|
|
(One intermediate revision by one other user not shown) |
Property / DOI | |
| | |
Property / DOI: 10.1016/j.tcs.2023.114368 / rank | |
| Normal rank
| |
| Property / cites work |
| | |
| Property / cites work: Simple Functional Encryption Schemes for Inner Products / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Inner-product functional encryption with fine-grained access control / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Multi-input Inner-Product Functional Encryption from Pairings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Lattice (H)IBE in the Standard Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fully Secure Functional Encryption for Inner Products, from Standard Assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4228459 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Practical functional encryption for quadratic functions with applications to predicate encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Traitor Tracing from Collusion Secure Codes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3840150 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941864 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Functional Encryption: Definitions and Challenges / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Bonsai Trees, or How to Delegate a Lattice Basis / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Traitor-tracing from LWE made simple and attribute-based / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4940701 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Decentralized multi-client functional encryption for inner product / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Full-hiding (unbounded) multi-input inner product functional encryption from the \(k\)-linear assumption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Traceable inner product functional encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941866 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4737495 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Functional Encryption Without Obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Predicate Encryption for Circuits from LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Collusion resistant traitor tracing from learning with errors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New approaches to traitor tracing with embedded identities / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Collusion resistant broadcast and trace from positional witness encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4409109 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - ASIACRYPT 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Function-hiding inner product encryption is practical / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Multi-client functional encryption for linear functions in the standard model from LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Generic construction of trace-and-revoke inner product functional encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4783719 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4536284 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Attribute-based access control for inner product functional encryption from LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-key cryptosystems from the worst-case shortest vector problem / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Decade of Lattice Cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fuzzy Identity-Based Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: An Introduction to Computational Physics / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Combinatorial properties of frameproof and traceability codes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4250813 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tightly secure inner product functional encryption: multi-input and function-hiding constructions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: FE for inner products and its application to decentralized ABE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization / rank |
| | Normal rank |
| Property / DOI |
| | |
| Property / DOI: 10.1016/J.TCS.2023.114368 / rank |
| | Normal rank |