Pages that link to "Item:Q2811143"
From MaRDI portal
The following pages link to Function-Hiding Inner Product Encryption (Q2811143):
Displaying 32 items.
- Strongly full-hiding inner product encryption (Q511916) (← links)
- Post-quantum secure inner product functional encryption using multivariate public key cryptography (Q821514) (← links)
- Impossibility results for lattice-based functional encryption schemes (Q2055607) (← links)
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) (Q2055654) (← links)
- Tightly CCA-secure inner product functional encryption scheme (Q2055966) (← links)
- Non-interactive anonymous router (Q2056804) (← links)
- Multi-input quadratic functional encryption from pairings (Q2139634) (← links)
- Efficient anonymous multi-group broadcast encryption (Q2229276) (← links)
- A new approach to practical function-private inner product encryption (Q2317860) (← links)
- Inner-product functional encryption with fine-grained access control (Q2691594) (← links)
- Decentralized multi-client functional encryption for set intersection with improved efficiency (Q2692968) (← links)
- Complexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting) (Q2693051) (← links)
- Multi-party functional encryption (Q2697858) (← links)
- Inner-product functional encryption from random linear codes: trial and challenges (Q2697925) (← links)
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys (Q2827708) (← links)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952) (← links)
- Achieving IND-CCA Security for Functional Encryption for Inner Products (Q2980849) (← links)
- Efficient Inner Product Encryption with Simulation-Based Security (Q3297490) (← links)
- Adaptive Simulation Security for Inner Product Functional Encryption (Q5041151) (← links)
- CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions (Q5738751) (← links)
- Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps (Q5738874) (← links)
- Multi-input Inner-Product Functional Encryption from Pairings (Q5738891) (← links)
- Tightly secure inner product functional encryption: multi-input and function-hiding constructions (Q5896157) (← links)
- Unbounded inner product functional encryption from bilinear maps (Q5915907) (← links)
- Unbounded inner product functional encryption from bilinear maps (Q5919081) (← links)
- Hierarchical identity-based inner product functional encryption (Q6065871) (← links)
- DFE-IP: delegatable functional encryption for inner product (Q6095585) (← links)
- Unbounded predicate inner product functional encryption from pairings (Q6109084) (← links)
- Reinforcing privacy in cloud computing via adaptively secure non-zero inner product encryption and anonymous identity-based revocation in unbounded setting (Q6124593) (← links)
- A survey on functional encryption (Q6163797) (← links)
- Indistinguishability obfuscation (Q6198645) (← links)
- Unbounded non-zero inner product encryption (Q6495783) (← links)