Simple Functional Encryption Schemes for Inner Products

From MaRDI portal
Publication:2941218

DOI10.1007/978-3-662-46447-2_33zbMath1345.94028OpenAlexW209244779WikidataQ56920961 ScholiaQ56920961MaRDI QIDQ2941218

Angelo De Caro, David Pointcheval, Florian Bourse, Michel Abdalla

Publication date: 27 August 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46447-2_33




Related Items (64)

Post-quantum secure inner product functional encryption using multivariate public key cryptographyA tighter proof for CCA secure inner product functional encryption: genericity meets efficiencyAdaptive Simulation Security for Inner Product Functional EncryptionA New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear mapsMulti-input quadratic functional encryption from pairingsAttribute-based versions of Schnorr and ElGamalAttribute-based access control for inner product functional encryption from LWE(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-LinMulti-input non-interactive functional encryption: constructions and applicationsUnbounded quadratic functional encryption and more from pairingsHierarchical identity-based inner product functional encryptionFine-grained verifier NIZK and its applicationsDecentralized multi-authority attribute-based inner-product FE: large universe and unboundedMulti-client inner product encryption: function-hiding instantiations without random oracles(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linOn the security of functional encryption in the generic group modelDFE-IP: delegatable functional encryption for inner productUnbounded predicate inner product functional encryption from pairingsABE for circuits with constant-size secret keys and adaptive securityMulti-input quadratic functional encryption: stronger security, broader functionalityFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesReinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded settingMulti-client functional encryption with fine-grained access controlCompact FE for unbounded attribute-weighted sums for logspace from SXDH(Inner-product) functional encryption with updatable ciphertextsA survey on functional encryptionEfficient lattice-based inner-product functional encryptionMore efficient verifiable functional encryptionGeneric construction of trace-and-revoke inner product functional encryptionStreaming functional encryptionAttribute-based multi-input FE (and more) for attribute-weighted sumsSuccinct and adaptively secure ABE for ABP from \(k\)-LinInner-product functional encryption with fine-grained access controlDecentralized multi-client functional encryption for set intersection with improved efficiencyMulti-party functional encryptionVerifiable functional encryption using Intel SGXInner-product functional encryption from random linear codes: trial and challengesDecentralized multi-client functional encryption for inner productPractical fully secure unrestricted inner product functional encryption modulo \(p\)Achieving IND-CCA Security for Functional Encryption for Inner ProductsPublic key encryption with equality test from generic assumptions in the random oracle modelEfficient anonymous multi-group broadcast encryptionTightly secure inner product functional encryption: multi-input and function-hiding constructionsFunctional encryption for cubic polynomials and implementationStrongly full-hiding inner product encryptionCCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsMulti-input Inner-Product Functional Encryption from PairingsUnbounded inner product functional encryption from bilinear mapsUnbounded inner product functional encryption from bilinear mapsSimple and efficient FE for quadratic functionsIndistinguishability obfuscation without maps: attacks and fixes for noisy linear FEImpossibility results for lattice-based functional encryption schemesTightly CCA-secure inner product functional encryption schemeIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationNon-interactive anonymous routerChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysFully Secure Functional Encryption for Inner Products, from Standard AssumptionsFunctional encryption for set intersection in the multi-client settingA new approach to practical function-private inner product encryptionFunctional encryption for attribute-weighted sums from \(k\)-LinDynamic decentralized functional encryption




This page was built for publication: Simple Functional Encryption Schemes for Inner Products