Functional Encryption with Bounded Collusions via Multi-party Computation
From MaRDI portal
Publication:2914259
DOI10.1007/978-3-642-32009-5_11zbMath1296.94119OpenAlexW65414435MaRDI QIDQ2914259
Sergey Gorbunov, Hoeteck Wee, Vinod Vaikuntanathan
Publication date: 25 September 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-32009-5_11
Related Items (89)
Adaptive Simulation Security for Inner Product Functional Encryption ⋮ Impossibility of simulation secure functional encryption even with random oracles ⋮ Traitor-tracing from LWE made simple and attribute-based ⋮ Succinct garbling schemes from functional encryption through a local simulation paradigm ⋮ Functional encryption for Turing machines with dynamic bounded collusion from LWE ⋮ White box traitor tracing ⋮ A New Functional Encryption for Multidimensional Range Query (Short Paper) ⋮ Fast Pseudorandom Functions Based on Expander Graphs ⋮ Predicate Encryption for Circuits from LWE ⋮ From Selective to Adaptive Security in Functional Encryption ⋮ A Punctured Programming Approach to Adaptively Secure Functional Encryption ⋮ Indistinguishability Obfuscation from Compact Functional Encryption ⋮ Delegating RAM Computations with Adaptive Soundness and Privacy ⋮ Semi-adaptive Security and Bundling Functionalities Made Generic and Easy ⋮ From Cryptomania to Obfustopia Through Secret-Key Functional Encryption ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\) ⋮ Incompressible cryptography ⋮ Dynamic collusion bounded functional encryption from identity-based encryption ⋮ Efficient revocable identity-based encryption via subset difference methods ⋮ On the power of rewinding simulators in functional encryption ⋮ From cryptomania to obfustopia through secret-key functional encryption ⋮ From minicrypt to obfustopia via private-key functional encryption ⋮ Optimal bounded-collusion secure functional encryption ⋮ From FE combiners to secure MPC and back ⋮ Simulation-Based Secure Functional Encryption in the Random Oracle Model ⋮ Applied homomorphic cryptography: examples ⋮ Bounded Collusion ABE for TMs from IBE ⋮ Verifiable Functional Encryption ⋮ Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys ⋮ Functional encryption against probabilistic queries: definition, construction and applications ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices ⋮ Bounded functional encryption for Turing machines: adaptive security from general assumptions ⋮ ABE for circuits with constant-size secret keys and adaptive security ⋮ Rate-1 incompressible encryption from standard assumptions ⋮ Adaptive multiparty NIKE ⋮ Functional encryption with secure key leasing ⋮ Public key encryption with secure key leasing ⋮ Public-key watermarking schemes for pseudorandom functions ⋮ Constrained (Verifiable) Pseudorandom Function from Functional Encryption ⋮ A survey on functional encryption ⋮ Efficient lattice-based inner-product functional encryption ⋮ Streaming functional encryption ⋮ Attribute-based multi-input FE (and more) for attribute-weighted sums ⋮ Tracing quantum state distinguishers via backtracking ⋮ Access control encryption with efficient verifiable sanitized decryption ⋮ Adaptively secure inner product encryption from LWE ⋮ Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions ⋮ Decentralized multi-client functional encryption for set intersection with improved efficiency ⋮ Unclonable encryption, revisited ⋮ ABE for DFA from LWE against bounded collusions, revisited ⋮ Decentralized multi-client functional encryption for inner product ⋮ Practical fully secure unrestricted inner product functional encryption modulo \(p\) ⋮ Collusion Resistant Traitor Tracing from Learning with Errors ⋮ Efficient Inner Product Encryption with Simulation-Based Security ⋮ Practical Order-Revealing Encryption with Limited Leakage ⋮ Functional encryption for cubic polynomials and implementation ⋮ Functional encryption for randomized functionalities in the private-key setting from minimal assumptions ⋮ Function-private functional encryption in the private-key setting ⋮ Strongly full-hiding inner product encryption ⋮ Self-updatable encryption: time constrained access control with hidden attributes and better efficiency ⋮ Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions ⋮ On the Semantic Security of Functional Encryption Schemes ⋮ On the complexity of compressing obfuscation ⋮ Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions ⋮ From Minicrypt to Obfustopia via Private-Key Functional Encryption ⋮ Multi-input Inner-Product Functional Encryption from Pairings ⋮ On Removing Graded Encodings from Functional Encryption ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ Verifiable random functions from non-interactive witness-indistinguishable proofs ⋮ Simple and generic constructions of succinct functional encryption ⋮ Indistinguishability Obfuscation: From Approximate to Exact ⋮ Functional Encryption for Turing Machines ⋮ Obfustopia built on secret-key functional encryption ⋮ Functional Encryption Without Obfuscation ⋮ Multi-input Functional Encryption and Its Application in Outsourcing Computation ⋮ Constrained pseudorandom functions from functional encryption ⋮ Compact designated verifier NIZKs from the CDH assumption without pairings ⋮ Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits ⋮ New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts ⋮ Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification ⋮ Multi-client functional encryption for separable functions ⋮ Adaptively Secure Garbled Circuits from One-Way Functions ⋮ Fully Secure Functional Encryption for Inner Products, from Standard Assumptions ⋮ A new approach to practical function-private inner product encryption ⋮ Unnamed Item ⋮ Garbled Circuits as Randomized Encodings of Functions: a Primer ⋮ Homomorphic Encryption
This page was built for publication: Functional Encryption with Bounded Collusions via Multi-party Computation