Function-private identity-based encryption: hiding the function in functional encryption
From MaRDI portal
Publication:2849412
DOI10.1007/978-3-642-40084-1_26zbMATH Open1311.94071OpenAlexW165774471MaRDI QIDQ2849412FDOQ2849412
Authors: Dan Boneh, Ananth Raghunathan, Gil Segev
Publication date: 17 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40084-1_26
Recommendations
- Function-private subspace-membership encryption and its applications
- Function-private functional encryption in the private-key setting
- Function-private functional encryption in the private-key setting
- Functional encryption for inner product with full function privacy
- Public-key function-private hidden vector encryption (and more)
Cited In (33)
- Function-private subspace-membership encryption and its applications
- Function-private functional encryption in the private-key setting
- Simplifying design and analysis of complex predicate encryption schemes
- Indistinguishability obfuscation from compact functional encryption
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
- Robust encryption
- Making public key functional encryption function private, distributively
- Private functional encryption: indistinguishability-based definitions and constructions from obfuscation
- From Minicrypt to Obfustopia via private-key functional encryption
- A new approach to practical function-private inner product encryption
- A survey on functional encryption
- From minicrypt to obfustopia via private-key functional encryption
- Public-key function-private hidden vector encryption (and more)
- Public Key Encryption with Flexible Pattern Matching
- Pattern matching in encrypted stream from inner product encryption
- Constrained (Verifiable) Pseudorandom Function from Functional Encryption
- Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions
- Anonymous and leakage resilient IBE and IPE
- Efficient Asymmetric Index Encapsulation Scheme for Named Data
- Towards forward security properties for PEKS and IBE
- Generic constructions of integrated PKE and PEKS
- Functional encryption: deterministic to randomized functions from simple assumptions
- Impossibility results for lattice-based functional encryption schemes
- A public key identity-based revocation scheme: fully attribute-hiding and function private
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Constrained pseudorandom functions from functional encryption
- IBE Under $$k$$-LIN with Shorter Ciphertexts and Private Keys
- Strongly full-hiding inner product encryption
- Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric
- CPP: towards comprehensive privacy preserving for query processing in information networks
- Efficient inner product encryption with simulation-based security
- A study of pair encodings: predicate encryption in prime order groups
- Functional encryption against probabilistic queries: definition, construction and applications
This page was built for publication: Function-private identity-based encryption: hiding the function in functional encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2849412)