On the achievability of simulation-based security for functional encryption
From MaRDI portal
Publication:2849415
Recommendations
- Simulation-based secure functional encryption in the random oracle model
- Impossibility of simulation secure functional encryption even with random oracles
- On the power of rewinding simulators in functional encryption
- Functional encryption: new perspectives and lower bounds
- Adaptive simulation security for inner product functional encryption
Cited in
(41)- Broadcast, trace and revoke with optimal parameters from polynomial hardness
- The pseudorandom oracle model and ideal obfuscation
- Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
- Fully secure functional encryption for inner products, from standard assumptions
- Verifiable Inner Product Encryption Scheme
- Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps
- Efficient inner product encryption with simulation-based security
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Impossibility of simulation secure functional encryption even with random oracles
- scientific article; zbMATH DE number 6866298 (Why is no real title available?)
- On the power of rewinding simulators in functional encryption
- On the relationships between notions of simulation-based security
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Collusion-resistant functional encryption for RAMs
- New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts
- From cryptomania to obfustopia through secret-key functional encryption
- A unified approach to idealized model separations via indistinguishability obfuscation
- From cryptomania to obfustopia through secret-key functional encryption
- Functional encryption with secure key leasing
- Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents
- Simulation based security in the applied pi calculus
- Cryptography with updates
- Lower bounds for lattice-based compact functional encryption
- Adaptively simulation-secure attribute-hiding predicate encryption
- Practical fully secure unrestricted inner product functional encryption modulo \(p\)
- Verifiable functional encryption using Intel SGX
- Multi-input functional encryption with unbounded-message security
- Function-private functional encryption in the private-key setting
- Encryption Simulatability Reconsidered
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Indistinguishability obfuscation from compact functional encryption
- Functional Encryption for Turing Machines
- Anonymous spatial encryption under affine space delegation functionality with full security
- A new approach to practical function-private inner product encryption
- On the optimal succinctness and efficiency of functional encryption and attribute-based encryption
- Strongly full-hiding inner product encryption
- Simulation-based secure functional encryption in the random oracle model
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- Non-black-box simulation from one-way functions and applications to resettable security
- From selective to adaptive security in functional encryption
- Functional encryption: deterministic to randomized functions from simple assumptions
This page was built for publication: On the achievability of simulation-based security for functional encryption
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2849415)