Functional encryption for bounded collusions, revisited
From MaRDI portal
Publication:1690192
DOI10.1007/978-3-319-70500-2_7zbMath1410.94036OpenAlexW2765793266MaRDI QIDQ1690192
Publication date: 19 January 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-70500-2_7
Related Items
Adaptive Simulation Security for Inner Product Functional Encryption ⋮ Traitor-tracing from LWE made simple and attribute-based ⋮ Functional encryption for Turing machines with dynamic bounded collusion from LWE ⋮ Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper) ⋮ Adaptively secure laconic function evaluation for \(\mathsf{NC}^1\) ⋮ Dynamic collusion bounded functional encryption from identity-based encryption ⋮ Optimal bounded-collusion secure functional encryption ⋮ Public-key watermarking schemes for pseudorandom functions ⋮ Succinct LWE sampling, random polynomials, and obfuscation ⋮ Functional encryption for cubic polynomials and implementation ⋮ Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions ⋮ Obfustopia built on secret-key functional encryption ⋮ Impossibility results for lattice-based functional encryption schemes ⋮ New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts ⋮ Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification