On the security of functional encryption in the generic group model (Q6095189): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Simple Functional Encryption Schemes for Inner Products / rank
 
Normal rank
Property / cites work
 
Property / cites work: A subversion-resistant SNARK / rank
 
Normal rank
Property / cites work
 
Property / cites work: Structure-Preserving Signatures and Commitments to Group Elements / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully Secure Functional Encryption for Inner Products, from Standard Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Subfield Lattice Attack on Overstretched NTRU Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Selective to Adaptive Security in Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical functional encryption for quadratic functions with applications to predicate encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated Analysis of Cryptographic Assumptions in Generic Group Models / rank
 
Normal rank
Property / cites work
 
Property / cites work: NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption from the Weil Pairing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithms for Black-Box Fields and their Application to Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical Identity Based Encryption with Constant Size Ciphertext / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Uber-Assumption Family / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles) / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Extractability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A forward-secure public-key encryption scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the New CLT Multilinear Map over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of GGH15 Multilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: An algebraic framework for Diffie-Hellman assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Preventing CLT attacks on obfuscation with linear overhead / rank
 
Normal rank
Property / cites work
 
Property / cites work: Injective Encodings to Elliptic Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Equivalence of Generic Group Models / rank
 
Normal rank
Property / cites work
 
Property / cites work: Predicate encryption supporting disjunctions, polynomial equations, and inner products / rank
 
Normal rank
Property / cites work
 
Property / cites work: Function-hiding inner product encryption is practical / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unbounded HIBE and Attribute-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Highly-Efficient Universally-Composable Commitments Based on the DDH Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography and Coding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Diffie-Hellman Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Complexity of a determinate algorithm for the discrete logarithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fuzzy Identity-Based Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Probabilistic Algorithms for Verification of Polynomial Identities / rank
 
Normal rank
Property / cites work
 
Property / cites work: Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Punctured Programming Approach to Adaptively Secure Functional Encryption / rank
 
Normal rank

Revision as of 19:16, 2 August 2024

scientific article; zbMATH DE number 7735224
Language Label Description Also known as
English
On the security of functional encryption in the generic group model
scientific article; zbMATH DE number 7735224

    Statements

    On the security of functional encryption in the generic group model (English)
    0 references
    0 references
    0 references
    7 September 2023
    0 references
    generic group model
    0 references
    functional encryption
    0 references
    adaptive security
    0 references
    selective security
    0 references
    group-based
    0 references
    0 references
    0 references

    Identifiers