Functional encryption for randomized functionalities
From MaRDI portal
Publication:5261682
DOI10.1007/978-3-662-46497-7_13zbMATH Open1319.94064OpenAlexW1520749030MaRDI QIDQ5261682FDOQ5261682
Authors: Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai
Publication date: 6 July 2015
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7_13
Recommendations
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Functional encryption: deterministic to randomized functions from simple assumptions
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Functional encryption: definitions and challenges
- Private functional encryption: indistinguishability-based definitions and constructions from obfuscation
Cited In (29)
- Mergeable functional encryption
- Functional broadcast encryption with applications to data sharing for cloud storage
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Title not available (Why is that?)
- Function-private functional encryption in the private-key setting
- On the relationship between functional encryption, obfuscation, and fully homomorphic encryption
- Making public key functional encryption function private, distributively
- Limits on the power of indistinguishability obfuscation and functional encryption
- An efficient CCA-secure access control encryption for any policy
- From cryptomania to obfustopia through secret-key functional encryption
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation
- Functional Encryption for Turing Machines
- Functional encryption: definitions and challenges
- Leakage-Resilient Chosen-Ciphertext Secure Functional Encryption from Garbled Circuits
- Verifiable computation for randomized algorithm
- Constrained (Verifiable) Pseudorandom Function from Functional Encryption
- Match me if you can: matchmaking encryption and its applications
- CRYPTAUTOMATA WITH FUNCTIONAL KEYS
- Cryptographically resilient functions
- Compact \textsf{FE} for unbounded attribute-weighted sums for logspace from \textsf{SXDH}
- Deniable Functional Encryption
- Functional encryption: deterministic to randomized functions from simple assumptions
- From cryptomania to obfustopia through secret-key functional encryption
- Access control encryption with efficient verifiable sanitized decryption
- Steel: composable hardware-based stateful and randomised functional encryption
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions
- Constrained pseudorandom functions from functional encryption
- Dynamic decentralized functional encryption
- Functional encryption against probabilistic queries: definition, construction and applications
This page was built for publication: Functional encryption for randomized functionalities
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5261682)