Practical functional encryption for quadratic functions with applications to predicate encryption

From MaRDI portal
Publication:1675718

DOI10.1007/978-3-319-63688-7_3zbMath1407.94080OpenAlexW2604714373MaRDI QIDQ1675718

Dario Fiore, Romain Gay, Carmen Elisabetta Zaira Baltico, Dario Catalano

Publication date: 3 November 2017

Full work available at URL: https://doi.org/10.1007/978-3-319-63688-7_3




Related Items (34)

Verifiable Inner Product Encryption SchemeA New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsImpact of Group Theory in CryptosystemMulti-input quadratic functional encryption from pairingsAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceNew approaches to traitor tracing with embedded identitiesBounded-collusion decentralized ABE with sublinear parametersUnbounded quadratic functional encryption and more from pairingsTraitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linOn the security of functional encryption in the generic group modelUnbounded predicate inner product functional encryption from pairingsAutomated analysis of cryptographic assumptions in generic group modelsMulti-input quadratic functional encryption: stronger security, broader functionalityFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesMulti-client functional encryption with fine-grained access controlA survey on functional encryptionTo label, or not to label (in generic groups)Generic construction of trace-and-revoke inner product functional encryptionStreaming functional encryptionInner-product functional encryption with fine-grained access controlDecentralized multi-client functional encryption for set intersection with improved efficiencyTightly secure inner product functional encryption: multi-input and function-hiding constructionsProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsMatch me if you can: matchmaking encryption and its applicationsSimple and efficient FE for quadratic functionsOptimal broadcast encryption from pairings and LWEImpossibility results for lattice-based functional encryption schemesTightly CCA-secure inner product functional encryption schemeIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationFunctional encryption for set intersection in the multi-client settingFunctional encryption for attribute-weighted sums from \(k\)-LinGeneric transformation from broadcast encryption to round-optimal deniable ring authentication




This page was built for publication: Practical functional encryption for quadratic functions with applications to predicate encryption