Function-hiding inner product encryption is practical

S Kim, K Lewi, A Mandal, H Montgomery, A Roy… - … Conference on Security …, 2018 - Springer
In a functional encryption scheme, secret keys are associated with functions and ciphertexts
are associated with messages. Given a secret key for a function f, and a ciphertext for a …

Function-hiding inner product encryption

A Bishop, A Jain, L Kowalczyk - … Conference on the Theory and Application …, 2015 - Springer
We extend the reach of functional encryption schemes that are provably secure under
simple assumptions against unbounded collusion to include function-hiding inner product …

Functional encryption for inner product with full function privacy

P Datta, R Dutta, S Mukhopadhyay - … on Practice and Theory in Public-Key …, 2016 - Springer
Functional encryption (FE) supports constrained decryption keys that allow decrypters to
learn specific functions of encrypted messages. In numerous practical applications of FE …

Function-private functional encryption in the private-key setting

Z Brakerski, G Segev - Journal of Cryptology, 2018 - Springer
Functional encryption supports restricted decryption keys that allow users to learn specific
functions of the encrypted messages. Although the vast majority of research on functional …

Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption

P Datta, T Okamoto, J Tomida - Public-Key Cryptography–PKC 2018: 21st …, 2018 - Springer
This paper presents two non-generic and practically efficient private key multi-input
functional encryption (MIFE) schemes for the multi-input version of the inner product …

From minicrypt to obfustopia via private-key functional encryption

I Komargodski, G Segev - Journal of Cryptology, 2020 - Springer
Private-key functional encryption enables fine-grained access to symmetrically encrypted
data. Although private-key functional encryption (supporting an unbounded number of keys …

Efficient functional encryption for inner-product values with full-hiding security

J Tomida, M Abe, T Okamoto - … Conference, ISC 2016, Honolulu, HI, USA …, 2016 - Springer
We construct an efficient non-generic private-key functional encryption (FE) for inner-product
values with full-hiding security, where confidentiality is assured not only for encrypted data …

A survey on functional encryption

C Mascia, M Sala, I Villa - arXiv preprint arXiv:2106.06306, 2021 - arxiv.org
Functional Encryption (FE) expands traditional public-key encryption in two different ways: it
supports fine-grained access control and allows learning a function of the encrypted data. In …

Trapdoor privacy in asymmetric searchable encryption schemes

A Arriaga, Q Tang, P Ryan - … 7th International Conference on Cryptology in …, 2014 - Springer
Asymmetric searchable encryption allows searches to be carried over ciphertexts, through
delegation, and by means of trapdoors issued by the owner of the data. Public Key …

Functional encryption and property preserving encryption: New definitions and positive results

S Agrawal, S Agrawal, S Badrinarayanan… - Cryptology ePrint …, 2013 - eprint.iacr.org
Functional Encryption (FE) is an exciting new paradigm that extends the notion of public key
encryption. In this work we explore the security of Inner Product Functional Encryption …