Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits

From MaRDI portal
Revision as of 02:17, 9 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5418715

DOI10.1007/978-3-642-55220-5_30zbMath1327.94035OpenAlexW2113717903MaRDI QIDQ5418715

Craig Gentry, Shai Halevi, Dhinakaran Vinayagamurthy, Valeria Nikolaenko, Sergey Gorbunov, Vinod Vaikuntanathan, Gil Segev, Dan Boneh

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_30




Related Items (only showing first 100 items - show all)

Attribute-Based Keyword Search from LatticesAdaptive Simulation Security for Inner Product Functional EncryptionConstraining and Watermarking PRFs from Milder AssumptionsAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreLimits on the adaptive security of Yao's garblingSmoothing out binary linear codes and worst-case sub-exponential hardness for LPNAttribute-based signatures from lattices: unbounded attributes and semi-adaptive securityAttribute-based versions of Schnorr and ElGamalAdaptive Security of Yao’s Garbled CircuitsPredicate Encryption for Circuits from LWEAttribute-based access control for inner product functional encryption from LWEDeniable Attribute Based Encryption for Branching Programs from LWETargeted Homomorphic Attribute-Based EncryptionSemi-adaptive Security and Bundling Functionalities Made Generic and EasyFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionAttribute-based conditional proxy re-encryption in the standard model under LWELattice-based HRA-secure attribute-based proxy re-encryption in standard modelGadget-based iNTRU lattice trapdoorsAdaptively secure laconic function evaluation for \(\mathsf{NC}^1\)Faster Gaussian sampling for trapdoor lattices with arbitrary modulusPuncturable identity-based and attribute-based encryption from latticesOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsAttribute-based proxy re-encryption from standard latticesFrom cryptomania to obfustopia through secret-key functional encryptionFrom FE combiners to secure MPC and backAttribute based encryption for deterministic finite automata from DLINA survey of lattice based expressive attribute based encryptionA Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of EquationsEfficient and fully secure lattice-based IBE with equality testCryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeAdaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear GroupsNew ways to garble arithmetic circuitsFunctional commitments for all functions, with transparent setup and from SISSuccinct vector, polynomial, and functional commitments from latticesOn the optimal succinctness and efficiency of functional encryption and attribute-based encryptionBroadcast, trace and revoke with optimal parameters from polynomial hardnessTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionMulti-key Homomorphic AuthenticatorsVerifiable Functional EncryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysFunctional encryption for computational hiding in prime order groups via pair encodingsAdaptively secure inner product encryption from LWESuccinct and adaptively secure ABE for ABP from \(k\)-LinInner-product functional encryption with fine-grained access controlCollusion resistant trace-and-revoke for arbitrary identities from standard assumptionsSuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHMulti-party functional encryptionABE for DFA from LWE against bounded collusions, revisitedOn treewidth, separators and Yao's garblingRing-based identity based encryption -- asymptotically shorter MPK and tighter securityDirect computation of branching programs and its applications to more efficient lattice-based cryptographyCiphertext-policy attribute-based encryption for general circuits from bilinear mapsSimulatable verifiable random function from the LWE assumptionAdaptively simulation-secure attribute-hiding predicate encryptionImproved inner-product encryption with adaptive security and full attribute-hidingCollusion Resistant Traitor Tracing from Learning with ErrorsCompact (Targeted Homomorphic) Inner Product Encryption from LWECompact Inner Product Encryption from LWEFunction-private functional encryption in the private-key settingOn the complexity of compressing obfuscationA more efficient leveled strongly-unforgeable fully homomorphic signature schemeDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsPrivate Puncturable PRFs from Standard Lattice AssumptionsFunctional encryption for cascade automataDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsWatermarking cryptographic functionalities from standard lattice assumptionsCompacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionFunctional Encryption for Turing MachinesMulti-theorem preprocessing NIZKs from latticesProvably Secure (Broadcast) Homomorphic SigncryptionAlgebraic Attacks Against Several Weak Variants of GVW’13 ABEFunctional Encryption for Cascade Automata (Extended Abstract)Tag-based ABE in prime-order groups via pair encodingRevocable attribute-based proxy re-encryptionGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary InformationOptimal broadcast encryption from pairings and LWEImpossibility results for lattice-based functional encryption schemesCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsCandidate obfuscation via oblivious LWE samplingChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionTuring Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded FunctionsFHE Circuit Privacy Almost for FreeAdaptively Secure Garbled Circuits from One-Way FunctionsFully Secure Functional Encryption for Inner Products, from Standard AssumptionsCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityA new Gaussian sampling for trapdoor lattices with arbitrary modulusAdaptively secure constrained pseudorandom functions in the standard modelFunctional encryption for attribute-weighted sums from \(k\)-LinAmplifying the security of functional encryption, unconditionallyUnnamed ItemGarbled Circuits as Randomized Encodings of Functions: a PrimerIntegral matrix Gram root and lattice Gaussian sampling without floatsPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness







This page was built for publication: Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits