Functional Encryption for Inner Product Predicates from Learning with Errors
From MaRDI portal
Publication:3102174
DOI10.1007/978-3-642-25385-0_2zbMath1227.94023OpenAlexW2146689436MaRDI QIDQ3102174
David M. Freeman, Shweta Agrawal, Vinod Vaikuntanathan
Publication date: 2 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_2
Related Items (37)
An efficient IBE scheme with tight security reduction in the random oracle model ⋮ Adaptive Simulation Security for Inner Product Functional Encryption ⋮ Predicate Encryption for Circuits from LWE ⋮ Semi-adaptive Security and Bundling Functionalities Made Generic and Easy ⋮ Decentralized policy-hiding ABE with receiver privacy ⋮ Toward non-interactive zero-knowledge proofs for NP from LWE ⋮ On the power of rewinding simulators in functional encryption ⋮ Towards a Simpler Lattice Gadget Toolkit ⋮ Anonymous and leakage resilient IBE and IPE ⋮ Attribute based encryption for deterministic finite automata from DLIN ⋮ Multi-key and multi-input predicate encryption from learning with errors ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ Multi-input attribute based encryption and predicate encryption ⋮ A survey on functional encryption ⋮ Spatial encryption revisited: from delegatable multiple inner product encryption and more ⋮ Attribute-based multi-input FE (and more) for attribute-weighted sums ⋮ Adaptively secure inner product encryption from LWE ⋮ Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH ⋮ Direct computation of branching programs and its applications to more efficient lattice-based cryptography ⋮ Compact (Targeted Homomorphic) Inner Product Encryption from LWE ⋮ Compact Inner Product Encryption from LWE ⋮ Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption ⋮ Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification ⋮ Doubly spatial encryption from DBDH ⋮ Improved (Hierarchical) Inner-Product Encryption from Lattices ⋮ Private Puncturable PRFs from Standard Lattice Assumptions ⋮ Watermarking cryptographic functionalities from standard lattice assumptions ⋮ Multi-input Functional Encryption and Its Application in Outsourcing Computation ⋮ Revocable attribute-based proxy re-encryption ⋮ Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits ⋮ Impossibility results for lattice-based functional encryption schemes ⋮ Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} ⋮ Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes ⋮ Fully Secure Functional Encryption for Inner Products, from Standard Assumptions ⋮ Integral matrix Gram root and lattice Gaussian sampling without floats
This page was built for publication: Functional Encryption for Inner Product Predicates from Learning with Errors