Functional encryption: definitions and challenges
From MaRDI portal
Publication:3000543
Recommendations
Cited in
(only showing first 100 items - show all)- Bounded functional encryption for Turing machines: adaptive security from general assumptions
- Functional encryption against probabilistic queries: definition, construction and applications
- Post-quantum secure inner product functional encryption using multivariate public key cryptography
- Balancing access control and privacy for data deduplication via functional encryption
- Tightly secure inner product functional encryption: multi-input and function-hiding constructions
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- Cryptographic agents: towards a unified theory of computing on encrypted data
- An efficient IBE scheme with tight security reduction in the random oracle model
- Self-updatable encryption with short public parameters and its extensions
- Updatable functional encryption
- Multi-input quadratic functional encryption: stronger security, broader functionality
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
- Compact FE for unbounded attribute-weighted sums for logspace from SXDH
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- Public-key watermarking schemes for pseudorandom functions
- Bicameral and auditably private signatures
- Spatial encryption supporting non-monotone access structure
- Functional broadcast encryption with applications to data sharing for cloud storage
- Privacy-preserving pattern matching on encrypted data
- More efficient verifiable functional encryption
- Multi-input non-interactive functional encryption: constructions and applications
- (Inner-product) functional encryption with updatable ciphertexts
- GeoENC: geometric area based keys and policies in functional encryption systems
- Secure two-party computation: a visual way
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Delegatable homomorphic encryption with applications to secure outsourcing of computation
- Functional encryption: new perspectives and lower bounds
- Boolean searchable symmetric encryption with worst-case sub-linear complexity
- Attribute-based encryption schemes with constant-size ciphertexts
- Efficient obfuscation for CNF circuits and applications in cloud computing
- Access control encryption from group encryption
- Efficient anonymous multi-group broadcast encryption
- Public key encryption with equality test from generic assumptions in the random oracle model
- Foundations of functional encryption
- Function-private functional encryption in the private-key setting
- scientific article; zbMATH DE number 6866298 (Why is no real title available?)
- Deniable Attribute Based Encryption for Branching Programs from LWE
- Predicate signatures from pair encodings via dual system proof technique
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- Functional encryption for cascade automata
- Fully secure IBE with tighter reduction in prime order bilinear groups
- Beyond MPC-in-the-head: black-box constructions of short zero-knowledge proofs
- Security with functional re-encryption from CPA
- Fully secure functional encryption for inner products, from standard assumptions
- Functional encryption: origins and recent developments
- CCA-secure inner-product functional encryption from projective hash functions
- Multi-input inner-product functional encryption from pairings
- Cutting-edge cryptography through the lens of secret sharing
- Impossibility of simulation secure functional encryption even with random oracles
- Upgrading to functional encryption
- FE and iO for Turing machines from minimal assumptions
- Cutting-edge cryptography through the lens of secret sharing
- Verifiable functional encryption
- Identity-based encryption with hierarchical key-insulation in the standard model
- Functional encryption for randomized functionalities
- Minicrypt primitives with algebraic structure and applications
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
- Functional encryption without obfuscation
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- On the power of rewinding simulators in functional encryption
- Generalized closest substring encryption
- Verifiable Inner Product Encryption Scheme
- Multi-input functional encryption and its application in outsourcing computation
- Multi-client functional encryption for separable functions
- Multi-input functional encryption with unbounded-message security
- Private functional encryption: indistinguishability-based definitions and constructions from obfuscation
- Simulation-based secure functional encryption in the random oracle model
- Output-compressing randomized encodings and applications
- From selective to adaptive security in functional encryption
- A new paradigm for public-key functional encryption for degree-2 polynomials
- Limits on the power of indistinguishability obfuscation and functional encryption
- Single-key to multi-key functional encryption with polynomial loss
- Access Control Encryption for Equality, Comparison, and More
- Fine-grained polynomial functional encryption
- Functional encryption
- Quantum attribute-based encryption: a comprehensive study
- Functional encryption for attribute-weighted sums from \(k\)-Lin
- Patchable indistinguishability obfuscation: \(i\mathcal {O}\) for evolving software
- From Minicrypt to Obfustopia via private-key functional encryption
- Private puncturable PRFs from standard lattice assumptions
- A new approach to practical function-private inner product encryption
- From cryptomania to obfustopia through secret-key functional encryption
- From minicrypt to obfustopia via private-key functional encryption
- A survey on functional encryption
- Functional Encryption for Turing Machines
- Hierarchical identity-based inner product functional encryption
- Multi-input quadratic functional encryption from pairings
- Non-interactive zero-knowledge functional proofs
- Registered (inner-product) functional encryption
- Robust decentralized multi-client functional encryption: motivation, definition, and inner-product constructions
- Verifiable decentralized multi-client functional encryption for inner product
- Multi-authority ABE for non-monotonic access structures
- ABE for circuits with constant-size secret keys and adaptive security
- Unbounded inner product functional encryption from bilinear maps
- Unbounded inner product functional encryption from bilinear maps
- Transforming hidden vector encryption schemes from composite to prime order groups
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Efficient lattice-based inner-product functional encryption
- Public Key Encryption with Flexible Pattern Matching
This page was built for publication: Functional encryption: definitions and challenges
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000543)