Functional Encryption: Definitions and Challenges
From MaRDI portal
Publication:3000543
DOI10.1007/978-3-642-19571-6_16zbMath1295.94027OpenAlexW1724472458MaRDI QIDQ3000543
Amit Sahai, Brent Waters, Dan Boneh
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_16
Related Items (only showing first 100 items - show all)
Identity-based re-encryption scheme with lightweight re-encryption key generation ⋮ Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation ⋮ Adaptive Simulation Security for Inner Product Functional Encryption ⋮ Verifiable Inner Product Encryption Scheme ⋮ A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials ⋮ Foundations of Functional Encryption ⋮ Pairing-Based Cryptography ⋮ A New Functional Encryption for Multidimensional Range Query (Short Paper) ⋮ Limits on the Power of Indistinguishability Obfuscation and Functional Encryption ⋮ Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation ⋮ Revocable Decentralized Multi-Authority Functional Encryption ⋮ Predicate Encryption for Circuits from LWE ⋮ From Selective to Adaptive Security in Functional Encryption ⋮ A Punctured Programming Approach to Adaptively Secure Functional Encryption ⋮ Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents ⋮ Deniable Attribute Based Encryption for Branching Programs from LWE ⋮ Semi-adaptive Security and Bundling Functionalities Made Generic and Easy ⋮ From Cryptomania to Obfustopia Through Secret-Key Functional Encryption ⋮ Single-Key to Multi-Key Functional Encryption with Polynomial Loss ⋮ Access Control Encryption: Enforcing Information Flow with Cryptography ⋮ Towards Forward Security Properties for PEKS and IBE ⋮ Simulation-Based Secure Functional Encryption in the Random Oracle Model ⋮ Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption ⋮ Secure Two-Party Computation: A Visual Way ⋮ Public Key Encryption with Flexible Pattern Matching ⋮ (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin ⋮ Quantum attribute-based encryption: a comprehensive study ⋮ Multi-input non-interactive functional encryption: constructions and applications ⋮ On the optimal succinctness and efficiency of functional encryption and attribute-based encryption ⋮ Unbounded quadratic functional encryption and more from pairings ⋮ Hierarchical identity-based inner product functional encryption ⋮ Efficient and universally composable single secret leader election from pairings ⋮ Pattern matching in encrypted stream from inner product encryption ⋮ Multi-input Functional Encryption with Unbounded-Message Security ⋮ Verifiable Functional Encryption ⋮ Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings ⋮ Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys ⋮ Multi-authority ABE for non-monotonic access structures ⋮ Functional encryption against probabilistic queries: definition, construction and applications ⋮ Fine-grained verifier NIZK and its applications ⋮ Decentralized multi-authority attribute-based inner-product FE: large universe and unbounded ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ DFE-IP: delegatable functional encryption for inner product ⋮ Unbounded predicate inner product functional encryption from pairings ⋮ Bounded functional encryption for Turing machines: adaptive security from general assumptions ⋮ ABE for circuits with constant-size secret keys and adaptive security ⋮ Multi-input quadratic functional encryption: stronger security, broader functionality ⋮ Fully-secure MPC with minimal trust ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ Functional encryption with secure key leasing ⋮ Multi-client functional encryption with fine-grained access control ⋮ Compact FE for unbounded attribute-weighted sums for logspace from SXDH ⋮ Collusion-resistant functional encryption for RAMs ⋮ Traceable receipt-free encryption ⋮ (Inner-product) functional encryption with updatable ciphertexts ⋮ Multi-input attribute based encryption and predicate encryption ⋮ How to build a trapdoor function from an encryption scheme ⋮ Public-key watermarking schemes for pseudorandom functions ⋮ Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits ⋮ Constrained (Verifiable) Pseudorandom Function from Functional Encryption ⋮ A survey on functional encryption ⋮ Efficient lattice-based inner-product functional encryption ⋮ PPAD is as hard as LWE and iterated squaring ⋮ More efficient verifiable functional encryption ⋮ Generic construction of trace-and-revoke inner product functional encryption ⋮ Achieving IND-CCA Security for Functional Encryption for Inner Products ⋮ Transforming Hidden Vector Encryption Schemes from Composite to Prime Order Groups ⋮ Expanded Framework for Dual System Encryption and Its Application ⋮ Compact Inner Product Encryption from LWE ⋮ Efficient Inner Product Encryption with Simulation-Based Security ⋮ Tightly secure inner product functional encryption: multi-input and function-hiding constructions ⋮ Functional Encryption: Origins and Recent Developments ⋮ On the Semantic Security of Functional Encryption Schemes ⋮ CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions ⋮ Access Control Encryption for Equality, Comparison, and More ⋮ From Minicrypt to Obfustopia via Private-Key Functional Encryption ⋮ Private Puncturable PRFs from Standard Lattice Assumptions ⋮ Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE ⋮ Multi-input Inner-Product Functional Encryption from Pairings ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ Cryptography with Updates ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Decomposable obfuscation: a framework for building applications of obfuscation from polynomial hardness ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Simple and generic constructions of succinct functional encryption ⋮ Obfustopia built on secret-key functional encryption ⋮ Functional Encryption for Cascade Automata (Extended Abstract) ⋮ Match me if you can: matchmaking encryption and its applications ⋮ Minicrypt primitives with algebraic structure and applications ⋮ Anonymous Encryption with Partial-Order Subset Delegation Functionality ⋮ Attribute-Based Encryption for Range Attributes ⋮ Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium ⋮ Fully Secure Functional Encryption for Inner Products, from Standard Assumptions ⋮ Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting ⋮ BehavioCog: An Observation Resistant Authentication Scheme ⋮ Unnamed Item ⋮ Homomorphic Encryption ⋮ Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity ⋮ Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software ⋮ Complementary set encryption for privacy-preserving data consolidation
This page was built for publication: Functional Encryption: Definitions and Challenges