Function-hiding inner product encryption is practical
In a functional encryption scheme, secret keys are associated with functions and ciphertexts
are associated with messages. Given a secret key for a function f, and a ciphertext for a …
are associated with messages. Given a secret key for a function f, and a ciphertext for a …
Function-hiding inner product encryption
A Bishop, A Jain, L Kowalczyk - … Conference on the Theory and Application …, 2015 - Springer
We extend the reach of functional encryption schemes that are provably secure under
simple assumptions against unbounded collusion to include function-hiding inner product …
simple assumptions against unbounded collusion to include function-hiding inner product …
Functional encryption for inner product with full function privacy
P Datta, R Dutta, S Mukhopadhyay - … on Practice and Theory in Public-Key …, 2016 - Springer
Functional encryption (FE) supports constrained decryption keys that allow decrypters to
learn specific functions of encrypted messages. In numerous practical applications of FE …
learn specific functions of encrypted messages. In numerous practical applications of FE …
Function-private functional encryption in the private-key setting
Z Brakerski, G Segev - Journal of Cryptology, 2018 - Springer
Functional encryption supports restricted decryption keys that allow users to learn specific
functions of the encrypted messages. Although the vast majority of research on functional …
functions of the encrypted messages. Although the vast majority of research on functional …
Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption
This paper presents two non-generic and practically efficient private key multi-input
functional encryption (MIFE) schemes for the multi-input version of the inner product …
functional encryption (MIFE) schemes for the multi-input version of the inner product …
From minicrypt to obfustopia via private-key functional encryption
I Komargodski, G Segev - Journal of Cryptology, 2020 - Springer
Private-key functional encryption enables fine-grained access to symmetrically encrypted
data. Although private-key functional encryption (supporting an unbounded number of keys …
data. Although private-key functional encryption (supporting an unbounded number of keys …
Efficient functional encryption for inner-product values with full-hiding security
J Tomida, M Abe, T Okamoto - … Conference, ISC 2016, Honolulu, HI, USA …, 2016 - Springer
We construct an efficient non-generic private-key functional encryption (FE) for inner-product
values with full-hiding security, where confidentiality is assured not only for encrypted data …
values with full-hiding security, where confidentiality is assured not only for encrypted data …
A survey on functional encryption
Functional Encryption (FE) expands traditional public-key encryption in two different ways: it
supports fine-grained access control and allows learning a function of the encrypted data. In …
supports fine-grained access control and allows learning a function of the encrypted data. In …
Trapdoor privacy in asymmetric searchable encryption schemes
Asymmetric searchable encryption allows searches to be carried over ciphertexts, through
delegation, and by means of trapdoors issued by the owner of the data. Public Key …
delegation, and by means of trapdoors issued by the owner of the data. Public Key …
Functional encryption and property preserving encryption: New definitions and positive results
Functional Encryption (FE) is an exciting new paradigm that extends the notion of public key
encryption. In this work we explore the security of Inner Product Functional Encryption …
encryption. In this work we explore the security of Inner Product Functional Encryption …