Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits

From MaRDI portal
Publication:5418715


DOI10.1007/978-3-642-55220-5_30zbMath1327.94035OpenAlexW2113717903MaRDI QIDQ5418715

Craig Gentry, Shai Halevi, Dhinakaran Vinayagamurthy, Valeria Nikolaenko, Sergey Gorbunov, Vinod Vaikuntanathan, Gil Segev, Dan Boneh

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_30



Related Items

Attribute-Based Keyword Search from Lattices, Adaptive Simulation Security for Inner Product Functional Encryption, Constraining and Watermarking PRFs from Milder Assumptions, Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and More, Limits on the adaptive security of Yao's garbling, Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN, Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security, Attribute-based versions of Schnorr and ElGamal, Adaptive Security of Yao’s Garbled Circuits, Predicate Encryption for Circuits from LWE, Attribute-based access control for inner product functional encryption from LWE, Deniable Attribute Based Encryption for Branching Programs from LWE, Targeted Homomorphic Attribute-Based Encryption, Semi-adaptive Security and Bundling Functionalities Made Generic and Easy, From Cryptomania to Obfustopia Through Secret-Key Functional Encryption, Attribute-based conditional proxy re-encryption in the standard model under LWE, Lattice-based HRA-secure attribute-based proxy re-encryption in standard model, Gadget-based iNTRU lattice trapdoors, Adaptively secure laconic function evaluation for \(\mathsf{NC}^1\), Faster Gaussian sampling for trapdoor lattices with arbitrary modulus, Puncturable identity-based and attribute-based encryption from lattices, Optimal broadcast encryption and CP-ABE from evasive lattice assumptions, Attribute-based proxy re-encryption from standard lattices, From cryptomania to obfustopia through secret-key functional encryption, From FE combiners to secure MPC and back, Attribute based encryption for deterministic finite automata from DLIN, A survey of lattice based expressive attribute based encryption, A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations, Efficient and fully secure lattice-based IBE with equality test, Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013, Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge, Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups, New ways to garble arithmetic circuits, Functional commitments for all functions, with transparent setup and from SIS, Succinct vector, polynomial, and functional commitments from lattices, On the optimal succinctness and efficiency of functional encryption and attribute-based encryption, Broadcast, trace and revoke with optimal parameters from polynomial hardness, Towards Tightly Secure Lattice Short Signature and Id-Based Encryption, Multi-key Homomorphic Authenticators, Verifiable Functional Encryption, Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings, Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps, Encoding Functions with Constant Online Rate, or How to Compress Garbled Circuit Keys, Functional encryption for computational hiding in prime order groups via pair encodings, Adaptively secure inner product encryption from LWE, Succinct and adaptively secure ABE for ABP from \(k\)-Lin, Inner-product functional encryption with fine-grained access control, Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions, Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing, Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH, Multi-party functional encryption, ABE for DFA from LWE against bounded collusions, revisited, On treewidth, separators and Yao's garbling, Ring-based identity based encryption -- asymptotically shorter MPK and tighter security, Direct computation of branching programs and its applications to more efficient lattice-based cryptography, Ciphertext-policy attribute-based encryption for general circuits from bilinear maps, Simulatable verifiable random function from the LWE assumption, Adaptively simulation-secure attribute-hiding predicate encryption, Improved inner-product encryption with adaptive security and full attribute-hiding, Collusion Resistant Traitor Tracing from Learning with Errors, Compact (Targeted Homomorphic) Inner Product Encryption from LWE, Compact Inner Product Encryption from LWE, Function-private functional encryption in the private-key setting, On the complexity of compressing obfuscation, A more efficient leveled strongly-unforgeable fully homomorphic signature scheme, Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits, Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps, Private Puncturable PRFs from Standard Lattice Assumptions, Functional encryption for cascade automata, Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings, Watermarking cryptographic functionalities from standard lattice assumptions, Compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption, Functional Encryption for Turing Machines, Multi-theorem preprocessing NIZKs from lattices, Provably Secure (Broadcast) Homomorphic Signcryption, Algebraic Attacks Against Several Weak Variants of GVW’13 ABE, Functional Encryption for Cascade Automata (Extended Abstract), Tag-based ABE in prime-order groups via pair encoding, Revocable attribute-based proxy re-encryption, Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information, Optimal broadcast encryption from pairings and LWE, Impossibility results for lattice-based functional encryption schemes, Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \), Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}}, New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts, Candidate obfuscation via oblivious LWE sampling, Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption, Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions, FHE Circuit Privacy Almost for Free, Adaptively Secure Garbled Circuits from One-Way Functions, Fully Secure Functional Encryption for Inner Products, from Standard Assumptions, Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security, A new Gaussian sampling for trapdoor lattices with arbitrary modulus, Adaptively secure constrained pseudorandom functions in the standard model, Functional encryption for attribute-weighted sums from \(k\)-Lin, Amplifying the security of functional encryption, unconditionally, Unnamed Item, Garbled Circuits as Randomized Encodings of Functions: a Primer, Integral matrix Gram root and lattice Gaussian sampling without floats, Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness, (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin, Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices, A note on the post-quantum security of (ring) signatures, Bounded functional encryption for Turing machines: adaptive security from general assumptions, ABE for circuits with constant-size secret keys and adaptive security, Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities, Cumulatively all-lossy-but-one trapdoor functions from standard assumptions, Compact FE for unbounded attribute-weighted sums for logspace from SXDH, Multi-input attribute based encryption and predicate encryption, How to build a trapdoor function from an encryption scheme, Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, A survey on functional encryption, A generic construction of CCA-secure attribute-based encryption with equality test, Generic construction of trace-and-revoke inner product functional encryption, Spatial encryption revisited: from delegatable multiple inner product encryption and more, Streaming functional encryption, Attribute-based multi-input FE (and more) for attribute-weighted sums, Constant input attribute based (and predicate) encryption from evasive and tensor LWE, HRA-secure attribute-based threshold proxy re-encryption from lattices