Fully Secure Functional Encryption for Inner Products, from Standard Assumptions

From MaRDI portal
Revision as of 18:56, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2829952

DOI10.1007/978-3-662-53015-3_12zbMath1372.94408OpenAlexW2395093458MaRDI QIDQ2829952

Damien Stehlé, Shweta Agrawal, Benoît Libert

Publication date: 9 November 2016

Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53015-3_12




Related Items (68)

A tighter proof for CCA secure inner product functional encryption: genericity meets efficiencyAdaptive Simulation Security for Inner Product Functional EncryptionA New Paradigm for Public-Key Functional Encryption for Degree-2 PolynomialsAdaptively secure distributed PRFs from LWEAttribute-based access control for inner product functional encryption from LWEAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceAdaptively secure laconic function evaluation for \(\mathsf{NC}^1\)Optimal broadcast encryption and CP-ABE from evasive lattice assumptionsVerifiable inner product computation on outsourced database for authenticated multi-user data sharingOn the smoothing parameter and last minimum of random orthogonal latticesBounded-collusion decentralized ABE with sublinear parameters(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-LinTraitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-LinHierarchical identity-based inner product functional encryptionHardness of \(k\)-LWE and applications in traitor tracingMulti-authority ABE for non-monotonic access structuresFine-grained verifier NIZK and its applicationsDecentralized multi-authority attribute-based inner-product FE: large universe and unbounded(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linOn the security of functional encryption in the generic group modelDFE-IP: delegatable functional encryption for inner productUnbounded predicate inner product functional encryption from pairingsABE for circuits with constant-size secret keys and adaptive securityFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded settingPrivacy-enhanced and non-interactive linear regression with dropout-resilienceMulti-client functional encryption with fine-grained access controlCompact FE for unbounded attribute-weighted sums for logspace from SXDHWitness encryption and null-iO from evasive LWE(Inner-product) functional encryption with updatable ciphertextsA survey on functional encryptionEfficient lattice-based inner-product functional encryptionMore efficient verifiable functional encryptionGeneric construction of trace-and-revoke inner product functional encryptionStreaming functional encryptionAdaptively secure inner product encryption from LWESuccinct and adaptively secure ABE for ABP from \(k\)-LinInner-product functional encryption with fine-grained access controlDecentralized multi-client functional encryption for set intersection with improved efficiencyDecentralized multi-client functional encryption for inner productPractical fully secure unrestricted inner product functional encryption modulo \(p\)Achieving IND-CCA Security for Functional Encryption for Inner ProductsPublic key encryption with equality test from generic assumptions in the random oracle modelCollusion Resistant Traitor Tracing from Learning with ErrorsEfficient Inner Product Encryption with Simulation-Based SecurityTightly secure inner product functional encryption: multi-input and function-hiding constructionsFunctional encryption for cubic polynomials and implementationCCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsMulti-input Inner-Product Functional Encryption from PairingsUnbounded inner product functional encryption from bilinear mapsUnbounded inner product functional encryption from bilinear mapsAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Simple and efficient FE for quadratic functionsIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FEImpossibility results for lattice-based functional encryption schemesCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Tightly CCA-secure inner product functional encryption schemeNew lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationNon-interactive anonymous routerChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionNon-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairingsNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysFully Secure Functional Encryption for Inner Products, from Standard AssumptionsFunctional encryption for set intersection in the multi-client settingA new approach to practical function-private inner product encryptionFunctional encryption for attribute-weighted sums from \(k\)-LinDynamic decentralized functional encryption


Uses Software


Cites Work


This page was built for publication: Fully Secure Functional Encryption for Inner Products, from Standard Assumptions