Practical functional encryption for quadratic functions with applications to predicate encryption
From MaRDI portal
Publication:1675718
DOI10.1007/978-3-319-63688-7_3zbMath1407.94080OpenAlexW2604714373MaRDI QIDQ1675718
Dario Fiore, Romain Gay, Carmen Elisabetta Zaira Baltico, Dario Catalano
Publication date: 3 November 2017
Full work available at URL: https://doi.org/10.1007/978-3-319-63688-7_3
Related Items (34)
Verifiable Inner Product Encryption Scheme ⋮ A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials ⋮ (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps ⋮ Impact of Group Theory in Cryptosystem ⋮ Multi-input quadratic functional encryption from pairings ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ New approaches to traitor tracing with embedded identities ⋮ Bounded-collusion decentralized ABE with sublinear parameters ⋮ Unbounded quadratic functional encryption and more from pairings ⋮ Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ On the security of functional encryption in the generic group model ⋮ Unbounded predicate inner product functional encryption from pairings ⋮ Automated analysis of cryptographic assumptions in generic group models ⋮ Multi-input quadratic functional encryption: stronger security, broader functionality ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ Multi-client functional encryption with fine-grained access control ⋮ A survey on functional encryption ⋮ To label, or not to label (in generic groups) ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Streaming functional encryption ⋮ Inner-product functional encryption with fine-grained access control ⋮ Decentralized multi-client functional encryption for set intersection with improved efficiency ⋮ Tightly secure inner product functional encryption: multi-input and function-hiding constructions ⋮ Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps ⋮ Match me if you can: matchmaking encryption and its applications ⋮ Simple and efficient FE for quadratic functions ⋮ Optimal broadcast encryption from pairings and LWE ⋮ Impossibility results for lattice-based functional encryption schemes ⋮ Tightly CCA-secure inner product functional encryption scheme ⋮ Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification ⋮ Functional encryption for set intersection in the multi-client setting ⋮ Functional encryption for attribute-weighted sums from \(k\)-Lin ⋮ Generic transformation from broadcast encryption to round-optimal deniable ring authentication
This page was built for publication: Practical functional encryption for quadratic functions with applications to predicate encryption