From Selective to Adaptive Security in Functional Encryption

From MaRDI portal
Publication:3457089

DOI10.1007/978-3-662-48000-7_32zbMath1351.94021OpenAlexW2293331969MaRDI QIDQ3457089

Zvika Brakerski, Gil Segev, Vinod Vaikuntanathan, Prabhanjan V. Ananth

Publication date: 10 December 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://hdl.handle.net/1721.1/137827




Related Items (60)

Succinct garbling schemes from functional encryption through a local simulation paradigmFE and iO for Turing machines from minimal assumptionsWhite box traitor tracingLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionPrivate Functional Encryption: Indistinguishability-Based Definitions and Constructions from ObfuscationDelegating RAM Computations with Adaptive Soundness and PrivacyDeniable Attribute Based Encryption for Branching Programs from LWESemi-adaptive Security and Bundling Functionalities Made Generic and EasyFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionSingle-Key to Multi-Key Functional Encryption with Polynomial LossCompactness vs Collusion Resistance in Functional EncryptionAdventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functionsFrom cryptomania to obfustopia through secret-key functional encryptionFrom minicrypt to obfustopia via private-key functional encryptionFrom FE combiners to secure MPC and backOn constructing one-way permutations from indistinguishability obfuscationFully adaptive decentralized multi-authority \textsf{ABE}Broadcast, trace and revoke with optimal parameters from polynomial hardnessFunctional encryption against probabilistic queries: definition, construction and applicationsOn the security of functional encryption in the generic group modelFunctional encryption with secure key leasingCollusion-resistant functional encryption for RAMsConcurrently composable non-interactive secure computationPublic key encryption with secure key leasing(Inner-product) functional encryption with updatable ciphertextsThe pseudorandom oracle model and ideal obfuscationLeakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled CircuitsA survey on functional encryptionStreaming functional encryptionUnclonable encryption, revisitedAdaptively simulation-secure attribute-hiding predicate encryptionDecentralized multi-client functional encryption for inner productPractical fully secure unrestricted inner product functional encryption modulo \(p\)Functional broadcast encryption with applications to data sharing for cloud storageFunctional encryption for randomized functionalities in the private-key setting from minimal assumptionsFunction-private functional encryption in the private-key settingMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsSimple and generic constructions of succinct functional encryptionOutput-Compressing Randomized Encodings and ApplicationsFunctional Encryption for Turing MachinesObfustopia built on secret-key functional encryptionFunctional Encryption Without ObfuscationOn Constructing One-Way Permutations from Indistinguishability ObfuscationCombiners for functional encryption, unconditionallyNew lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationMulti-client functional encryption for separable functionsAdventures in crypto dark matter: attacks and fixes for weak pseudorandom functionsRevisiting the Cryptographic Hardness of Finding a Nash EquilibriumAdaptively Secure Garbled Circuits from One-Way FunctionsFully Secure Functional Encryption for Inner Products, from Standard AssumptionsCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityAmplifying the security of functional encryption, unconditionallyUnnamed ItemPseudorandom Functions: Three Decades LaterBreaking the Sub-Exponential Barrier in Obfustopia



Cites Work


This page was built for publication: From Selective to Adaptive Security in Functional Encryption