Functional encryption: definitions and challenges
From MaRDI portal
Publication:3000543
DOI10.1007/978-3-642-19571-6_16zbMATH Open1295.94027OpenAlexW1724472458MaRDI QIDQ3000543FDOQ3000543
Authors: Dan Boneh, Amit Sahai, Brent Waters
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_16
Recommendations
Cited In (only showing first 100 items - show all)
- Post-quantum secure inner product functional encryption using multivariate public key cryptography
- Balancing access control and privacy for data deduplication via functional encryption
- Multi-input quadratic functional encryption: stronger security, broader functionality
- An efficient IBE scheme with tight security reduction in the random oracle model
- Self-updatable encryption with short public parameters and its extensions
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
- Spatial encryption supporting non-monotone access structure
- Privacy-preserving pattern matching on encrypted data
- GeoENC: geometric area based keys and policies in functional encryption systems
- Delegatable homomorphic encryption with applications to secure outsourcing of computation
- Candidate indistinguishability obfuscation and functional encryption for all circuits
- Functional encryption: new perspectives and lower bounds
- Attribute-based encryption schemes with constant-size ciphertexts
- Fully secure functional encryption for inner products, from standard assumptions
- CCA-secure inner-product functional encryption from projective hash functions
- Multi-input inner-product functional encryption from pairings
- Functional encryption for randomized functionalities
- Cutting-edge cryptography through the lens of secret sharing
- Impossibility of simulation secure functional encryption even with random oracles
- Upgrading to functional encryption
- FE and iO for Turing machines from minimal assumptions
- Cutting-edge cryptography through the lens of secret sharing
- Verifiable functional encryption
- Functional encryption without obfuscation
- Predicate encryption supporting disjunctions, polynomial equations, and inner products
- On the power of rewinding simulators in functional encryption
- A new paradigm for public-key functional encryption for degree-2 polynomials
- Multi-client functional encryption for separable functions
- Simulation-based secure functional encryption in the random oracle model
- From selective to adaptive security in functional encryption
- Output-compressing randomized encodings and applications
- Generalized closest substring encryption
- Limits on the power of indistinguishability obfuscation and functional encryption
- Single-key to multi-key functional encryption with polynomial loss
- From Minicrypt to Obfustopia via private-key functional encryption
- Patchable indistinguishability obfuscation: \(i\mathcal {O}\) for evolving software
- Private puncturable PRFs from standard lattice assumptions
- Functional encryption
- Functional encryption for attribute-weighted sums from \(k\)-Lin
- A new approach to practical function-private inner product encryption
- From cryptomania to obfustopia through secret-key functional encryption
- From minicrypt to obfustopia via private-key functional encryption
- Functional Encryption for Turing Machines
- BehavioCog: An Observation Resistant Authentication Scheme
- Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness
- Multi-party functional encryption
- Predicate encryption for circuits from LWE
- Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
- Semi-adaptive security and bundling functionalities made generic and easy
- Dual system encryption framework in prime-order groups via computational pair encodings
- Shorter identity-based encryption via asymmetric pairings
- Efficient revocable identity-based encryption via subset difference methods
- Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
- Round-optimal and communication-efficient multiparty computation
- The relation and transformation between hierarchical inner product encryption and spatial encryption
- Homomorphic encryption
- Revocable hierarchical identity-based encryption via history-free approach
- Functional encryption for regular languages
- Combiners for functional encryption, unconditionally
- From cryptomania to obfustopia through secret-key functional encryption
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation
- A punctured programming approach to adaptively secure functional encryption
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Verifiability-based conversion from CPA to CCA-secure predicate encryption
- Access control encryption: enforcing information flow with cryptography
- Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
- Anonymous spatial encryption under affine space delegation functionality with full security
- Functional encryption for Turing machines with dynamic bounded collusion from LWE
- Self-updatable encryption: time constrained access control with hidden attributes and better efficiency
- Strongly full-hiding inner product encryption
- Dynamic collusion bounded functional encryption from identity-based encryption
- Optimal bounded-collusion secure functional encryption
- Secure computation without computers
- Tightly secure inner product functional encryption: multi-input and function-hiding constructions
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
- Cryptographic agents: towards a unified theory of computing on encrypted data
- Updatable functional encryption
- Multi-input non-interactive functional encryption: constructions and applications
- Boolean searchable symmetric encryption with worst-case sub-linear complexity
- Efficient obfuscation for CNF circuits and applications in cloud computing
- Access control encryption from group encryption
- Public key encryption with equality test from generic assumptions in the random oracle model
- Deniable Attribute Based Encryption for Branching Programs from LWE
- Function-private functional encryption in the private-key setting
- Predicate signatures from pair encodings via dual system proof technique
- Fully secure functional encryption with a large class of relations from the decisional linear assumption
- Functional encryption for cascade automata
- Functional encryption: origins and recent developments
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
- Multi-input functional encryption and its application in outsourcing computation
- Private functional encryption: indistinguishability-based definitions and constructions from obfuscation
- Multi-input functional encryption with unbounded-message security
- Access Control Encryption for Equality, Comparison, and More
- Multi-authority ABE for non-monotonic access structures
- ABE for circuits with constant-size secret keys and adaptive security
- Multi-input quadratic functional encryption from pairings
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Efficient lattice-based inner-product functional encryption
This page was built for publication: Functional encryption: definitions and challenges
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000543)