Functional encryption: definitions and challenges
From MaRDI portal
Publication:3000543
DOI10.1007/978-3-642-19571-6_16zbMATH Open1295.94027OpenAlexW1724472458MaRDI QIDQ3000543FDOQ3000543
Authors: Dan Boneh, Amit Sahai, Brent Waters
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_16
Recommendations
Cited In (only showing first 100 items - show all)
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- Cryptographic agents: towards a unified theory of computing on encrypted data
- Updatable functional encryption
- Multi-input non-interactive functional encryption: constructions and applications
- Boolean searchable symmetric encryption with worst-case sub-linear complexity
- Efficient obfuscation for CNF circuits and applications in cloud computing
- Access control encryption from group encryption
- Public key encryption with equality test from generic assumptions in the random oracle model
- Deniable Attribute Based Encryption for Branching Programs from LWE
- Function-private functional encryption in the private-key setting
- Predicate signatures from pair encodings via dual system proof technique
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- Functional encryption for cascade automata
- Functional encryption: origins and recent developments
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
- Multi-input functional encryption and its application in outsourcing computation
- Private functional encryption: indistinguishability-based definitions and constructions from obfuscation
- Multi-input functional encryption with unbounded-message security
- Access Control Encryption for Equality, Comparison, and More
- Multi-authority ABE for non-monotonic access structures
- ABE for circuits with constant-size secret keys and adaptive security
- Multi-input quadratic functional encryption from pairings
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Efficient lattice-based inner-product functional encryption
- Attribute-based access control for inner product functional encryption from LWE
- Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)
- Optimizing registration based encryption
- Adaptive simulation security for inner product functional encryption
- Simple and efficient FE for quadratic functions
- Functional encryption: deterministic to randomized functions from simple assumptions
- Extended dual system group and shorter unbounded hierarchical identity based encryption
- Functional encryption from (small) hardware tokens
- Tightly CCA-secure inner product functional encryption scheme
- Non-interactive zero knowledge from sub-exponential DDH
- New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification
- Non-interactive anonymous router
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption
- Cryptography with updates
- A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency
- Adaptively secure laconic function evaluation for \(\mathsf{NC}^1\)
- From FE combiners to secure MPC and back
- Access control encryption with efficient verifiable sanitized decryption
- Steel: composable hardware-based stateful and randomised functional encryption
- Amplifying the security of functional encryption, unconditionally
- Verifiable registration-based encryption
- (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin
- On the optimal succinctness and efficiency of functional encryption and attribute-based encryption
- (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin
- Fully-secure MPC with minimal trust
- Functional encryption for set intersection in the multi-client setting
- DFE-IP: delegatable functional encryption for inner product
- Inner-product functional encryption with fine-grained access control
- Inner-product functional encryption from random linear codes: trial and challenges
- Optimal security notion for decentralized multi-client functional encryption
- Achieving IND-CCA Security for Functional Encryption for Inner Products
- Efficient statically-secure large-universe multi-authority attribute-based encryption
- Encoding functions with constant online rate, or how to compress garbled circuit keys
- Revocable decentralized multi-authority functional encryption
- Adaptively simulation-secure attribute-hiding predicate encryption
- Decentralized multi-client functional encryption for inner product
- Practical fully secure unrestricted inner product functional encryption modulo \(p\)
- A study of pair encodings: predicate encryption in prime order groups
- Dynamic decentralized functional encryption
- Post-quantum secure inner product functional encryption using multivariate public key cryptography
- Balancing access control and privacy for data deduplication via functional encryption
- Multi-input quadratic functional encryption: stronger security, broader functionality
- An efficient IBE scheme with tight security reduction in the random oracle model
- Self-updatable encryption with short public parameters and its extensions
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
- Spatial encryption supporting non-monotone access structure
- Privacy-preserving pattern matching on encrypted data
- GeoENC: geometric area based keys and policies in functional encryption systems
- Delegatable homomorphic encryption with applications to secure outsourcing of computation
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Functional encryption: new perspectives and lower bounds
- Attribute-based encryption schemes with constant-size ciphertexts
- Fully secure functional encryption for inner products, from standard assumptions
- CCA-secure inner-product functional encryption from projective hash functions
- Multi-input inner-product functional encryption from pairings
- Functional encryption for randomized functionalities
- Cutting-edge cryptography through the lens of secret sharing
- Impossibility of simulation secure functional encryption even with random oracles
- Upgrading to functional encryption
- FE and iO for Turing machines from minimal assumptions
- Cutting-edge cryptography through the lens of secret sharing
- Verifiable functional encryption
- Functional encryption without obfuscation
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- On the power of rewinding simulators in functional encryption
- A new paradigm for public-key functional encryption for degree-2 polynomials
- Multi-client functional encryption for separable functions
- Simulation-based secure functional encryption in the random oracle model
- From selective to adaptive security in functional encryption
- Output-compressing randomized encodings and applications
- Generalized closest substring encryption
- Limits on the power of indistinguishability obfuscation and functional encryption
- Single-key to multi-key functional encryption with polynomial loss
This page was built for publication: Functional encryption: definitions and challenges
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000543)