Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
From MaRDI portal
Publication:2849412
DOI10.1007/978-3-642-40084-1_26zbMath1311.94071OpenAlexW165774471MaRDI QIDQ2849412
Ananth Raghunathan, Dan Boneh, Gil Segev
Publication date: 17 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40084-1_26
Related Items (29)
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation ⋮ Indistinguishability Obfuscation from Compact Functional Encryption ⋮ Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions ⋮ Towards Forward Security Properties for PEKS and IBE ⋮ IBE Under $$k$$-LIN with Shorter Ciphertexts and Private Keys ⋮ From minicrypt to obfustopia via private-key functional encryption ⋮ Anonymous and leakage resilient IBE and IPE ⋮ Public Key Encryption with Flexible Pattern Matching ⋮ Pattern matching in encrypted stream from inner product encryption ⋮ Efficient Asymmetric Index Encapsulation Scheme for Named Data ⋮ Functional encryption against probabilistic queries: definition, construction and applications ⋮ Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric ⋮ Constrained (Verifiable) Pseudorandom Function from Functional Encryption ⋮ A survey on functional encryption ⋮ CPP: towards comprehensive privacy preserving for query processing in information networks ⋮ Efficient Inner Product Encryption with Simulation-Based Security ⋮ Functional encryption for randomized functionalities in the private-key setting from minimal assumptions ⋮ Function-private functional encryption in the private-key setting ⋮ Strongly full-hiding inner product encryption ⋮ Robust encryption ⋮ Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions ⋮ From Minicrypt to Obfustopia via Private-Key Functional Encryption ⋮ Simplifying Design and Analysis of Complex Predicate Encryption Schemes ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ A Study of Pair Encodings: Predicate Encryption in Prime Order Groups ⋮ Generic constructions of integrated PKE and PEKS ⋮ Constrained pseudorandom functions from functional encryption ⋮ Impossibility results for lattice-based functional encryption schemes ⋮ A new approach to practical function-private inner product encryption
This page was built for publication: Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption