Practical backward-secure searchable encryption from symmetric puncturable encryption

SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad… - Proceedings of the …, 2018 - dl.acm.org
Symmetric Searchable Encryption (SSE) has received wide attention due to its practical
application in searching on encrypted data. Beyond search, data addition and deletion are …

Attribute-based encryption for circuits

S Gorbunov, V Vaikuntanathan, H Wee - Journal of the ACM (JACM), 2015 - dl.acm.org
In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an ℓ-bit public
index ind and a message m, and a secret key is associated with a Boolean predicate P. The …

Fully secure functional encryption for inner products, from standard assumptions

S Agrawal, B Libert, D Stehlé - Annual International Cryptology …, 2016 - Springer
Functional encryption is a modern public-key paradigm where a master secret key can be
used to derive sub-keys SK_F associated with certain functions F in such a way that the …

Indistinguishability obfuscation from functional encryption

N Bitansky, V Vaikuntanathan - Journal of the ACM (JACM), 2018 - dl.acm.org
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to
almost any known cryptographic object. Prior candidate IO constructions were based on …

Indistinguishability obfuscation from compact functional encryption

P Ananth, A Jain - Annual Cryptology Conference, 2015 - Springer
The arrival of indistinguishability obfuscation (i O i O) has transformed the cryptographic
landscape by enabling several security goals that were previously beyond our reach …

Decentralized multi-client functional encryption for inner product

J Chotard, E Dufour Sans, R Gay, DH Phan… - Advances in Cryptology …, 2018 - Springer
We consider a situation where multiple parties, owning data that have to be frequently
updated, agree to share weighted sums of these data with some aggregator, but where they …

Indistinguishability obfuscation from DDH-like assumptions on constant-degree graded encodings

H Lin, V Vaikuntanathan - 2016 IEEE 57th Annual Symposium …, 2016 - ieeexplore.ieee.org
All constructions of general purpose indistinguishability obfuscation (IO) rely on either meta-
assumptions that encapsulate an exponential family of assumptions (eg, Pass, Seth and …

Function-hiding inner product encryption

A Bishop, A Jain, L Kowalczyk - … Conference on the Theory and Application …, 2015 - Springer
We extend the reach of functional encryption schemes that are provably secure under
simple assumptions against unbounded collusion to include function-hiding inner product …

Indistinguishability obfuscation from trilinear maps and block-wise local PRGs

H Lin, S Tessaro - Annual International Cryptology Conference, 2017 - Springer
We consider the question of finding the lowest degree L for which L-linear maps suffice to
obtain IO. The current state of the art (Lin, EUROCRYPT'16, CRYPTO'17; Lin and …

Indistinguishability obfuscation from constant-degree graded encoding schemes

H Lin - Advances in Cryptology–EUROCRYPT 2016: 35th …, 2016 - Springer
We construct an indistinguishability obfuscation (IO) scheme for all polynomial-size circuits
from constant-degree graded encoding schemes, assuming the existence of a …