Functional Encryption for Inner Product Predicates from Learning with Errors

From MaRDI portal
Publication:3102174

DOI10.1007/978-3-642-25385-0_2zbMath1227.94023OpenAlexW2146689436MaRDI QIDQ3102174

David M. Freeman, Shweta Agrawal, Vinod Vaikuntanathan

Publication date: 2 December 2011

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-25385-0_2




Related Items (37)

An efficient IBE scheme with tight security reduction in the random oracle modelAdaptive Simulation Security for Inner Product Functional EncryptionPredicate Encryption for Circuits from LWESemi-adaptive Security and Bundling Functionalities Made Generic and EasyDecentralized policy-hiding ABE with receiver privacyToward non-interactive zero-knowledge proofs for NP from LWEOn the power of rewinding simulators in functional encryptionTowards a Simpler Lattice Gadget ToolkitAnonymous and leakage resilient IBE and IPEAttribute based encryption for deterministic finite automata from DLINMulti-key and multi-input predicate encryption from learning with errorsLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesMulti-input attribute based encryption and predicate encryptionA survey on functional encryptionSpatial encryption revisited: from delegatable multiple inner product encryption and moreAttribute-based multi-input FE (and more) for attribute-weighted sumsAdaptively secure inner product encryption from LWEDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHDirect computation of branching programs and its applications to more efficient lattice-based cryptographyCompact (Targeted Homomorphic) Inner Product Encryption from LWECompact Inner Product Encryption from LWEBi-homomorphic Lattice-Based PRFs and Unidirectional Updatable EncryptionExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationDoubly spatial encryption from DBDHImproved (Hierarchical) Inner-Product Encryption from LatticesPrivate Puncturable PRFs from Standard Lattice AssumptionsWatermarking cryptographic functionalities from standard lattice assumptionsMulti-input Functional Encryption and Its Application in Outsourcing ComputationRevocable attribute-based proxy re-encryptionCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsImpossibility results for lattice-based functional encryption schemesDecentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionNon-zero Inner Product Encryption with Short Ciphertexts and Private KeysProgrammable Hash Functions from Lattices: Short Signatures and IBEs with Small Key SizesFully Secure Functional Encryption for Inner Products, from Standard AssumptionsIntegral matrix Gram root and lattice Gaussian sampling without floats




This page was built for publication: Functional Encryption for Inner Product Predicates from Learning with Errors