ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Upgrading to Functional Encryption
Theory of Cryptography - Lecture Notes in Computer Science
◽
10.1007/978-3-030-03807-6_23
◽
2018
◽
pp. 629-658
Author(s):
Saikrishna Badrinarayanan
◽
Dakshita Khurana
◽
Amit Sahai
◽
Brent Waters
Keyword(s):
Functional Encryption
Download Full-text
Related Documents
Cited By
References
Master-Key Leakage-Resilient and Continue Leakage-Resilient Functional Encryption in Dual Affine Spaces
Chinese Journal of Computers
◽
10.3724/sp.j.1016.2012.01856
◽
2012
◽
Vol 35
(9)
◽
pp. 1856
Author(s):
Ming-Wu ZHANG
◽
Bo YANG
◽
Tsuyoshi TAKAGI
Keyword(s):
Functional Encryption
◽
Affine Spaces
◽
Dual Affine
◽
Leakage Resilient
◽
Key Leakage
Download Full-text
Simple and Generic Constructions of Succinct Functional Encryption
Journal of Cryptology
◽
10.1007/s00145-021-09396-x
◽
2021
◽
Vol 34
(3)
◽
Author(s):
Fuyuki Kitagawa
◽
Ryo Nishimaki
◽
Keisuke Tanaka
Keyword(s):
Functional Encryption
Download Full-text
(In)security of concrete instantiation of Lin17’s functional encryption scheme from noisy multilinear maps
Designs Codes and Cryptography
◽
10.1007/s10623-021-00854-y
◽
2021
◽
Author(s):
Wonhee Cho
◽
Jiseung Kim
◽
Changmin Lee
Keyword(s):
Encryption Scheme
◽
Functional Encryption
◽
Multilinear Maps
Download Full-text
Functional encryption for computational hiding in prime order groups via pair encodings
Designs Codes and Cryptography
◽
10.1007/s10623-017-0327-7
◽
2017
◽
Vol 86
(1)
◽
pp. 97-120
◽
Cited By ~ 1
Author(s):
Jongkil Kim
◽
Willy Susilo
◽
Fuchun Guo
◽
Man Ho Au
Keyword(s):
Prime Order
◽
Functional Encryption
Download Full-text
Functional encryption for cubic polynomials and implementation
Theoretical Computer Science
◽
10.1016/j.tcs.2021.06.020
◽
2021
◽
Author(s):
Zheng Zhang
◽
Fangguo Zhang
Keyword(s):
Functional Encryption
◽
Cubic Polynomials
Download Full-text
Functional encryption for cascade automata
Information and Computation
◽
10.1016/j.ic.2016.12.005
◽
2017
◽
Vol 255
◽
pp. 384-407
Author(s):
Dan Brownstein
◽
Shlomi Dolev
◽
Niv Gilboa
Keyword(s):
Functional Encryption
Download Full-text
Tightly CCA-Secure Inner Product Functional Encryption Scheme
Theoretical Computer Science
◽
10.1016/j.tcs.2021.10.008
◽
2021
◽
Author(s):
Xiangyu Liu
◽
Shengli Liu
◽
Shuai Han
◽
Dawu Gu
Keyword(s):
Inner Product
◽
Encryption Scheme
◽
Functional Encryption
Download Full-text
Multi-input Inner-Product Functional Encryption from Pairings
Lecture Notes in Computer Science - Advances in Cryptology – EUROCRYPT 2017
◽
10.1007/978-3-319-56620-7_21
◽
2017
◽
pp. 601-626
◽
Cited By ~ 31
Author(s):
Michel Abdalla
◽
Romain Gay
◽
Mariana Raykova
◽
Hoeteck Wee
Keyword(s):
Inner Product
◽
Functional Encryption
Download Full-text
Efficient Multi-keyword Searchable Encryption Based on Multi-input Inner-Product Functional Encryption
Information and Communications Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-01950-1_22
◽
2018
◽
pp. 377-392
◽
Cited By ~ 1
Author(s):
Yunong Liang
◽
Zhenfu Cao
◽
Xiaolei Dong
◽
Jiachen Shen
Keyword(s):
Searchable Encryption
◽
Inner Product
◽
Functional Encryption
Download Full-text
Power of public-key function-private functional encryption
IET Information Security
◽
10.1049/iet-ifs.2016.0459
◽
2018
◽
Vol 12
(4)
◽
pp. 248-256
Author(s):
Vincenzo Iovino
◽
Qiang Tang
◽
Karol Żebrowski
Keyword(s):
Public Key
◽
Functional Encryption
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close