• No results found

Functional encryption

DFA-Based  Functional  Encryption:  Adaptive  Security  from  Dual  System  Encryption

DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption

... We present an adaptively secure functional encryption (FE) scheme based on deterministic finite automata (DFA). The construction uses composite-order bilinear pairings and is built upon the selec- tively ...

18

Practical  Functional  Encryption  for  Bilinear  Forms

Practical Functional Encryption for Bilinear Forms

... efficient functional encryption scheme for the class of functionalities that can be expressed via bilinear forms over the ...our functional encryption ...

27

Functional  Encryption   and  Property  Preserving  Encryption:  New  Definitions   and  Positive  Results

Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results

... of Functional Encryption in ...of Functional Encryption schemes from a practical standpoint, with the goal of trying to achieve maximum security against all practically feasible ...how ...

33

Multi-Input  Functional  Encryption  for  Unbounded  Arity  Functions

Multi-Input Functional Encryption for Unbounded Arity Functions

... Multi-Input Functional Encryption. Most of the prior work on FE focuses on the problem of computing a function over a single plaintext given its cor- responding ciphertext. However, many applications ...

25

Traceable  Inner  Product  Functional  Encryption

Traceable Inner Product Functional Encryption

... We eventually provide a construction for traceable inner-product functional encryption with black-box confirmation. Our construction is semantically secure in a more general setting than in IPFE as the ...

17

Indistinguishability  Obfuscation  from  Functional  Encryption

Indistinguishability Obfuscation from Functional Encryption

... (symmetric-key) functional encryption with a succinct en- cryption ...(succinct) functional encryption or obfuscation [AGVW13, BGI + ...

44

On  the  Power  of  Rewinding  Simulators  in  Functional  Encryption

On the Power of Rewinding Simulators in Functional Encryption

... of functional encryption is that of predicate encryption (PE, for short) which are defined for functionalities whose message space X consists of two subspaces I and M called respectively index space ...

23

On  the  Semantic  Security  of  Functional  Encryption  Schemes

On the Semantic Security of Functional Encryption Schemes

... In the previous section we defined a security model that (among other things) excludes the clearly intuitively insecure TDP-based counterexample from Section 4.1 that was problematic for the BSW semantic security model. ...

34

Multi-Input  Functional  Encryption  with  Unbounded-Message  Security

Multi-Input Functional Encryption with Unbounded-Message Security

... multi-input functional encryption scheme in the secret key setting for any number of cipher-texts from any secret key functional encryption ...function-hiding functional ...

23

A  Punctured  Programming  Approach  to  Adaptively  Secure   Functional  Encryption

A Punctured Programming Approach to Adaptively Secure Functional Encryption

... secure functional encryption schemes. These are functional encryption schemes in which the attacker is allowed to make at most one private key ...

37

Functional  Encryption  for  Turing  Machines

Functional Encryption for Turing Machines

... if functional encryption is used for allowing a researcher to perform some data analysis on hospital records, then having a bound on input length would require that there be an a-priori bound, at the time ...

48

Deniable  Functional  Encryption

Deniable Functional Encryption

... IND-CCA encryption scheme to avoid that the adversary can maul those values and learn something it should not ...the functional encryption scheme for x corresponds to a double encryption, ...

31

Indistinguishability  Obfuscation  from  Functional  Encryption  for  Simple  Functions

Indistinguishability Obfuscation from Functional Encryption for Simple Functions

... deniable encryption [SW14], functional encryption [GGH + 13b], round-optimal secure computation [GGHR14], digital watermarking [NW15, CHV15], time-lock puzzles [BGJ + 15], and ...

23

Indistinguishability  Obfuscation  from  Compact  Functional  Encryption

Indistinguishability Obfuscation from Compact Functional Encryption

... II. A Technique for Arity Amplification. At the heart of our results is a novel technique for arity amplification in secret-key multi-input functional encryption (MiFE), a notion introduced by Goldwasser et ...

57

Semantically  Secure  Order-Revealing  Encryption:  Multi-Input  Functional  Encryption  Without  Obfuscation

Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation

... Single-input functional encryption [BSW11] has been traditionally defined in the public-key settings and studied extensively [O’N10, GVW12, AGVW13, BO13, CIJ + 13, GGH + 13b, GKP + 13, ...(multi-input) ...

34

Simple  Functional  Encryption  Schemes  for  Inner  Products

Simple Functional Encryption Schemes for Inner Products

... predicate encryption (PE) which are defined for functionalities whose message space X consists of two subspaces I and M called respectively index space and payload ...predicate encryption with ...

31

Functional  Encryption  from (Small)  Hardware  Tokens

Functional Encryption from (Small) Hardware Tokens

... the encryption scheme; in particular, A is given the oracle access to token after ...token-basd functional encryption scheme for a functionality class ...

13

Function-Private  Functional  Encryption  in  the  Private-Key  Setting

Function-Private Functional Encryption in the Private-Key Setting

... by encryption schemes as an all-or-nothing guarantee: The encrypted data can be fully recovered using the decryption key, but it is completely useless without ...identity-based encryption [Sha84, BF03, ...

21

Limits  on  the  Power  of  Indistinguishability  Obfuscation   and  Functional  Encryption

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption

... a functional encryption ...a functional encryption scheme Π that is naturally defined given the way we set up Ψ (we refer the reader to Section ...the functional encryption ...

63

From  Selective  to  Adaptive  Security  in  Functional  Encryption

From Selective to Adaptive Security in Functional Encryption

... a functional encryption (FE) scheme, the owner of the secret key can generate restricted decryption keys that allow users to learn specific functions of the encrypted messages and nothing ...

21

Show all 10000 documents...

Related subjects