Functional Encryption Without Obfuscation

From MaRDI portal
Publication:2799106

DOI10.1007/978-3-662-49099-0_18zbMath1382.94107OpenAlexW2295244449MaRDI QIDQ2799106

Craig Gentry, Sanjam Garg, Mark Zhandry, Shai Halevi

Publication date: 8 April 2016

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-49099-0_18




Related Items (52)

Adaptive Simulation Security for Inner Product Functional Encryption(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksMulti-input quadratic functional encryption from pairingsA New Functional Encryption for Multidimensional Range Query (Short Paper)From Cryptomania to Obfustopia Through Secret-Key Functional EncryptionIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsCryptanalysis of multilinear maps from ideal lattices: revisitedFrom cryptomania to obfustopia through secret-key functional encryptionFrom minicrypt to obfustopia via private-key functional encryptionFrom FE combiners to secure MPC and backEfficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA SecurityUnbounded quadratic functional encryption and more from pairingsUniversally Composable Cryptographic Role-Based Access ControlCryptanalysis of the CLT13 multilinear mapMulti-input quadratic functional encryption: stronger security, broader functionalityFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesA survey on functional encryptionGeneric construction of trace-and-revoke inner product functional encryptionStreaming functional encryptionPractical fully secure unrestricted inner product functional encryption modulo \(p\)Public key encryption with equality test from generic assumptions in the random oracle modelArrangements of Pseudocircles: Triangles and DrawingsTightly secure inner product functional encryption: multi-input and function-hiding constructionsPractical Order-Revealing Encryption with Limited LeakageFunction-private functional encryption in the private-key settingMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsCCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionMulti-input Inner-Product Functional Encryption from PairingsSimplifying Design and Analysis of Complex Predicate Encryption SchemesOn Removing Graded Encodings from Functional EncryptionFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsCryptography with UpdatesUnbounded inner product functional encryption from bilinear mapsDecomposable obfuscation: a framework for building applications of obfuscation from polynomial hardnessUnbounded inner product functional encryption from bilinear mapsIndistinguishability Obfuscation: From Approximate to ExactOrder-Revealing Encryption and the Hardness of Private LearningMulti-input Functional Encryption and Its Application in Outsourcing ComputationConstrained pseudorandom functions from functional encryptionSimple and efficient FE for quadratic functionsTightly CCA-secure inner product functional encryption schemeChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionMulti-client functional encryption for separable functionsRevisiting the Cryptographic Hardness of Finding a Nash EquilibriumA new approach to practical function-private inner product encryptionAmplifying the security of functional encryption, unconditionallyUnnamed ItemBreaking the Sub-Exponential Barrier in ObfustopiaCryptanalyses of Candidate Branching Program Obfuscators



Cites Work


This page was built for publication: Functional Encryption Without Obfuscation