scientific article; zbMATH DE number 6866298
From MaRDI portal
Publication:4638057
DOI10.4230/LIPIcs.ITCS.2017.8zbMath1402.68055MaRDI QIDQ4638057
Aayush Jain, Nishanth Chandran, Zvika Brakerski, Amit Sahai, Gil Segev, Vipul Goyal
Publication date: 3 May 2018
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (6)
Watermarkable public key encryption with efficient extraction under standard assumptions ⋮ A survey on functional encryption ⋮ Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation ⋮ Multi-party functional encryption ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ Unnamed Item
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Bonsai trees, or how to delegate a lattice basis
- Functional Encryption Without Obfuscation
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Functional Encryption: New Perspectives and Lower Bounds
- On the Achievability of Simulation-Based Security for Functional Encryption
- Constrained Pseudorandom Functions and Their Applications
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Semi-adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula
- Identity-Based Cryptosystems and Signature Schemes
- On the Cryptographic Applications of Random Functions (Extended Abstract)
- Functional Encryption: Definitions and Challenges
- Unbounded HIBE and Attribute-Based Encryption
- Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts
- From Selective to Adaptive Security in Functional Encryption
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Indistinguishability Obfuscation from Compact Functional Encryption
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Efficient Lattice (H)IBE in the Standard Model
- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE
- Hierarchical Identity Based Encryption with Polynomially Many Levels
- Hierarchical ID-Based Cryptography
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Indistinguishability Obfuscation from Functional Encryption
- Foundations of Cryptography
- How to use indistinguishability obfuscation
- Function-Private Functional Encryption in the Private-Key Setting
- Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions
- Advances in Cryptology - EUROCRYPT 2004
- Hierarchical Identity Based Encryption with Constant Size Ciphertext
- Fuzzy Identity-Based Encryption
- On the (im)possibility of obfuscating programs
- Functional Signatures and Pseudorandom Functions
- Why Proving HIBE Systems Secure Is Difficult
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
- Attribute-based encryption for circuits
- Reusable garbled circuits and succinct functional encryption
- Theory of Cryptography
- Two Round Multiparty Computation via Multi-key FHE
- Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
- On Extractability Obfuscation
- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
This page was built for publication: