Tightly secure inner product functional encryption: Multi-input and function-hiding constructions
暂无分享,去创建一个
[1] Zvika Brakerski,et al. Function-Private Functional Encryption in the Private-Key Setting , 2015, Journal of Cryptology.
[2] Craig Gentry,et al. Functional Encryption Without Obfuscation , 2016, TCC.
[3] Hoeteck Wee,et al. Multi-input Inner-Product Functional Encryption from Pairings , 2017, EUROCRYPT.
[4] Tatsuaki Okamoto,et al. Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security , 2016, ISC.
[5] Moni Naor,et al. Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions , 1999, J. Comput. Syst. Sci..
[6] Brent Waters,et al. A Punctured Programming Approach to Adaptively Secure Functional Encryption , 2015, CRYPTO.
[7] Dario Fiore,et al. Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings , 2018, IACR Cryptol. ePrint Arch..
[8] Moti Yung,et al. Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications , 2015, ASIACRYPT.
[9] Vinod Vaikuntanathan,et al. Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree Graded Encodings , 2016, 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS).
[10] Damien Stehlé,et al. Fully Secure Functional Encryption for Inner Products, from Standard Assumptions , 2016, CRYPTO.
[11] Hoeteck Wee,et al. Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys , 2018, IACR Cryptol. ePrint Arch..
[12] Amit Sahai,et al. Multi-input Functional Encryption for Unbounded Arity Functions , 2015, ASIACRYPT.
[13] Angelo De Caro,et al. Simple Functional Encryption Schemes for Inner Products , 2015, IACR Cryptol. ePrint Arch..
[14] Eike Kiltz,et al. Tightly CCA-Secure Encryption Without Pairings , 2016, EUROCRYPT.
[15] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[16] Goichiro Hanaoka,et al. A Framework for Identity-Based Encryption with Almost Tight Security , 2015, ASIACRYPT.
[17] Fabien Laguillaumie,et al. Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo p , 2018, IACR Cryptol. ePrint Arch..
[18] Silvio Micali,et al. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements , 2000, EUROCRYPT.
[19] Tibor Jager,et al. Tightly Secure Signatures and Public-Key Encryption , 2012, CRYPTO.
[20] Hoeteck Wee,et al. Fully, (Almost) Tightly Secure IBE and Dual System Groups , 2013, CRYPTO.
[21] Andreas Enge,et al. Implementing Cryptographic Pairings at Standard Security Levels , 2014, SPACE.
[22] David J. Wu,et al. Function-Hiding Inner Product Encryption is Practical , 2018, IACR Cryptol. ePrint Arch..
[23] Jorge Luis Villar,et al. An Algebraic Framework for Diffie–Hellman Assumptions , 2015, Journal of Cryptology.
[24] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[25] Allison Bishop,et al. Function-Hiding Inner Product Encryption , 2015, ASIACRYPT.
[26] Ryo Nishimaki,et al. Compact Structure-Preserving Signatures with Almost Tight Security , 2017, CRYPTO.
[27] Huijia Lin,et al. Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs , 2017, CRYPTO.
[28] Dennis Hofheinz,et al. Kurosawa-Desmedt Meets Tight Security , 2017, CRYPTO.
[29] Craig Gentry,et al. Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.
[30] Dennis Hofheinz,et al. Algebraic Partitioning: Fully Compact and (almost) Tightly Secure Cryptography , 2016, TCC.
[31] Dario Fiore,et al. Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption , 2017, CRYPTO.
[32] Paulo S. L. M. Barreto,et al. Subgroup Security in Pairing-Based Cryptography , 2015, LATINCRYPT.
[33] Sourav Mukhopadhyay,et al. Functional Encryption for Inner Product with Full Function Privacy , 2016, Public Key Cryptography.
[34] Adam O'Neill,et al. Definitional Issues in Functional Encryption , 2010, IACR Cryptol. ePrint Arch..
[35] Tatsuaki Okamoto,et al. Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the k-Linear Assumption , 2018, IACR Cryptol. ePrint Arch..
[36] Ilan Komargodski,et al. Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions , 2016, EUROCRYPT.