Function-private functional encryption in the private-key setting
From MaRDI portal
Publication:1747663
DOI10.1007/s00145-017-9255-yzbMath1426.94085OpenAlexW2605617287WikidataQ120914563 ScholiaQ120914563MaRDI QIDQ1747663
Publication date: 26 April 2018
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-017-9255-y
Related Items (9)
From cryptomania to obfustopia through secret-key functional encryption ⋮ Broadcast, trace and revoke with optimal parameters from polynomial hardness ⋮ Functional encryption with secure key leasing ⋮ Public key encryption with secure key leasing ⋮ A survey on functional encryption ⋮ Streaming functional encryption ⋮ Simple and generic constructions of succinct functional encryption ⋮ Obfustopia built on secret-key functional encryption ⋮ Multi-client functional encryption for separable functions
Cites Work
- Functional Encryption Without Obfuscation
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
- Functional Encryption: New Perspectives and Lower Bounds
- On the Achievability of Simulation-Based Security for Functional Encryption
- How to Run Turing Machines on Encrypted Data
- Function-Private Subspace-Membership Encryption and Its Applications
- Functional Encryption with Bounded Collusions via Multi-party Computation
- On the Practical Security of Inner Product Functional Encryption
- Identity-Based Cryptosystems and Signature Schemes
- Functional Encryption: Definitions and Challenges
- Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
- From Cryptomania to Obfustopia Through Secret-Key Functional Encryption
- From Selective to Adaptive Security in Functional Encryption
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Predicate Privacy in Encryption Systems
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Identity-Based Encryption from the Weil Pairing
- How to use indistinguishability obfuscation
- Functional Encryption for Randomized Functionalities
- Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
- Multi-input Functional Encryption
- Reusable garbled circuits and succinct functional encryption
- Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
- On Extractability Obfuscation
This page was built for publication: Function-private functional encryption in the private-key setting