|
|
| Property / cites work |
| | |
| Property / cites work: Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Simple Functional Encryption Schemes for Inner Products / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Functional Encryption for Inner Product Predicates from Learning with Errors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fully Secure Functional Encryption for Inner Products, from Standard Assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Functional Encryption: New Perspectives and Lower Bounds / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Circular and KDM Security for Identity-Based Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: From Selective to Adaptive Security in Functional Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Computationally private randomizing polynomials and their applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Computing Small Discrete Logarithms Faster / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Function-Hiding Inner Product Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient selective identity-based encryption without random oracles / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Identity-Based Encryption from the Weil Pairing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Functional Encryption: Definitions and Challenges / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Classical hardness of learning with errors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - ASIACRYPT 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Practical Multilinear Maps over the Integers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4249317 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4737235 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4035738 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Achievability of Simulation-Based Security for Functional Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lattice Signatures and Bimodal Gaussians / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: An Algebraic Framework for Diffie-Hellman Assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Attribute-Based Encryption for Circuits from Multilinear Maps / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Trapdoors for hard lattices and new cryptographic constructions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Bounded-Collusion IBE from Key Homomorphism / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Run Turing Machines on Encrypted Data / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Reusable garbled circuits and succinct functional encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Functional Encryption with Bounded Collusions via Multi-party Computation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Attribute-based encryption for circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Predicate Encryption for Circuits from LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of GGH Map / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Hardness of k-LWE and Applications in Traitor Tracing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4364552 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Bi-Deniable Public-Key Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Kangaroos, monopoly and discrete logarithms / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fuzzy Identity-Based Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Identity-Based Cryptosystems and Signature Schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Functional Encryption for Regular Languages / rank |
| | Normal rank |