Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
From MaRDI portal
Recommendations
- Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
- Multi-input non-interactive functional encryption: constructions and applications
- Multi-input functional encryption
- Multi-input inner-product functional encryption from pairings
- Multi-input functional encryption with unbounded-message security
- Multi-input quadratic functional encryption: stronger security, broader functionality
- Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings
- From single-input to multi-client inner-product functional encryption
- Multi-input functional encryption and its application in outsourcing computation
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
Cites work
- scientific article; zbMATH DE number 3960854 (Why is no real title available?)
- A punctured programming approach to adaptively secure functional encryption
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Constrained pseudorandom functions and their applications
- From Minicrypt to Obfustopia via private-key functional encryption
- From cryptomania to obfustopia through secret-key functional encryption
- From selective to adaptive security in functional encryption
- Function-private functional encryption in the private-key setting
- Function-private identity-based encryption: hiding the function in functional encryption
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Functional encryption with bounded collusions via multi-party computation
- Functional encryption without obfuscation
- Functional encryption: definitions and challenges
- Functional encryption: new perspectives and lower bounds
- Functional signatures and pseudorandom functions
- How to use indistinguishability obfuscation
- Identity-Based Encryption from the Weil Pairing
- Identity-based cryptosystems and signature schemes
- Indistinguishability obfuscation from compact functional encryption
- Indistinguishability obfuscation from functional encryption
- Limits on the power of indistinguishability obfuscation and functional encryption
- Mergeable functional encryption
- Multi-input functional encryption
- On extractability obfuscation
- On the (im)possibility of obfuscating programs
- On the practical security of inner product functional encryption
- One-Way Functions and (Im)perfect Obfuscation
- Predicate Privacy in Encryption Systems
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- Reusable garbled circuits and succinct functional encryption
- Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation
Cited in
(13)- Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
- Multi-input non-interactive functional encryption: constructions and applications
- Multi-input functional encryption
- scientific article; zbMATH DE number 1583777 (Why is no real title available?)
- Multi-input functional encryption and its application in outsourcing computation
- Multi-client functional encryption for separable functions
- Multi-input functional encryption for unbounded arity functions
- From cryptomania to obfustopia through secret-key functional encryption
- From minicrypt to obfustopia via private-key functional encryption
- Simple and generic constructions of succinct functional encryption
- Non-interactive anonymous router
- Obfustopia built on secret-key functional encryption
- One-Way Functions and (Im)perfect Obfuscation
This page was built for publication: Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1753168)