A Punctured Programming Approach to Adaptively Secure Functional Encryption
From MaRDI portal
Publication:3457090
DOI10.1007/978-3-662-48000-7_33zbMath1351.94071OpenAlexW2295764142MaRDI QIDQ3457090
Publication date: 10 December 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-48000-7_33
Related Items
White box traitor tracing, A New Functional Encryption for Multidimensional Range Query (Short Paper), Limits on the Power of Indistinguishability Obfuscation and Functional Encryption, Delegating RAM Computations with Adaptive Soundness and Privacy, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, From Cryptomania to Obfustopia Through Secret-Key Functional Encryption, Single-Key to Multi-Key Functional Encryption with Polynomial Loss, Compactness vs Collusion Resistance in Functional Encryption, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, Simpler constructions of asymmetric primitives from obfuscation, Watermarking Cryptographic Capabilities, From cryptomania to obfustopia through secret-key functional encryption, From minicrypt to obfustopia via private-key functional encryption, On constructing one-way permutations from indistinguishability obfuscation, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Fully adaptive decentralized multi-authority \textsf{ABE}, Hierarchical identity-based inner product functional encryption, On the security of functional encryption in the generic group model, ABE for circuits with constant-size secret keys and adaptive security, Fully-secure MPC with minimal trust, (Inner-product) functional encryption with updatable ciphertexts, Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits, Constrained (Verifiable) Pseudorandom Function from Functional Encryption, Verifiable functional encryption using Intel SGX, Decentralized multi-client functional encryption for inner product, Practical fully secure unrestricted inner product functional encryption modulo \(p\), Tightly secure inner product functional encryption: multi-input and function-hiding constructions, Structure Versus Hardness Through the Obfuscation Lens, Functional encryption for randomized functionalities in the private-key setting from minimal assumptions, Function-private functional encryption in the private-key setting, Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions, Better Two-Round Adaptive Multi-party Computation, Universal Samplers with Fast Verification, From Minicrypt to Obfustopia via Private-Key Functional Encryption, Simplifying Design and Analysis of Complex Predicate Encryption Schemes, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, Cryptography with Updates, Unbounded inner product functional encryption from bilinear maps, Unbounded inner product functional encryption from bilinear maps, Functional Encryption for Turing Machines, Obfustopia built on secret-key functional encryption, On Constructing One-Way Permutations from Indistinguishability Obfuscation, Multi-input Functional Encryption and Its Application in Outsourcing Computation, Constrained pseudorandom functions from functional encryption, Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, Multi-client functional encryption for separable functions, Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security, Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation, Unnamed Item
Cites Work
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Functional Encryption: Definitions and Challenges
- Conjunctive, Subset, and Range Queries on Encrypted Data
- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles
- Fuzzy Identity-Based Encryption
- On the (im)possibility of obfuscating programs
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- On Extractability Obfuscation