Fully Secure Functional Encryption for Inner Products, from Standard Assumptions

From MaRDI portal
Publication:2829952

DOI10.1007/978-3-662-53015-3_12zbMath1372.94408OpenAlexW2395093458MaRDI QIDQ2829952

Damien Stehlé, Shweta Agrawal, Benoît Libert

Publication date: 9 November 2016

Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53015-3_12



Related Items

A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency, Adaptive Simulation Security for Inner Product Functional Encryption, A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials, Adaptively secure distributed PRFs from LWE, Attribute-based access control for inner product functional encryption from LWE, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, Adaptively secure laconic function evaluation for \(\mathsf{NC}^1\), Optimal broadcast encryption and CP-ABE from evasive lattice assumptions, Verifiable inner product computation on outsourced database for authenticated multi-user data sharing, On the smoothing parameter and last minimum of random orthogonal lattices, Bounded-collusion decentralized ABE with sublinear parameters, (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin, Traitor tracing with \(N^{1/3}\)-size ciphertexts and \(O(1)\)-size keys from \(k\)-Lin, Hierarchical identity-based inner product functional encryption, Hardness of \(k\)-LWE and applications in traitor tracing, Multi-authority ABE for non-monotonic access structures, Fine-grained verifier NIZK and its applications, Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, On the security of functional encryption in the generic group model, DFE-IP: delegatable functional encryption for inner product, Unbounded predicate inner product functional encryption from pairings, ABE for circuits with constant-size secret keys and adaptive security, Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities, Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting, Privacy-enhanced and non-interactive linear regression with dropout-resilience, Multi-client functional encryption with fine-grained access control, Compact FE for unbounded attribute-weighted sums for logspace from SXDH, Witness encryption and null-iO from evasive LWE, (Inner-product) functional encryption with updatable ciphertexts, A survey on functional encryption, Efficient lattice-based inner-product functional encryption, More efficient verifiable functional encryption, Generic construction of trace-and-revoke inner product functional encryption, Streaming functional encryption, Adaptively secure inner product encryption from LWE, Succinct and adaptively secure ABE for ABP from \(k\)-Lin, Inner-product functional encryption with fine-grained access control, Decentralized multi-client functional encryption for set intersection with improved efficiency, Decentralized multi-client functional encryption for inner product, Practical fully secure unrestricted inner product functional encryption modulo \(p\), Achieving IND-CCA Security for Functional Encryption for Inner Products, Public key encryption with equality test from generic assumptions in the random oracle model, Collusion Resistant Traitor Tracing from Learning with Errors, Efficient Inner Product Encryption with Simulation-Based Security, Tightly secure inner product functional encryption: multi-input and function-hiding constructions, Functional encryption for cubic polynomials and implementation, CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions, Multi-input Inner-Product Functional Encryption from Pairings, Unbounded inner product functional encryption from bilinear maps, Unbounded inner product functional encryption from bilinear maps, Adaptively secure distributed PRFs from \(\mathsf{LWE}\), Simple and efficient FE for quadratic functions, Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE, Impossibility results for lattice-based functional encryption schemes, Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \), Tightly CCA-secure inner product functional encryption scheme, New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts, Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification, Non-interactive anonymous router, Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings, Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Functional encryption for set intersection in the multi-client setting, A new approach to practical function-private inner product encryption, Functional encryption for attribute-weighted sums from \(k\)-Lin, Dynamic decentralized functional encryption


Uses Software


Cites Work