Multi-input Functional Encryption

From MaRDI portal
Publication:5418717

DOI10.1007/978-3-642-55220-5_32zbMath1327.94048OpenAlexW16762060MaRDI QIDQ5418717

Vipul Goyal, S. Dov Gordon, Amit Sahai, Elaine Shi, Feng-Hao Liu, Hong-Sheng Zhou, Shafi Goldwasser, Abhishek Jain, Jonathan N. Katz

Publication date: 27 May 2014

Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_32




Related Items (78)

A New Paradigm for Public-Key Functional Encryption for Degree-2 PolynomialsCutting-edge cryptography through the lens of secret sharingUpgrading to functional encryptionCiphertext expansion in limited-leakage order-preserving encryption: a tight computational lower boundFE and iO for Turing machines from minimal assumptionsMulti-input quadratic functional encryption from pairingsCompact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper)A New Functional Encryption for Multidimensional Range Query (Short Paper)Revocation in Publicly Verifiable Outsourced ComputationLimits on the Power of Indistinguishability Obfuscation and Functional EncryptionVerifiable Computation for Randomized AlgorithmIndistinguishability Obfuscation from Compact Functional EncryptionRelational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and MoreFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionFrom cryptomania to obfustopia through secret-key functional encryptionFrom minicrypt to obfustopia via private-key functional encryptionProofs of Work from worst-case assumptionsOn constructing one-way permutations from indistinguishability obfuscationSimulation-Based Secure Functional Encryption in the Random Oracle ModelQuantum attribute-based encryption: a comprehensive studyMulti-input non-interactive functional encryption: constructions and applicationsMulti-key and multi-input predicate encryption from learning with errorsSelf-bilinear map on unknown order groups from indistinguishability obfuscation and its applicationsMulti-input Functional Encryption with Unbounded-Message SecurityMulti-client inner product encryption: function-hiding instantiations without random oraclesLighter is better: a lighter multi-client verifiable outsourced computation with hybrid homomorphic encryptionMulti-input quadratic functional encryption: stronger security, broader functionalityMulti random projection inner product encryption, applications to proximity searchable encryption for the iris biometricMulti-client functional encryption with fine-grained access controlTowards practical topology-hiding computationPolynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)Multi-input attribute based encryption and predicate encryptionA survey on functional encryptionStreaming functional encryptionAttribute-based multi-input FE (and more) for attribute-weighted sumsConstant input attribute based (and predicate) encryption from evasive and tensor LWEDecentralized multi-client functional encryption for set intersection with improved efficiencyBlockchains enable non-interactive MPCMulti-party functional encryptionDecentralized multi-client functional encryption for inner productAchieving IND-CCA Security for Functional Encryption for Inner ProductsTightly secure inner product functional encryption: multi-input and function-hiding constructionsPractical Order-Revealing Encryption with Limited LeakageFunctional encryption for cubic polynomials and implementationFunctional encryption for randomized functionalities in the private-key setting from minimal assumptionsFunction-private functional encryption in the private-key settingStrongly full-hiding inner product encryptionMulti-input functional encryption in the private-key setting: stronger security from weaker assumptionsOn the complexity of compressing obfuscationRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionProjective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear MapsMulti-input Inner-Product Functional Encryption from PairingsFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsCryptography with UpdatesFully secure functional encryption with a large class of relations from the decisional linear assumptionTopology-hiding computation on all graphsSimple and generic constructions of succinct functional encryptionFunctional Encryption for Turing MachinesOrder-Revealing Encryption and the Hardness of Private LearningObfustopia built on secret-key functional encryptionCutting-Edge Cryptography Through the Lens of Secret SharingOn Constructing One-Way Permutations from Indistinguishability ObfuscationMulti-input Functional Encryption and Its Application in Outsourcing ComputationMatch me if you can: matchmaking encryption and its applicationsAdaptively secure distributed PRFs from \(\mathsf{LWE}\)Tightly CCA-secure inner product functional encryption schemeIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationNon-interactive anonymous routerVerifiable Multi-party Computation with Perfectly Private Audit TrailMulti-client functional encryption for separable functionsFunctional encryption for set intersection in the multi-client settingA decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscationFunctional encryption for attribute-weighted sums from \(k\)-LinDynamic decentralized functional encryptionPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving SoftwareAd Hoc PSM Protocols: Secure Computation Without CoordinationTopology-Hiding Computation Beyond Logarithmic Diameter




This page was built for publication: Multi-input Functional Encryption