Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation

From MaRDI portal
Publication:2948396

DOI10.1007/978-3-662-46803-6_19zbMath1375.94105OpenAlexW754106230MaRDI QIDQ2948396

Amit Sahai, Mariana Raykova, Kevin Lewi, Joe Zimmerman, Dan Boneh, Mark Zhandry

Publication date: 30 September 2015

Published in: Advances in Cryptology - EUROCRYPT 2015 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-46803-6_19




Related Items (35)

Impossibility of order-revealing encryption in idealized modelsA ciphertext-size lower bound for order-preserving encryption with limited leakageCiphertext expansion in limited-leakage order-preserving encryption: a tight computational lower boundThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksReturn of GGH15: provable security against zeroizing attacksSecure Obfuscation in a Weak Multilinear Map ModelFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionEfficient multi-client order-revealing encryption and its applicationsDynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) securityCDPS: a cryptographic data publishing systemFrom cryptomania to obfustopia through secret-key functional encryptionFrom minicrypt to obfustopia via private-key functional encryptionMultilinear maps from obfuscationMulti-key and multi-input predicate encryption from learning with errorsMultiparty non-interactive key exchange and more from isogenies on elliptic curvesApproximate distance-comparison-preserving symmetric encryptionFinding one common item, privatelyAn Almost Non-interactive Order Preserving Encryption SchemeA survey on functional encryptionEnabling Compressed Encryption for Cloud Based Big Data StoresPractical Order-Revealing Encryption with Limited LeakageMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsZeroizing Attacks on Indistinguishability Obfuscation over CLT13From Minicrypt to Obfustopia via Private-Key Functional EncryptionMulti-input Inner-Product Functional Encryption from PairingsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsOrder-Revealing Encryption and the Hardness of Private LearningMultilinear Maps from ObfuscationHow to Avoid Obfuscation Using Witness PRFsCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsAnnihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13Integer polynomial recovery from outputs and its application to cryptanalysis of a protocol for secure sortingLower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe modelBreaking the Sub-Exponential Barrier in ObfustopiaAd Hoc PSM Protocols: Secure Computation Without Coordination




This page was built for publication: Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation