Multi-input Functional Encryption
From MaRDI portal
Publication:5418717
DOI10.1007/978-3-642-55220-5_32zbMath1327.94048OpenAlexW16762060MaRDI QIDQ5418717
Vipul Goyal, S. Dov Gordon, Amit Sahai, Elaine Shi, Feng-Hao Liu, Hong-Sheng Zhou, Shafi Goldwasser, Abhishek Jain, Jonathan N. Katz
Publication date: 27 May 2014
Published in: Advances in Cryptology – EUROCRYPT 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-55220-5_32
Related Items (78)
A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials ⋮ Cutting-edge cryptography through the lens of secret sharing ⋮ Upgrading to functional encryption ⋮ Ciphertext expansion in limited-leakage order-preserving encryption: a tight computational lower bound ⋮ FE and iO for Turing machines from minimal assumptions ⋮ Multi-input quadratic functional encryption from pairings ⋮ Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper) ⋮ A New Functional Encryption for Multidimensional Range Query (Short Paper) ⋮ Revocation in Publicly Verifiable Outsourced Computation ⋮ Limits on the Power of Indistinguishability Obfuscation and Functional Encryption ⋮ Verifiable Computation for Randomized Algorithm ⋮ Indistinguishability Obfuscation from Compact Functional Encryption ⋮ Relational Hash: Probabilistic Hash for Verifying Relations, Secure Against Forgery and More ⋮ From Cryptomania to Obfustopia Through Secret-Key Functional Encryption ⋮ From cryptomania to obfustopia through secret-key functional encryption ⋮ From minicrypt to obfustopia via private-key functional encryption ⋮ Proofs of Work from worst-case assumptions ⋮ On constructing one-way permutations from indistinguishability obfuscation ⋮ Simulation-Based Secure Functional Encryption in the Random Oracle Model ⋮ Quantum attribute-based encryption: a comprehensive study ⋮ Multi-input non-interactive functional encryption: constructions and applications ⋮ Multi-key and multi-input predicate encryption from learning with errors ⋮ Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications ⋮ Multi-input Functional Encryption with Unbounded-Message Security ⋮ Multi-client inner product encryption: function-hiding instantiations without random oracles ⋮ Lighter is better: a lighter multi-client verifiable outsourced computation with hybrid homomorphic encryption ⋮ Multi-input quadratic functional encryption: stronger security, broader functionality ⋮ Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric ⋮ Multi-client functional encryption with fine-grained access control ⋮ Towards practical topology-hiding computation ⋮ Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \) ⋮ Multi-input attribute based encryption and predicate encryption ⋮ A survey on functional encryption ⋮ Streaming functional encryption ⋮ Attribute-based multi-input FE (and more) for attribute-weighted sums ⋮ Constant input attribute based (and predicate) encryption from evasive and tensor LWE ⋮ Decentralized multi-client functional encryption for set intersection with improved efficiency ⋮ Blockchains enable non-interactive MPC ⋮ Multi-party functional encryption ⋮ Decentralized multi-client functional encryption for inner product ⋮ Achieving IND-CCA Security for Functional Encryption for Inner Products ⋮ Tightly secure inner product functional encryption: multi-input and function-hiding constructions ⋮ Practical Order-Revealing Encryption with Limited Leakage ⋮ Functional encryption for cubic polynomials and implementation ⋮ Functional encryption for randomized functionalities in the private-key setting from minimal assumptions ⋮ Function-private functional encryption in the private-key setting ⋮ Strongly full-hiding inner product encryption ⋮ Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions ⋮ On the complexity of compressing obfuscation ⋮ Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption ⋮ From Minicrypt to Obfustopia via Private-Key Functional Encryption ⋮ Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps ⋮ Multi-input Inner-Product Functional Encryption from Pairings ⋮ Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions ⋮ Cryptography with Updates ⋮ Fully secure functional encryption with a large class of relations from the decisional linear assumption ⋮ Topology-hiding computation on all graphs ⋮ Simple and generic constructions of succinct functional encryption ⋮ Functional Encryption for Turing Machines ⋮ Order-Revealing Encryption and the Hardness of Private Learning ⋮ Obfustopia built on secret-key functional encryption ⋮ Cutting-Edge Cryptography Through the Lens of Secret Sharing ⋮ On Constructing One-Way Permutations from Indistinguishability Obfuscation ⋮ Multi-input Functional Encryption and Its Application in Outsourcing Computation ⋮ Match me if you can: matchmaking encryption and its applications ⋮ Adaptively secure distributed PRFs from \(\mathsf{LWE}\) ⋮ Tightly CCA-secure inner product functional encryption scheme ⋮ Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification ⋮ Non-interactive anonymous router ⋮ Verifiable Multi-party Computation with Perfectly Private Audit Trail ⋮ Multi-client functional encryption for separable functions ⋮ Functional encryption for set intersection in the multi-client setting ⋮ A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation ⋮ Functional encryption for attribute-weighted sums from \(k\)-Lin ⋮ Dynamic decentralized functional encryption ⋮ Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software ⋮ Ad Hoc PSM Protocols: Secure Computation Without Coordination ⋮ Topology-Hiding Computation Beyond Logarithmic Diameter
This page was built for publication: Multi-input Functional Encryption