Function-private functional encryption in the private-key setting
From MaRDI portal
Publication:5261681
DOI10.1007/978-3-662-46497-7_12zbMATH Open1334.94065OpenAlexW2117759786MaRDI QIDQ5261681FDOQ5261681
Authors: Zvika Brakerski, Gil Segev
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_12
Recommendations
- Function-private functional encryption in the private-key setting
- Functional encryption for inner product with full function privacy
- A new approach to practical function-private inner product encryption
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
Cited In (44)
- Multi-input quadratic functional encryption: stronger security, broader functionality
- Mergeable functional encryption
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- GeoENC: geometric area based keys and policies in functional encryption systems
- Function-private identity-based encryption: hiding the function in functional encryption
- Function-private subspace-membership encryption and its applications
- Title not available (Why is that?)
- Function-private functional encryption in the private-key setting
- Impossibility of order-revealing encryption in idealized models
- Functional encryption without obfuscation
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions
- Making public key functional encryption function private, distributively
- Private functional encryption: indistinguishability-based definitions and constructions from obfuscation
- Multi-client functional encryption for separable functions
- Order-revealing encryption and the hardness of private learning
- Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions
- Limits on the power of indistinguishability obfuscation and functional encryption
- Compactness vs collusion resistance in functional encryption
- Single-key to multi-key functional encryption with polynomial loss
- From Minicrypt to Obfustopia via private-key functional encryption
- Projective arithmetic functional encryption and indistinguishability obfuscation from degree-5 multilinear maps
- A new approach to practical function-private inner product encryption
- A survey on functional encryption
- Collusion resistant traitor tracing from learning with errors
- Registered (inner-product) functional encryption
- From minicrypt to obfustopia via private-key functional encryption
- Functional Encryption for Turing Machines
- Multi-input quadratic functional encryption from pairings
- White box traitor tracing
- Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions
- Unbounded quadratic functional encryption and more from pairings
- Deniable Functional Encryption
- Private functional signatures: definition and construction
- Functional encryption: deterministic to randomized functions from simple assumptions
- From cryptomania to obfustopia through secret-key functional encryption
- Actively Secure Private Function Evaluation
- Blind Functional Encryption
- On the optimal succinctness and efficiency of functional encryption and attribute-based encryption
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Strongly full-hiding inner product encryption
- Efficient inner product encryption with simulation-based security
- Dynamic decentralized functional encryption
- Functional encryption against probabilistic queries: definition, construction and applications
- Tightly secure inner product functional encryption: multi-input and function-hiding constructions
This page was built for publication: Function-private functional encryption in the private-key setting
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261681)