Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-662-53015-3_12 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2395093458 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simple Functional Encryption Schemes for Inner Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption for Inner Product Predicates from Learning with Errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption for Inner Products, from Standard Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption: New Perspectives and Lower Bounds / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular and KDM Security for Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Selective to Adaptive Security in Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computationally private randomizing polynomials and their applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing Small Discrete Logarithms Faster / rank
 
Normal rank
Property / cites work
 
Property / cites work: Function-Hiding Inner Product Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient selective identity-based encryption without random oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption from the Weil Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption: Definitions and Challenges / rank
 
Normal rank
Property / cites work
 
Property / cites work: Classical hardness of learning with errors / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - ASIACRYPT 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Multilinear Maps over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249317 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737235 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035738 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Achievability of Simulation-Based Security for Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Signatures and Bimodal Gaussians / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Algebraic Framework for Diffie-Hellman Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-Based Encryption for Circuits from Multilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded-Collusion IBE from Key Homomorphism / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Run Turing Machines on Encrypted Data / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reusable garbled circuits and succinct functional encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption with Bounded Collusions via Multi-party Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attribute-based encryption for circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption for Circuits from LWE / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of GGH Map / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hardness of k-LWE and Applications in Traitor Tracing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364552 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bi-Deniable Public-Key Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Kangaroos, monopoly and discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional Encryption for Regular Languages / rank
 
Normal rank

Latest revision as of 22:19, 12 July 2024

scientific article
Language Label Description Also known as
English
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
scientific article

    Statements

    Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (English)
    0 references
    0 references
    0 references
    0 references
    9 November 2016
    0 references
    functional encryption
    0 references
    adaptive security
    0 references
    standard assumptions
    0 references
    \(\mathsf {DDH}\)
    0 references
    \(\mathsf {LWE}\)
    0 references
    extended \(\mathsf{LWE}\)
    0 references
    composite residuosity
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers