Multi-input Inner-Product Functional Encryption from Pairings
From MaRDI portal
Publication:5738891
DOI10.1007/978-3-319-56620-7_21zbMath1411.94043OpenAlexW2608091826MaRDI QIDQ5738891
Michel Abdalla, Hoeteck Wee, Mariana Raykova, Romain Gay
Publication date: 13 June 2017
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-56620-7_21
Related Items (34)
Post-quantum secure inner product functional encryption using multivariate public key cryptography ⋮ Adaptive Simulation Security for Inner Product Functional Encryption ⋮ A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials ⋮ Multi-input quadratic functional encryption from pairings ⋮ Compact Attribute-Based and Online-Offline Multi-input Inner Product Encryptions from Standard Static Assumptions (Short Paper) ⋮ Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience ⋮ Multi-key and multi-input predicate encryption from learning with errors ⋮ Verifiable Functional Encryption ⋮ Multi-client inner product encryption: function-hiding instantiations without random oracles ⋮ DFE-IP: delegatable functional encryption for inner product ⋮ Unbounded predicate inner product functional encryption from pairings ⋮ Multi-input quadratic functional encryption: stronger security, broader functionality ⋮ Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric ⋮ Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities ⋮ (Inner-product) functional encryption with updatable ciphertexts ⋮ Multi-input attribute based encryption and predicate encryption ⋮ A survey on functional encryption ⋮ Attribute-based multi-input FE (and more) for attribute-weighted sums ⋮ Constant input attribute based (and predicate) encryption from evasive and tensor LWE ⋮ Inner-product functional encryption with fine-grained access control ⋮ Decentralized multi-client functional encryption for set intersection with improved efficiency ⋮ Decentralized multi-client functional encryption for inner product ⋮ Functional broadcast encryption with applications to data sharing for cloud storage ⋮ Tightly secure inner product functional encryption: multi-input and function-hiding constructions ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ Unbounded inner product functional encryption from bilinear maps ⋮ A multi-authority approach to various predicate encryption types ⋮ Simple and efficient FE for quadratic functions ⋮ Tightly CCA-secure inner product functional encryption scheme ⋮ Non-interactive anonymous router ⋮ Multi-client functional encryption for separable functions ⋮ Functional encryption for set intersection in the multi-client setting ⋮ Functional encryption for attribute-weighted sums from \(k\)-Lin ⋮ Dynamic decentralized functional encryption
Cites Work
- Function-hiding inner product encryption is practical
- Functional Encryption for Inner Product with Full Function Privacy
- Functional Encryption Without Obfuscation
- Multi-input Functional Encryption for Unbounded Arity Functions
- Function-Hiding Inner Product Encryption
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Tightly CCA-Secure Encryption Without Pairings
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- An Algebraic Framework for Diffie-Hellman Assumptions
- Functional Encryption: New Perspectives and Lower Bounds
- (Hierarchical) Identity-Based Encryption from Affine Message Authentication
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Simple Functional Encryption Schemes for Inner Products
- Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation
- Functional Encryption: Definitions and Challenges
- Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
- Indistinguishability Obfuscation from Compact Functional Encryption
- Candidate Multilinear Maps from Ideal Lattices
- Fuzzy Identity-Based Encryption
- Multi-input Functional Encryption
- Reusable garbled circuits and succinct functional encryption
- Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions
- Dual System Encryption via Predicate Encodings
This page was built for publication: Multi-input Inner-Product Functional Encryption from Pairings