Function-Hiding Inner Product Encryption
From MaRDI portal
Publication:2811143
DOI10.1007/978-3-662-48797-6_20zbMath1396.94061OpenAlexW2293203605MaRDI QIDQ2811143
Allison Bishop, Lucas Kowalczyk, Abhishek Jain
Publication date: 10 June 2016
Published in: Advances in Cryptology -- ASIACRYPT 2015 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48797-6_20
Related Items (33)
Post-quantum secure inner product functional encryption using multivariate public key cryptography ⋮ Adaptive Simulation Security for Inner Product Functional Encryption ⋮ Multi-input quadratic functional encryption from pairings ⋮ Unbounded quadratic functional encryption and more from pairings ⋮ Hierarchical identity-based inner product functional encryption ⋮ DFE-IP: delegatable functional encryption for inner product ⋮ Unbounded predicate inner product functional encryption from pairings ⋮ Multi-input quadratic functional encryption: stronger security, broader functionality ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ A survey on functional encryption ⋮ Indistinguishability obfuscation ⋮ Inner-product functional encryption with fine-grained access control ⋮ Decentralized multi-client functional encryption for set intersection with improved efficiency ⋮ Complexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting) ⋮ Multi-party functional encryption ⋮ Inner-product functional encryption from random linear codes: trial and challenges ⋮ Achieving IND-CCA Security for Functional Encryption for Inner Products ⋮ Efficient Inner Product Encryption with Simulation-Based Security ⋮ Efficient anonymous multi-group broadcast encryption ⋮ Tightly secure inner product functional encryption: multi-input and function-hiding constructions ⋮ Strongly full-hiding inner product encryption ⋮ CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions ⋮ Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps ⋮ Multi-input Inner-Product Functional Encryption from Pairings ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Impossibility results for lattice-based functional encryption schemes ⋮ Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) ⋮ Tightly CCA-secure inner product functional encryption scheme ⋮ Non-interactive anonymous router ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ Fully Secure Functional Encryption for Inner Products, from Standard Assumptions ⋮ A new approach to practical function-private inner product encryption
This page was built for publication: Function-Hiding Inner Product Encryption