A Punctured Programming Approach to Adaptively Secure Functional Encryption

From MaRDI portal
Publication:3457090

DOI10.1007/978-3-662-48000-7_33zbMath1351.94071OpenAlexW2295764142MaRDI QIDQ3457090

Brent Waters

Publication date: 10 December 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-48000-7_33



Related Items

White box traitor tracing, A New Functional Encryption for Multidimensional Range Query (Short Paper), Limits on the Power of Indistinguishability Obfuscation and Functional Encryption, Delegating RAM Computations with Adaptive Soundness and Privacy, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, From Cryptomania to Obfustopia Through Secret-Key Functional Encryption, Single-Key to Multi-Key Functional Encryption with Polynomial Loss, Compactness vs Collusion Resistance in Functional Encryption, Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience, Simpler constructions of asymmetric primitives from obfuscation, Watermarking Cryptographic Capabilities, From cryptomania to obfustopia through secret-key functional encryption, From minicrypt to obfustopia via private-key functional encryption, On constructing one-way permutations from indistinguishability obfuscation, Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption, Fully adaptive decentralized multi-authority \textsf{ABE}, Hierarchical identity-based inner product functional encryption, On the security of functional encryption in the generic group model, ABE for circuits with constant-size secret keys and adaptive security, Fully-secure MPC with minimal trust, (Inner-product) functional encryption with updatable ciphertexts, Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits, Constrained (Verifiable) Pseudorandom Function from Functional Encryption, Verifiable functional encryption using Intel SGX, Decentralized multi-client functional encryption for inner product, Practical fully secure unrestricted inner product functional encryption modulo \(p\), Tightly secure inner product functional encryption: multi-input and function-hiding constructions, Structure Versus Hardness Through the Obfuscation Lens, Functional encryption for randomized functionalities in the private-key setting from minimal assumptions, Function-private functional encryption in the private-key setting, Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions, Better Two-Round Adaptive Multi-party Computation, Universal Samplers with Fast Verification, From Minicrypt to Obfustopia via Private-Key Functional Encryption, Simplifying Design and Analysis of Complex Predicate Encryption Schemes, Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions, Cryptography with Updates, Unbounded inner product functional encryption from bilinear maps, Unbounded inner product functional encryption from bilinear maps, Functional Encryption for Turing Machines, Obfustopia built on secret-key functional encryption, On Constructing One-Way Permutations from Indistinguishability Obfuscation, Multi-input Functional Encryption and Its Application in Outsourcing Computation, Constrained pseudorandom functions from functional encryption, Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, Multi-client functional encryption for separable functions, Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security, Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation, Unnamed Item



Cites Work