Functional Encryption with Bounded Collusions via Multi-party Computation

From MaRDI portal
Publication:2914259

DOI10.1007/978-3-642-32009-5_11zbMath1296.94119OpenAlexW65414435MaRDI QIDQ2914259

Sergey Gorbunov, Hoeteck Wee, Vinod Vaikuntanathan

Publication date: 25 September 2012

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_11




Related Items (89)

Adaptive Simulation Security for Inner Product Functional EncryptionImpossibility of simulation secure functional encryption even with random oraclesTraitor-tracing from LWE made simple and attribute-basedSuccinct garbling schemes from functional encryption through a local simulation paradigmFunctional encryption for Turing machines with dynamic bounded collusion from LWEWhite box traitor tracingA New Functional Encryption for Multidimensional Range Query (Short Paper)Fast Pseudorandom Functions Based on Expander GraphsPredicate Encryption for Circuits from LWEFrom Selective to Adaptive Security in Functional EncryptionA Punctured Programming Approach to Adaptively Secure Functional EncryptionIndistinguishability Obfuscation from Compact Functional EncryptionDelegating RAM Computations with Adaptive Soundness and PrivacySemi-adaptive Security and Bundling Functionalities Made Generic and EasyFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceIndistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\)Incompressible cryptographyDynamic collusion bounded functional encryption from identity-based encryptionEfficient revocable identity-based encryption via subset difference methodsOn the power of rewinding simulators in functional encryptionFrom cryptomania to obfustopia through secret-key functional encryptionFrom minicrypt to obfustopia via private-key functional encryptionOptimal bounded-collusion secure functional encryptionFrom FE combiners to secure MPC and backSimulation-Based Secure Functional Encryption in the Random Oracle ModelApplied homomorphic cryptography: examplesBounded Collusion ABE for TMs from IBEVerifiable Functional EncryptionEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysFunctional encryption against probabilistic queries: definition, construction and applications(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesBounded functional encryption for Turing machines: adaptive security from general assumptionsABE for circuits with constant-size secret keys and adaptive securityRate-1 incompressible encryption from standard assumptionsAdaptive multiparty NIKEFunctional encryption with secure key leasingPublic key encryption with secure key leasingPublic-key watermarking schemes for pseudorandom functionsConstrained (Verifiable) Pseudorandom Function from Functional EncryptionA survey on functional encryptionEfficient lattice-based inner-product functional encryptionStreaming functional encryptionAttribute-based multi-input FE (and more) for attribute-weighted sumsTracing quantum state distinguishers via backtrackingAccess control encryption with efficient verifiable sanitized decryptionAdaptively secure inner product encryption from LWECollusion resistant trace-and-revoke for arbitrary identities from standard assumptionsDecentralized multi-client functional encryption for set intersection with improved efficiencyUnclonable encryption, revisitedABE for DFA from LWE against bounded collusions, revisitedDecentralized multi-client functional encryption for inner productPractical fully secure unrestricted inner product functional encryption modulo \(p\)Collusion Resistant Traitor Tracing from Learning with ErrorsEfficient Inner Product Encryption with Simulation-Based SecurityPractical Order-Revealing Encryption with Limited LeakageFunctional encryption for cubic polynomials and implementationFunctional encryption for randomized functionalities in the private-key setting from minimal assumptionsFunction-private functional encryption in the private-key settingStrongly full-hiding inner product encryptionSelf-updatable encryption: time constrained access control with hidden attributes and better efficiencyMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsOn the Semantic Security of Functional Encryption SchemesOn the complexity of compressing obfuscationBounded-Collusion Attribute-Based Encryption from Minimal AssumptionsFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionMulti-input Inner-Product Functional Encryption from PairingsOn Removing Graded Encodings from Functional EncryptionFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsVerifiable random functions from non-interactive witness-indistinguishable proofsSimple and generic constructions of succinct functional encryptionIndistinguishability Obfuscation: From Approximate to ExactFunctional Encryption for Turing MachinesObfustopia built on secret-key functional encryptionFunctional Encryption Without ObfuscationMulti-input Functional Encryption and Its Application in Outsourcing ComputationConstrained pseudorandom functions from functional encryptionCompact designated verifier NIZKs from the CDH assumption without pairingsCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsNew lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationMulti-client functional encryption for separable functionsAdaptively Secure Garbled Circuits from One-Way FunctionsFully Secure Functional Encryption for Inner Products, from Standard AssumptionsA new approach to practical function-private inner product encryptionUnnamed ItemGarbled Circuits as Randomized Encodings of Functions: a PrimerHomomorphic Encryption




This page was built for publication: Functional Encryption with Bounded Collusions via Multi-party Computation