Function-hiding inner product encryption is practical
From MaRDI portal
Recommendations
Cited in
(26)- On the security of functional encryption in the generic group model
- Functional encryption against probabilistic queries: definition, construction and applications
- Post-quantum secure inner product functional encryption using multivariate public key cryptography
- Tightly secure inner product functional encryption: multi-input and function-hiding constructions
- More efficient verifiable functional encryption
- Multi-input inner-product functional encryption from pairings
- A new paradigm for public-key functional encryption for degree-2 polynomials
- A survey on functional encryption
- Multi-input quadratic functional encryption from pairings
- Unbounded inner product functional encryption from bilinear maps
- Unbounded inner product functional encryption from bilinear maps
- Compact \textsf{FE} for unbounded attribute-weighted sums for logspace from \textsf{SXDH}
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)
- Lattice-Based Secure Biometric Authentication for Hamming Distance
- A framework for UC secure privacy preserving biometric authentication using efficient functional encryption
- Functional encryption with secure key leasing
- Efficient function-hiding functional encryption: from inner-products to orthogonality
- DFE-IP: delegatable functional encryption for inner product
- Multi-client inner product encryption: function-hiding instantiations without random oracles
- Inner-product functional encryption with fine-grained access control
- Inner-product functional encryption from random linear codes: trial and challenges
- Policy-compliant signatures
- Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric
- Efficient inner product encryption with simulation-based security
- Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities
- Beyond volume pattern: storage-efficient Boolean searchable symmetric encryption with suppressed leakage
This page was built for publication: Function-hiding inner product encryption is practical
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1796818)