Pages that link to "Item:Q2849414"
From MaRDI portal
The following pages link to Functional Encryption: New Perspectives and Lower Bounds (Q2849414):
Displaying 43 items.
- Strongly full-hiding inner product encryption (Q511916) (← links)
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption (Q887451) (← links)
- Impossibility of simulation secure functional encryption even with random oracles (Q1629443) (← links)
- Adaptively simulation-secure attribute-hiding predicate encryption (Q1710619) (← links)
- Practical fully secure unrestricted inner product functional encryption modulo \(p\) (Q1710625) (← links)
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions (Q1747658) (← links)
- Function-private functional encryption in the private-key setting (Q1747663) (← links)
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions (Q1753168) (← links)
- Fully secure functional encryption with a large class of relations from the decisional linear assumption (Q2010596) (← links)
- New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts (Q2056698) (← links)
- Steel: composable hardware-based stateful and randomised functional encryption (Q2061984) (← links)
- Functional encryption for attribute-weighted sums from \(k\)-Lin (Q2096503) (← links)
- Functional encryption for Turing machines with dynamic bounded collusion from LWE (Q2139636) (← links)
- From cryptomania to obfustopia through secret-key functional encryption (Q2175212) (← links)
- From FE combiners to secure MPC and back (Q2175912) (← links)
- A new approach to practical function-private inner product encryption (Q2317860) (← links)
- On the power of rewinding simulators in functional encryption (Q2407055) (← links)
- Verifiable functional encryption using Intel SGX (Q2697922) (← links)
- Functional Encryption for Turing Machines (Q2796122) (← links)
- Functional Encryption Without Obfuscation (Q2799106) (← links)
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits (Q2816296) (← links)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952) (← links)
- Simulation-Based Secure Functional Encryption in the Random Oracle Model (Q2946439) (← links)
- Verifiable Functional Encryption (Q2953789) (← links)
- Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents (Q3181030) (← links)
- From Cryptomania to Obfustopia Through Secret-Key Functional Encryption (Q3181034) (← links)
- Compactness vs Collusion Resistance in Functional Encryption (Q3181036) (← links)
- Efficient Inner Product Encryption with Simulation-Based Security (Q3297490) (← links)
- Predicate Encryption for Circuits from LWE (Q3457082) (← links)
- Indistinguishability Obfuscation from Compact Functional Encryption (Q3457116) (← links)
- (Q4638057) (← links)
- Adaptive Simulation Security for Inner Product Functional Encryption (Q5041151) (← links)
- A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials (Q5041154) (← links)
- A New Functional Encryption for Multidimensional Range Query (Short Paper) (Q5056029) (← links)
- Collusion Resistant Traitor Tracing from Learning with Errors (Q5130846) (← links)
- Private Puncturable PRFs from Standard Lattice Assumptions (Q5738885) (← links)
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE (Q5738886) (← links)
- Multi-input Inner-Product Functional Encryption from Pairings (Q5738891) (← links)
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions (Q5738969) (← links)
- Cryptography with Updates (Q5738983) (← links)
- Bounded-collusion decentralized ABE with sublinear parameters (Q6040630) (← links)
- Quantum attribute-based encryption: a comprehensive study (Q6050246) (← links)
- A survey on functional encryption (Q6163797) (← links)