Functional encryption for randomized functionalities
From MaRDI portal
Publication:5261682
Recommendations
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Functional encryption: deterministic to randomized functions from simple assumptions
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Functional encryption: definitions and challenges
- Private functional encryption: indistinguishability-based definitions and constructions from obfuscation
Cited in
(29)- Functional encryption against probabilistic queries: definition, construction and applications
- Mergeable functional encryption
- Functional broadcast encryption with applications to data sharing for cloud storage
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Function-private functional encryption in the private-key setting
- scientific article; zbMATH DE number 6866298 (Why is no real title available?)
- On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
- Making public key functional encryption function private, distributively
- Limits on the power of indistinguishability obfuscation and functional encryption
- An efficient CCA-secure access control encryption for any policy
- From cryptomania to obfustopia through secret-key functional encryption
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Functional Encryption for Turing Machines
- Functional encryption: definitions and challenges
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Verifiable computation for randomized algorithm
- Constrained (Verifiable) Pseudorandom Function from Functional Encryption
- Match me if you can: matchmaking encryption and its applications
- Cryptographically resilient functions
- CRYPTAUTOMATA WITH FUNCTIONAL KEYS
- Compact \textsf{FE} for unbounded attribute-weighted sums for logspace from \textsf{SXDH}
- Deniable Functional Encryption
- Functional encryption: deterministic to randomized functions from simple assumptions
- Access control encryption with efficient verifiable sanitized decryption
- From cryptomania to obfustopia through secret-key functional encryption
- Steel: composable hardware-based stateful and randomised functional encryption
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Constrained pseudorandom functions from functional encryption
- Dynamic decentralized functional encryption
This page was built for publication: Functional encryption for randomized functionalities
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261682)