Pages that link to "Item:Q3611782"
From MaRDI portal
The following pages link to Predicate Privacy in Encryption Systems (Q3611782):
Displaying 35 items.
- Anonymous spatial encryption under affine space delegation functionality with full security (Q506150) (← links)
- Strongly full-hiding inner product encryption (Q511916) (← links)
- Generic construction of designated tester public-key encryption with keyword search (Q713419) (← links)
- Dual trapdoor identity-based encryption with keyword search (Q1701741) (← links)
- Functional encryption for randomized functionalities in the private-key setting from minimal assumptions (Q1747658) (← links)
- Function-private functional encryption in the private-key setting (Q1747663) (← links)
- Multi-input functional encryption in the private-key setting: stronger security from weaker assumptions (Q1753168) (← links)
- Converting pairing-based cryptosystems from composite to prime order setting -- a comparative analysis (Q1787193) (← links)
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) (Q2055654) (← links)
- Non-interactive anonymous router (Q2056804) (← links)
- From minicrypt to obfustopia via private-key functional encryption (Q2175213) (← links)
- Predicate encryption from bilinear maps and one-sided probabilistic rank (Q2175910) (← links)
- Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation (Q2194864) (← links)
- Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data (Q2293192) (← links)
- A new approach to practical function-private inner product encryption (Q2317860) (← links)
- Predicate encryption supporting disjunctions, polynomial equations, and inner products (Q2377068) (← links)
- Improved hidden vector encryption with short ciphertexts and tokens (Q2430414) (← links)
- Towards semantically secure outsourcing of association rule mining on categorical data (Q2629963) (← links)
- A Study of Pair Encodings: Predicate Encryption in Prime Order Groups (Q2799098) (← links)
- Multi-input Functional Encryption and Its Application in Outsourcing Computation (Q2801771) (← links)
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys (Q2827708) (← links)
- TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption (Q2829960) (← links)
- Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation (Q2890014) (← links)
- Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption (Q2948190) (← links)
- Public-Key Encryption with Delegated Search (Q3011319) (← links)
- Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting (Q3104695) (← links)
- Efficient Inner Product Encryption with Simulation-Based Security (Q3297490) (← links)
- Obfuscation of Hyperplane Membership (Q3408188) (← links)
- From Minicrypt to Obfustopia via Private-Key Functional Encryption (Q5738873) (← links)
- Simplifying Design and Analysis of Complex Predicate Encryption Schemes (Q5738892) (← links)
- Match me if you can: matchmaking encryption and its applications (Q5918327) (← links)
- Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric (Q6116190) (← links)
- A survey on functional encryption (Q6163797) (← links)
- Unbounded non-zero inner product encryption (Q6495783) (← links)
- Registered (inner-product) functional encryption (Q6604926) (← links)