Functional Encryption: Definitions and Challenges

From MaRDI portal
Publication:3000543

DOI10.1007/978-3-642-19571-6_16zbMath1295.94027OpenAlexW1724472458MaRDI QIDQ3000543

Amit Sahai, Brent Waters, Dan Boneh

Publication date: 19 May 2011

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_16




Related Items (only showing first 100 items - show all)

Identity-based re-encryption scheme with lightweight re-encryption key generationDelegatable Homomorphic Encryption with Applications to Secure Outsourcing of ComputationAdaptive Simulation Security for Inner Product Functional EncryptionVerifiable Inner Product Encryption SchemeA New Paradigm for Public-Key Functional Encryption for Degree-2 PolynomialsFoundations of Functional EncryptionPairing-Based CryptographyA New Functional Encryption for Multidimensional Range Query (Short Paper)Limits on the Power of Indistinguishability Obfuscation and Functional EncryptionPrivate Functional Encryption: Indistinguishability-Based Definitions and Constructions from ObfuscationRevocable Decentralized Multi-Authority Functional EncryptionPredicate Encryption for Circuits from LWEFrom Selective to Adaptive Security in Functional EncryptionA Punctured Programming Approach to Adaptively Secure Functional EncryptionVirtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic AgentsDeniable Attribute Based Encryption for Branching Programs from LWESemi-adaptive Security and Bundling Functionalities Made Generic and EasyFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionSingle-Key to Multi-Key Functional Encryption with Polynomial LossAccess Control Encryption: Enforcing Information Flow with CryptographyTowards Forward Security Properties for PEKS and IBESimulation-Based Secure Functional Encryption in the Random Oracle ModelEfficient Statically-Secure Large-Universe Multi-Authority Attribute-Based EncryptionSecure Two-Party Computation: A Visual WayPublic Key Encryption with Flexible Pattern Matching(Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-LinQuantum attribute-based encryption: a comprehensive studyMulti-input non-interactive functional encryption: constructions and applicationsOn the optimal succinctness and efficiency of functional encryption and attribute-based encryptionUnbounded quadratic functional encryption and more from pairingsHierarchical identity-based inner product functional encryptionEfficient and universally composable single secret leader election from pairingsPattern matching in encrypted stream from inner product encryptionMulti-input Functional Encryption with Unbounded-Message SecurityVerifiable Functional EncryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysMulti-authority ABE for non-monotonic access structuresFunctional encryption against probabilistic queries: definition, construction and applicationsFine-grained verifier NIZK and its applicationsDecentralized multi-authority attribute-based inner-product FE: large universe and unbounded(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linDFE-IP: delegatable functional encryption for inner productUnbounded predicate inner product functional encryption from pairingsBounded functional encryption for Turing machines: adaptive security from general assumptionsABE for circuits with constant-size secret keys and adaptive securityMulti-input quadratic functional encryption: stronger security, broader functionalityFully-secure MPC with minimal trustFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesFunctional encryption with secure key leasingMulti-client functional encryption with fine-grained access controlCompact FE for unbounded attribute-weighted sums for logspace from SXDHCollusion-resistant functional encryption for RAMsTraceable receipt-free encryption(Inner-product) functional encryption with updatable ciphertextsMulti-input attribute based encryption and predicate encryptionHow to build a trapdoor function from an encryption schemePublic-key watermarking schemes for pseudorandom functionsLeakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled CircuitsConstrained (Verifiable) Pseudorandom Function from Functional EncryptionA survey on functional encryptionEfficient lattice-based inner-product functional encryptionPPAD is as hard as LWE and iterated squaringMore efficient verifiable functional encryptionGeneric construction of trace-and-revoke inner product functional encryptionAchieving IND-CCA Security for Functional Encryption for Inner ProductsTransforming Hidden Vector Encryption Schemes from Composite to Prime Order GroupsExpanded Framework for Dual System Encryption and Its ApplicationCompact Inner Product Encryption from LWEEfficient Inner Product Encryption with Simulation-Based SecurityTightly secure inner product functional encryption: multi-input and function-hiding constructionsFunctional Encryption: Origins and Recent DevelopmentsOn the Semantic Security of Functional Encryption SchemesCCA-Secure Inner-Product Functional Encryption from Projective Hash FunctionsAccess Control Encryption for Equality, Comparison, and MoreFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionPrivate Puncturable PRFs from Standard Lattice AssumptionsConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEMulti-input Inner-Product Functional Encryption from PairingsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsCryptography with UpdatesUnbounded inner product functional encryption from bilinear mapsDecomposable obfuscation: a framework for building applications of obfuscation from polynomial hardnessUnbounded inner product functional encryption from bilinear mapsSimple and generic constructions of succinct functional encryptionObfustopia built on secret-key functional encryptionFunctional Encryption for Cascade Automata (Extended Abstract)Match me if you can: matchmaking encryption and its applicationsMinicrypt primitives with algebraic structure and applicationsAnonymous Encryption with Partial-Order Subset Delegation FunctionalityAttribute-Based Encryption for Range AttributesRevisiting the Cryptographic Hardness of Finding a Nash EquilibriumFully Secure Functional Encryption for Inner Products, from Standard AssumptionsCiphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user SettingBehavioCog: An Observation Resistant Authentication SchemeUnnamed ItemHomomorphic EncryptionBoolean Searchable Symmetric Encryption with Worst-Case Sub-linear ComplexityPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving SoftwareComplementary set encryption for privacy-preserving data consolidation




This page was built for publication: Functional Encryption: Definitions and Challenges