Simple Functional Encryption Schemes for Inner Products
From MaRDI portal
Publication:2941218
DOI10.1007/978-3-662-46447-2_33zbMath1345.94028OpenAlexW209244779WikidataQ56920961 ScholiaQ56920961MaRDI QIDQ2941218
Angelo De Caro, David Pointcheval, Florian Bourse, Michel Abdalla
Publication date: 27 August 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46447-2_33
Related Items (64)
Post-quantum secure inner product functional encryption using multivariate public key cryptography ⋮ A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency ⋮ Adaptive Simulation Security for Inner Product Functional Encryption ⋮ A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials ⋮ (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps ⋮ Multi-input quadratic functional encryption from pairings ⋮ Attribute-based versions of Schnorr and ElGamal ⋮ Attribute-based access control for inner product functional encryption from LWE ⋮ (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin ⋮ Multi-input non-interactive functional encryption: constructions and applications ⋮ Unbounded quadratic functional encryption and more from pairings ⋮ Hierarchical identity-based inner product functional encryption ⋮ Fine-grained verifier NIZK and its applications ⋮ Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded ⋮ Multi-client inner product encryption: function-hiding instantiations without random oracles ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ On the security of functional encryption in the generic group model ⋮ DFE-IP: delegatable functional encryption for inner product ⋮ Unbounded predicate inner product functional encryption from pairings ⋮ ABE for circuits with constant-size secret keys and adaptive security ⋮ Multi-input quadratic functional encryption: stronger security, broader functionality ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting ⋮ Multi-client functional encryption with fine-grained access control ⋮ Compact FE for unbounded attribute-weighted sums for logspace from SXDH ⋮ (Inner-product) functional encryption with updatable ciphertexts ⋮ A survey on functional encryption ⋮ Efficient lattice-based inner-product functional encryption ⋮ More efficient verifiable functional encryption ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Streaming functional encryption ⋮ Attribute-based multi-input FE (and more) for attribute-weighted sums ⋮ Succinct and adaptively secure ABE for ABP from \(k\)-Lin ⋮ Inner-product functional encryption with fine-grained access control ⋮ Decentralized multi-client functional encryption for set intersection with improved efficiency ⋮ Multi-party functional encryption ⋮ Verifiable functional encryption using Intel SGX ⋮ Inner-product functional encryption from random linear codes: trial and challenges ⋮ Decentralized multi-client functional encryption for inner product ⋮ Practical fully secure unrestricted inner product functional encryption modulo \(p\) ⋮ Achieving IND-CCA Security for Functional Encryption for Inner Products ⋮ Public key encryption with equality test from generic assumptions in the random oracle model ⋮ Efficient anonymous multi-group broadcast encryption ⋮ Tightly secure inner product functional encryption: multi-input and function-hiding constructions ⋮ Functional encryption for cubic polynomials and implementation ⋮ Strongly full-hiding inner product encryption ⋮ CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions ⋮ Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps ⋮ Multi-input Inner-Product Functional Encryption from Pairings ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Simple and efficient FE for quadratic functions ⋮ Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE ⋮ Impossibility results for lattice-based functional encryption schemes ⋮ Tightly CCA-secure inner product functional encryption scheme ⋮ Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification ⋮ Non-interactive anonymous router ⋮ Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption ⋮ Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys ⋮ Fully Secure Functional Encryption for Inner Products, from Standard Assumptions ⋮ Functional encryption for set intersection in the multi-client setting ⋮ A new approach to practical function-private inner product encryption ⋮ Functional encryption for attribute-weighted sums from \(k\)-Lin ⋮ Dynamic decentralized functional encryption
This page was built for publication: Simple Functional Encryption Schemes for Inner Products