Decentralized Multi-Client Attribute Based Functional Encryption
暂无分享,去创建一个
[1] Dario Fiore,et al. Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption , 2017, CRYPTO.
[2] S. Halevi,et al. Cryptanalyses of Candidate Branching Program Obfuscators , 2017, EUROCRYPT.
[3] Amit Sahai,et al. Verifiable Functional Encryption , 2016, ASIACRYPT.
[4] Benoît Libert,et al. Fully Secure Functional Encryption for Inner Products, from Standard Assumptions , 2016, CRYPTO.
[5] Mehdi Tibouchi,et al. Cryptanalysis of GGH15 Multilinear Maps , 2016, CRYPTO.
[6] Ilan Komargodski,et al. Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions , 2016, Journal of Cryptology.
[7] Angelo De Caro,et al. Better Security for Functional Encryption for Inner Product Evaluations , 2016, IACR Cryptol. ePrint Arch..
[8] Amit Sahai,et al. Functional Encryption for Turing Machines , 2016, TCC.
[9] Vinod Vaikuntanathan,et al. From Selective to Adaptive Security in Functional Encryption , 2015, CRYPTO.
[10] Brent Waters,et al. A Punctured Programming Approach to Adaptively Secure Functional Encryption , 2015, CRYPTO.
[11] Angelo De Caro,et al. Simple Functional Encryption Schemes for Inner Products , 2015, IACR Cryptol. ePrint Arch..
[12] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[13] Kai-Min Chung,et al. On Extractability Obfuscation , 2014, IACR Cryptol. ePrint Arch..
[14] Brent Waters,et al. Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[15] Yael Tauman Kalai,et al. How to Run Turing Machines on Encrypted Data , 2013, CRYPTO.
[16] Yael Tauman Kalai,et al. Reusable garbled circuits and succinct functional encryption , 2013, STOC '13.
[17] Vinod Vaikuntanathan,et al. Functional Encryption with Bounded Collusions via Multi-party Computation , 2012, CRYPTO.
[18] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[19] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.
[20] Amit Sahai,et al. Worry-free encryption: functional encryption with public keys , 2010, CCS '10.
[21] Tatsuaki Okamoto,et al. Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption , 2010, IACR Cryptol. ePrint Arch..
[22] Rafail Ostrovsky,et al. Attribute-based encryption with non-monotonic access structures , 2007, CCS '07.
[23] Ling Cheung,et al. Provably secure ciphertext policy ABE , 2007, CCS '07.
[24] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[25] Melissa Chase,et al. Multi-authority Attribute Based Encryption , 2007, TCC.
[26] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[27] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[28] Duong Hieu Phan,et al. Verifiable Decentralized Multi-client Functional Encryption for Inner Product , 2023, ASIACRYPT.
[29] Nico Döttling,et al. Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 , 2016, ICALP.
[30] Jung Hee Cheon,et al. Cryptanalysis of the Multilinear Map over the Integers , 2014, EUROCRYPT.
[31] Adam O'Neill,et al. Definitional Issues in Functional Encryption , 2010, IACR Cryptol. ePrint Arch..