On the Achievability of Simulation-Based Security for Functional Encryption

From MaRDI portal
Publication:2849415

DOI10.1007/978-3-642-40084-1_29zbMath1311.94077OpenAlexW2170297052MaRDI QIDQ2849415

Abhishek Jain, Angelo De Caro, Omer Paneth, Adam O'Neill, Giuseppe Persiano, Vincenzo Iovino

Publication date: 17 September 2013

Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-40084-1_29




Related Items (35)

Verifiable Inner Product Encryption SchemeImpossibility of simulation secure functional encryption even with random oraclesFrom Selective to Adaptive Security in Functional EncryptionIndistinguishability Obfuscation from Compact Functional EncryptionVirtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic AgentsFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionIndistinguishability Obfuscation for RAM Programs and Succinct Randomized EncodingsOn the power of rewinding simulators in functional encryptionFrom cryptomania to obfustopia through secret-key functional encryptionSimulation-Based Secure Functional Encryption in the Random Oracle ModelOn the optimal succinctness and efficiency of functional encryption and attribute-based encryptionBroadcast, trace and revoke with optimal parameters from polynomial hardnessMulti-input Functional Encryption with Unbounded-Message SecurityFunctional encryption with secure key leasingCollusion-resistant functional encryption for RAMsThe pseudorandom oracle model and ideal obfuscationLeakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled CircuitsVerifiable functional encryption using Intel SGXAdaptively simulation-secure attribute-hiding predicate encryptionPractical fully secure unrestricted inner product functional encryption modulo \(p\)Efficient Inner Product Encryption with Simulation-Based SecurityAnonymous spatial encryption under affine space delegation functionality with full securityFunctional encryption for randomized functionalities in the private-key setting from minimal assumptionsFunction-private functional encryption in the private-key settingStrongly full-hiding inner product encryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsCryptography with UpdatesFully secure functional encryption with a large class of relations from the decisional linear assumptionFunctional Encryption for Turing MachinesCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsA Unified Approach to Idealized Model Separations via Indistinguishability ObfuscationFully Secure Functional Encryption for Inner Products, from Standard AssumptionsA new approach to practical function-private inner product encryptionUnnamed Item






This page was built for publication: On the Achievability of Simulation-Based Security for Functional Encryption