q1627968) (← links)
- Upgrading to functional encryption (Q1629441) (← links)
- Impossibility of simulation secure functional encryption even with random oracles (Q1629443) (← links)
- FE and iO for Turing machines from minimal assumptions (Q1631345) (← links)
- Adaptively simulation-secure attribute-hiding predicate encryption (Q1710619) (← links)
- Decentralized multi-client functional encryption for inner product (Q1710623) (← links)
- Practical fully secure unrestricted inner product functional encryption modulo \(p\) (Q1710625) (← links)
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions (Q1747658) (← links)
- Function-private functional encryption in the private-key setting (Q1747663) (← links)
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings (Q1752551) (← links)
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions (Q1753168) (← links)
- (Q4638057) (← links)
- Quantum attribute-based encryption: a comprehensive study (Q6050246) (← links)
- Hierarchical identity-based inner product functional encryption (Q6065871) (← links)
- (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin (Q6095187) (← links)
- DFE-IP: delegatable functional encryption for inner product (Q6095585) (← links)
- Unbounded predicate inner product functional encryption from pairings (Q6109084) (← links)
- Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities (Q6122595) (← links)
- (Inner-product) functional encryption with updatable ciphertexts (Q6141858) (← links)
- A survey on functional encryption (Q6163797) (← links)
- Complementary set encryption for privacy-preserving data consolidation (Q6190042) (← links)
- Indistinguishability obfuscation (Q6198645) (← links)
- Unbounded non-zero inner product encryption (Q6495783) (← links)