Adaptive Simulation Security for Inner Product Functional Encryption
From MaRDI portal
Publication:5041151
DOI10.1007/978-3-030-45374-9_2zbMath1500.94013OpenAlexW3021104834MaRDI QIDQ5041151
Shweta Agrawal, Monosij Maitra, Benoît Libert, Radu Titiu
Publication date: 13 October 2022
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-45374-9_2
Related Items (12)
A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency ⋮ Bounded-collusion decentralized ABE with sublinear parameters ⋮ (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin ⋮ Functional encryption against probabilistic queries: definition, construction and applications ⋮ (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin ⋮ Compact FE for unbounded attribute-weighted sums for logspace from SXDH ⋮ A survey on functional encryption ⋮ More efficient verifiable functional encryption ⋮ Succinct and adaptively secure ABE for ABP from \(k\)-Lin ⋮ Verifiable functional encryption using Intel SGX ⋮ Simple and efficient FE for quadratic functions ⋮ Functional encryption for attribute-weighted sums from \(k\)-Lin
Cites Work
- Kangaroos, monopoly and discrete logarithms
- Multi-input functional encryption for inner products: function-hiding realizations and constructions without pairings
- Stronger security for reusable garbled circuits, general definitions and attacks
- Indistinguishability obfuscation from SXDH on 5-linear maps and locality-5 PRGs
- Functional encryption for bounded collusions, revisited
- Attribute-hiding predicate encryption in bilinear groups, revisited
- Adaptively simulation-secure attribute-hiding predicate encryption
- Decentralized multi-client functional encryption for inner product
- Practical fully secure unrestricted inner product functional encryption modulo \(p\)
- Full-hiding (unbounded) multi-input inner product functional encryption from the \(k\)-linear assumption
- Efficient functional encryption for inner-product values with full-hiding security
- Functional Encryption for Inner Product with Full Function Privacy
- Functional Encryption Without Obfuscation
- Function-Hiding Inner Product Encryption
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- Functional Encryption: New Perspectives and Lower Bounds
- Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
- Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Simple Functional Encryption Schemes for Inner Products
- Identity-Based Cryptosystems and Signature Schemes
- Functional Encryption: Definitions and Challenges
- Functional Encryption for Inner Product Predicates from Learning with Errors
- Predicate Encryption for Circuits from LWE
- Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption
- Hierarchical Predicate Encryption for Inner-Products
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Identity-Based Encryption from the Weil Pairing
- Candidate Multilinear Maps from Ideal Lattices
- Fuzzy Identity-Based Encryption
- Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Attribute-based encryption for circuits
- Reusable garbled circuits and succinct functional encryption
- Classical hardness of learning with errors
- CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions
- Multi-input Inner-Product Functional Encryption from Pairings
- Dual System Encryption via Predicate Encodings
- On lattices, learning with errors, random linear codes, and cryptography
- Unbounded inner product functional encryption from bilinear maps
This page was built for publication: Adaptive Simulation Security for Inner Product Functional Encryption