Pages that link to "Item:Q3102174"
From MaRDI portal
The following pages link to Functional Encryption for Inner Product Predicates from Learning with Errors (Q3102174):
Displaying 38 items.
- An efficient IBE scheme with tight security reduction in the random oracle model (Q264126) (← links)
- Revocable attribute-based proxy re-encryption (Q2048189) (← links)
- Impossibility results for lattice-based functional encryption schemes (Q2055607) (← links)
- Decentralized multi-authority \textbf{\textsf{ABE}} for \textbf{\textsf{DNF}}s from \textbf{\textsf{LWE}} (Q2056681) (← links)
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption (Q2057139) (← links)
- Integral matrix Gram root and lattice Gaussian sampling without floats (Q2119026) (← links)
- Decentralized policy-hiding ABE with receiver privacy (Q2167764) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Doubly spatial encryption from DBDH (Q2250446) (← links)
- On the power of rewinding simulators in functional encryption (Q2407055) (← links)
- Anonymous and leakage resilient IBE and IPE (Q2407713) (← links)
- Toward non-interactive zero-knowledge proofs for NP from LWE (Q2661693) (← links)
- Adaptively secure inner product encryption from LWE (Q2691591) (← links)
- Decentralized multi-authority ABE for \(\mathsf{NC}^1\) from BDH (Q2697676) (← links)
- Direct computation of branching programs and its applications to more efficient lattice-based cryptography (Q2698337) (← links)
- Multi-input Functional Encryption and Its Application in Outsourcing Computation (Q2801771) (← links)
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits (Q2816296) (← links)
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys (Q2827708) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952) (← links)
- Semi-adaptive Security and Bundling Functionalities Made Generic and Easy (Q3181033) (← links)
- Compact (Targeted Homomorphic) Inner Product Encryption from LWE (Q3297486) (← links)
- Compact Inner Product Encryption from LWE (Q3297487) (← links)
- Bi-homomorphic Lattice-Based PRFs and Unidirectional Updatable Encryption (Q3297610) (← links)
- Predicate Encryption for Circuits from LWE (Q3457082) (← links)
- Improved (Hierarchical) Inner-Product Encryption from Lattices (Q4916012) (← links)
- Adaptive Simulation Security for Inner Product Functional Encryption (Q5041151) (← links)
- Towards a Simpler Lattice Gadget Toolkit (Q5087269) (← links)
- Private Puncturable PRFs from Standard Lattice Assumptions (Q5738885) (← links)
- Watermarking cryptographic functionalities from standard lattice assumptions (Q5918350) (← links)
- A survey on functional encryption (Q6163797) (← links)
- Unbounded non-zero inner product encryption (Q6495783) (← links)
- Hardness of entropic module-LWE (Q6496885) (← links)
- Spherical Gaussian leftover hash lemma via the Rényi divergence (Q6535100) (← links)
- Ciphertext policy attribute-based encryption for circuits from LWE assumption (Q6536220) (← links)
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices (Q6544463) (← links)
- Multi-key and multi-input predicate encryption (for conjunctions) from learning with errors (Q6570526) (← links)