Pages that link to "Item:Q1675718"
From MaRDI portal
The following pages link to Practical functional encryption for quadratic functions with applications to predicate encryption (Q1675718):
Displaying 27 items.
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps (Q831181) (← links)
- Simple and efficient FE for quadratic functions (Q2043408) (← links)
- Optimal broadcast encryption from pairings and LWE (Q2055600) (← links)
- Impossibility results for lattice-based functional encryption schemes (Q2055607) (← links)
- Tightly CCA-secure inner product functional encryption scheme (Q2055966) (← links)
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification (Q2056782) (← links)
- Functional encryption for set intersection in the multi-client setting (Q2068378) (← links)
- Functional encryption for attribute-weighted sums from \(k\)-Lin (Q2096503) (← links)
- Generic transformation from broadcast encryption to round-optimal deniable ring authentication (Q2115719) (← links)
- Multi-input quadratic functional encryption from pairings (Q2139634) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- New approaches to traitor tracing with embedded identities (Q2175935) (← links)
- Automated analysis of cryptographic assumptions in generic group models (Q2423840) (← links)
- Inner-product functional encryption with fine-grained access control (Q2691594) (← links)
- Decentralized multi-client functional encryption for set intersection with improved efficiency (Q2692968) (← links)
- Verifiable Inner Product Encryption Scheme (Q5041153) (← links)
- A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials (Q5041154) (← links)
- Impact of Group Theory in Cryptosystem (Q5050167) (← links)
- Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps (Q5738874) (← links)
- Tightly secure inner product functional encryption: multi-input and function-hiding constructions (Q5896157) (← links)
- Match me if you can: matchmaking encryption and its applications (Q5918327) (← links)
- Bounded-collusion decentralized ABE with sublinear parameters (Q6040630) (← links)
- (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin (Q6095187) (← links)
- On the security of functional encryption in the generic group model (Q6095189) (← links)
- Unbounded predicate inner product functional encryption from pairings (Q6109084) (← links)
- Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities (Q6122595) (← links)
- A survey on functional encryption (Q6163797) (← links)