Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits

From MaRDI portal
Publication:5418715

DOI10.1007/978-3-642-55220-5_30zbMath1327.94035OpenAlexW2113717903MaRDI QIDQ5418715

Craig Gentry, Shai Halevi, Dhinakaran Vinayagamurthy, Valeria Nikolaenko, Sergey Gorbunov, Vinod Vaikuntanathan, Gil Segev, Dan Boneh

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_30




Related Items (only showing first 100 items - show all)

Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linLeakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from latticesA note on the post-quantum security of (ring) signaturesBounded functional encryption for Turing machines: adaptive security from general assumptionsABE for circuits with constant-size secret keys and adaptive securityFully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesCumulatively all-lossy-but-one trapdoor functions from standard assumptionsCompact FE for unbounded attribute-weighted sums for logspace from SXDHMulti-input attribute based encryption and predicate encryptionHow to build a trapdoor function from an encryption schemeIdentity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear AssumptionA survey on functional encryptionA generic construction of CCA-secure attribute-based encryption with equality testGeneric construction of trace-and-revoke inner product functional encryptionSpatial encryption revisited: from delegatable multiple inner product encryption and moreStreaming functional encryptionAttribute-based multi-input FE (and more) for attribute-weighted sumsConstant input attribute based (and predicate) encryption from evasive and tensor LWEHRA-secure attribute-based threshold proxy re-encryption from latticesAttribute-Based Keyword Search from LatticesAdaptive Simulation Security for Inner Product Functional EncryptionConstraining and Watermarking PRFs from Milder AssumptionsAlmost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreLimits on the adaptive security of Yao's garblingSmoothing out binary linear codes and worst-case sub-exponential hardness for LPNAttribute-based signatures from lattices: unbounded attributes and semi-adaptive securityAttribute-based versions of Schnorr and ElGamalAdaptive Security of Yao’s Garbled CircuitsPredicate Encryption for Circuits from LWEAttribute-based access control for inner product functional encryption from LWEDeniable Attribute Based Encryption for Branching Programs from LWETargeted Homomorphic Attribute-Based EncryptionSemi-adaptive Security and Bundling Functionalities Made Generic and EasyFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionAttribute-based conditional proxy re-encryption in the standard model under LWELattice-based HRA-secure attribute-based proxy re-encryption in standard modelGadget-based iNTRU lattice trapdoorsAdaptively secure laconic function evaluation for \(\mathsf{NC}^1\)Faster Gaussian sampling for trapdoor lattices with arbitrary modulusPuncturable identity-based and attribute-based encryption from latticesOptimal broadcast encryption and CP-ABE from evasive lattice assumptionsAttribute-based proxy re-encryption from standard latticesFrom cryptomania to obfustopia through secret-key functional encryptionFrom FE combiners to secure MPC and backAttribute based encryption for deterministic finite automata from DLINA survey of lattice based expressive attribute based encryptionA Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of EquationsEfficient and fully secure lattice-based IBE with equality testCryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledgeAdaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear GroupsNew ways to garble arithmetic circuitsFunctional commitments for all functions, with transparent setup and from SISSuccinct vector, polynomial, and functional commitments from latticesOn the optimal succinctness and efficiency of functional encryption and attribute-based encryptionBroadcast, trace and revoke with optimal parameters from polynomial hardnessTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionMulti-key Homomorphic AuthenticatorsVerifiable Functional EncryptionDual System Encryption Framework in Prime-Order Groups via Computational Pair EncodingsPartitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear MapsEncoding Functions with Constant Online Rate, or How to Compress Garbled Circuit KeysFunctional encryption for computational hiding in prime order groups via pair encodingsAdaptively secure inner product encryption from LWESuccinct and adaptively secure ABE for ABP from \(k\)-LinInner-product functional encryption with fine-grained access controlCollusion resistant trace-and-revoke for arbitrary identities from standard assumptionsSuccinct multi-authority attribute-based access control for circuits with authenticated outsourcingDecentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDHMulti-party functional encryptionABE for DFA from LWE against bounded collusions, revisitedOn treewidth, separators and Yao's garblingRing-based identity based encryption -- asymptotically shorter MPK and tighter securityDirect computation of branching programs and its applications to more efficient lattice-based cryptographyCiphertext-policy attribute-based encryption for general circuits from bilinear mapsSimulatable verifiable random function from the LWE assumptionAdaptively simulation-secure attribute-hiding predicate encryptionImproved inner-product encryption with adaptive security and full attribute-hidingCollusion Resistant Traitor Tracing from Learning with ErrorsCompact (Targeted Homomorphic) Inner Product Encryption from LWECompact Inner Product Encryption from LWEFunction-private functional encryption in the private-key settingOn the complexity of compressing obfuscationA more efficient leveled strongly-unforgeable fully homomorphic signature schemeDual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size CircuitsProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsPrivate Puncturable PRFs from Standard Lattice AssumptionsFunctional encryption for cascade automataDuality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational EncodingsWatermarking cryptographic functionalities from standard lattice assumptionsCompacting ciphertext in multi-channel broadcast encryption and attribute-based encryptionFunctional Encryption for Turing MachinesMulti-theorem preprocessing NIZKs from latticesProvably Secure (Broadcast) Homomorphic SigncryptionAlgebraic Attacks Against Several Weak Variants of GVW’13 ABEFunctional Encryption for Cascade Automata (Extended Abstract)Tag-based ABE in prime-order groups via pair encodingRevocable attribute-based proxy re-encryptionGeneralized Hardness Assumption for Self-bilinear Map with Auxiliary Information




This page was built for publication: Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits