Making Public Key Functional Encryption Function Private, Distributively
暂无分享,去创建一个
[1] Yuval Ishai,et al. Function Secret Sharing , 2015, EUROCRYPT.
[2] Amit Sahai,et al. Functional Encryption: Decentralised and Delegatable , 2015, IACR Cryptol. ePrint Arch..
[3] Ron Rothblum,et al. Spooky Encryption and Its Applications , 2016, CRYPTO.
[4] Dan Boneh,et al. Hosting Services on an Untrusted Cloud , 2015, EUROCRYPT.
[5] Mark Zhandry,et al. Cutting-edge cryptography through the lens of secret sharing , 2018, Inf. Comput..
[6] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[7] Vinod Vaikuntanathan,et al. Functional Encryption with Bounded Collusions via Multi-party Computation , 2012, CRYPTO.
[8] Adam O'Neill,et al. Definitional Issues in Functional Encryption , 2010, IACR Cryptol. ePrint Arch..
[9] Dan Boneh,et al. Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption , 2013, CRYPTO.
[10] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[11] Vinod Vaikuntanathan,et al. Functional Encryption: New Perspectives and Lower Bounds , 2013, IACR Cryptol. ePrint Arch..
[12] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[13] Amit Sahai,et al. Multi-Input Functional Encryption , 2014, IACR Cryptol. ePrint Arch..
[14] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[15] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[16] Aggelos Kiayias,et al. Traitor Deterring Schemes: Using Bitcoin as Collateral for Digital Content , 2015, CCS.
[17] Amit Sahai,et al. On the Practical Security of Inner Product Functional Encryption , 2015, Public Key Cryptography.
[18] Craig Gentry,et al. Outsourcing Private RAM Computation , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[19] Dan Boneh,et al. Function-Private Subspace-Membership Encryption and Its Applications , 2013, IACR Cryptol. ePrint Arch..
[20] Yuval Ishai,et al. Function Secret Sharing: Improvements and Extensions , 2016, CCS.
[21] Amit Sahai,et al. Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results , 2013, IACR Cryptol. ePrint Arch..
[22] Zvika Brakerski,et al. Function-Private Functional Encryption in the Private-Key Setting , 2015, Journal of Cryptology.