Functional Encryption for Randomized Functionalities
From MaRDI portal
Publication:5261682
DOI10.1007/978-3-662-46497-7_13zbMATH Open1319.94064OpenAlexW1520749030MaRDI QIDQ5261682FDOQ5261682
Amit Sahai, Venkata Koppula, Vipul Goyal, Abhishek Jain
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_13
Cited In (26)
- Mergeable functional encryption
- Functional broadcast encryption with applications to data sharing for cloud storage
- Title not available (Why is that?)
- Function-private functional encryption in the private-key setting
- Making public key functional encryption function private, distributively
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions
- An efficient CCA-secure access control encryption for any policy
- From cryptomania to obfustopia through secret-key functional encryption
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Functional Encryption for Turing Machines
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Constrained (Verifiable) Pseudorandom Function from Functional Encryption
- Match me if you can: matchmaking encryption and its applications
- CRYPTAUTOMATA WITH FUNCTIONAL KEYS
- Cryptographically resilient functions
- Compact \textsf{FE} for unbounded attribute-weighted sums for logspace from \textsf{SXDH}
- Deniable Functional Encryption
- Limits on the Power of Indistinguishability Obfuscation and Functional Encryption
- Access control encryption with efficient verifiable sanitized decryption
- Steel: composable hardware-based stateful and randomised functional encryption
- Verifiable Computation for Randomized Algorithm
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Constrained pseudorandom functions from functional encryption
- From Cryptomania to Obfustopia Through Secret-Key Functional Encryption
- Dynamic decentralized functional encryption
- Functional encryption against probabilistic queries: definition, construction and applications
This page was built for publication: Functional Encryption for Randomized Functionalities
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261682)