Practical backward-secure searchable encryption from symmetric puncturable encryption
Symmetric Searchable Encryption (SSE) has received wide attention due to its practical
application in searching on encrypted data. Beyond search, data addition and deletion are …
application in searching on encrypted data. Beyond search, data addition and deletion are …
Attribute-based encryption for circuits
In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an ℓ-bit public
index ind and a message m, and a secret key is associated with a Boolean predicate P. The …
index ind and a message m, and a secret key is associated with a Boolean predicate P. The …
Fully secure functional encryption for inner products, from standard assumptions
Functional encryption is a modern public-key paradigm where a master secret key can be
used to derive sub-keys SK_F associated with certain functions F in such a way that the …
used to derive sub-keys SK_F associated with certain functions F in such a way that the …
Indistinguishability obfuscation from functional encryption
N Bitansky, V Vaikuntanathan - Journal of the ACM (JACM), 2018 - dl.acm.org
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to
almost any known cryptographic object. Prior candidate IO constructions were based on …
almost any known cryptographic object. Prior candidate IO constructions were based on …
Indistinguishability obfuscation from compact functional encryption
The arrival of indistinguishability obfuscation (i O i O) has transformed the cryptographic
landscape by enabling several security goals that were previously beyond our reach …
landscape by enabling several security goals that were previously beyond our reach …
Decentralized multi-client functional encryption for inner product
J Chotard, E Dufour Sans, R Gay, DH Phan… - Advances in Cryptology …, 2018 - Springer
We consider a situation where multiple parties, owning data that have to be frequently
updated, agree to share weighted sums of these data with some aggregator, but where they …
updated, agree to share weighted sums of these data with some aggregator, but where they …
Indistinguishability obfuscation from DDH-like assumptions on constant-degree graded encodings
H Lin, V Vaikuntanathan - 2016 IEEE 57th Annual Symposium …, 2016 - ieeexplore.ieee.org
All constructions of general purpose indistinguishability obfuscation (IO) rely on either meta-
assumptions that encapsulate an exponential family of assumptions (eg, Pass, Seth and …
assumptions that encapsulate an exponential family of assumptions (eg, Pass, Seth and …
Function-hiding inner product encryption
A Bishop, A Jain, L Kowalczyk - … Conference on the Theory and Application …, 2015 - Springer
We extend the reach of functional encryption schemes that are provably secure under
simple assumptions against unbounded collusion to include function-hiding inner product …
simple assumptions against unbounded collusion to include function-hiding inner product …
Indistinguishability obfuscation from trilinear maps and block-wise local PRGs
We consider the question of finding the lowest degree L for which L-linear maps suffice to
obtain IO. The current state of the art (Lin, EUROCRYPT'16, CRYPTO'17; Lin and …
obtain IO. The current state of the art (Lin, EUROCRYPT'16, CRYPTO'17; Lin and …
Indistinguishability obfuscation from constant-degree graded encoding schemes
H Lin - Advances in Cryptology–EUROCRYPT 2016: 35th …, 2016 - Springer
We construct an indistinguishability obfuscation (IO) scheme for all polynomial-size circuits
from constant-degree graded encoding schemes, assuming the existence of a …
from constant-degree graded encoding schemes, assuming the existence of a …