Filters








16,973 Hits in 4.5 sec

Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption [chapter]

Dan Boneh, Ananth Raghunathan, Gil Segev
2013 Lecture Notes in Computer Science  
We put forward a new notion, function privacy, in identitybased encryption and, more generally, in functional encryption.  ...  In light of such an inherent difficulty, any meaningful notion of function privacy must be based on the minimal assumption that, from the adversary's point of view, identities that correspond to its given  ...  Nevertheless, our notion is inspired by that of [8] , and we refer the reader to Section 2 for an elaborate discussion (in particular, we discuss a somewhat natural DPKE-based approach for designing function-private  ... 
doi:10.1007/978-3-642-40084-1_26 fatcat:rcr2f6ra4jh5nppzxvvco3sgme

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption [chapter]

Allison Lewko, Tatsuaki Okamoto, Amit Sahai, Katsuyuki Takashima, Brent Waters
2010 Lecture Notes in Computer Science  
We present two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for inner-product  ...  In both cases, previous constructions were only proven to be selectively secure. Both results use novel strategies to adapt the dual system encryption methodology introduced by Waters.  ...  Hierarchical Identity Based Encryption (HIBE) [23, 26] expands the functionality of identity based encryption to include a hierarchical structure on identities, where identities can delegate secret keys  ... 
doi:10.1007/978-3-642-13190-5_4 fatcat:sazrfsry65gpzh5bwxm2idfl7q

A survey on functional encryption

Carla Mascia, Massimiliano Sala, Irene Villa
2021 Advances in Mathematics of Communications  
<p style='text-indent:20px;'>Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and allows learning a function of the encrypted  ...  In this paper, we review all FE classes, describing their functionalities and main characteristics.  ...  We would like to thank Andrea Gelpi, Marco Pedicini, and Michela Iezzi for their interest and valuable discussion on the subject. We also thank the anonymous referee for the helpful comments.  ... 
doi:10.3934/amc.2021049 fatcat:l3j4d2kfwrbdvk7ff4hrg7leo4

A survey on Functional Encryption [article]

Carla Mascia, Massimiliano Sala, Irene Villa
2021 arXiv   pre-print
Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and it allows to learn a function of the encrypted data.  ...  In this paper, we review all FE classes, describing their functionalities and main characteristics.  ...  We acknowledge the financial support from BV TECH Spa under the project "Algebraic methods for Cloud Encryption".  ... 
arXiv:2106.06306v1 fatcat:i76bnyo2uvak5plpyexpntwb74

Parallel Homomorphic Encryption [chapter]

Seny Kamara, Mariana Raykova
2013 Lecture Notes in Computer Science  
In the problem of private outsourced computation, a client wishes to delegate the evaluation of a function f on a private input x to an untrusted worker without the latter learning anything about x and  ...  Unlike previous constructions, our reductions are not based on secret sharing and are fully-hiding in the sense that the privacy of the input is guaranteed even if the adversary sees all the client's queries  ...  Introduction In the problem of private outsourced computation, a client wishes to delegate the evaluation of a function f on a private input x to an untrusted worker without the latter learning anything  ... 
doi:10.1007/978-3-642-41320-9_15 fatcat:3z4ewh3w6vaqrndo32bqsdrala

Functional encryption

Dan Boneh, Amit Sahai, Brent Waters
2012 Communications of the ACM  
enCryption is a method for users to securely share data over an insecure network or storage server.  ...  challenging the conventional wisdom of the time.  ...  Identity-based encryption.  ... 
doi:10.1145/2366316.2366333 fatcat:syexjsiuvrgfjgp67sxfwcaicm

Searchable Encryption: A Review

Khadijah Chamili, Md. Jan Nordin, Waidah Ismail, Abduljalil Radman
2017 International Journal of Security and Its Applications  
In this paper, Searchable Encryption (SE) techniques which allow accessing data on encrypted cloud were reviewed.  ...  As a solution, the data is encrypted before sending to the cloud. However, the normal searching mechanism could not get through the encrypted data.  ...  SI is used for the first time search while DI is applied on the next query submission. Identity-Based Encryption Identity-Based Encryption (IBE) algorithm was initiated in 1984 by Shamir [31] .  ... 
doi:10.14257/ijsia.2017.11.12.07 fatcat:j2k35dounbe2lddx5meonusv4q

Controlled Functional Encryption

Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl Gunter
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
As in functional encryption, C-FE allows a user (client) to learn only certain functions of encrypted data, using keys obtained from an authority.  ...  Motivated by privacy and usability requirements in various scenarios where existing cryptographic tools (like secure multi-party computation and functional encryption) are not adequate, we introduce a  ...  like Identity Based Encryption (IBE), Attribute Based Encryption (ABE), etc. as special cases [57, 34, 17, 44, 52, 31, 33, 28, 30 ].  ... 
doi:10.1145/2660267.2660291 dblp:conf/ccs/NaveedAPWAHG14 fatcat:v5aalr2t6faj3kzcdvigqd5z6u

Function-Private Subspace-Membership Encryption and Its Applications [chapter]

Dan Boneh, Ananth Raghunathan, Gil Segev
2013 Lecture Notes in Computer Science  
Boneh, Raghunathan, and Segev (CRYPTO '13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy in  ...  Among our applications, we significantly improve the function privacy of the identity-based encryption schemes of Boneh et al.: whereas their schemes are function private only for identities that are highly  ...  Opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of DARPA or IARPA.  ... 
doi:10.1007/978-3-642-42033-7_14 fatcat:jta3wmrqtre53fyyas5tieb5tq

On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption [chapter]

Joël Alwen, Manuel Barbosa, Pooya Farshim, Rosario Gennaro, S. Dov Gordon, Stefano Tessaro, David A. Wilson
2013 Lecture Notes in Computer Science  
We first introduce the notion of Randomized Functional Encryption (RFE), a generalization of Functional Encryption dealing with randomized functionalities of interest in its own right, and show how to  ...  We investigate the relationship between Functional Encryption (FE) and Fully Homomorphic Encryption (FHE), demonstrating that, under certain assumptions, a Functional Encryption scheme supporting evaluation  ...  Their work was partially supported by NSF Contract CCF-1018064 and is based on research sponsored by DARPA under agreement numbers FA8750-11-C-0096 and FA8750-11-2-0225. The U.S.  ... 
doi:10.1007/978-3-642-45239-0_5 fatcat:gml6vajgqjhevgm6ydofrok6pi

AES Image Encryption (Advanced Encryption Standard)

Paavni Gaur
2021 International Journal for Research in Applied Science and Engineering Technology  
Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project.  ...  In this paper , an algorithm in which the image is an input to AES Encryption to get the encrypted image and then input it to AES Decryption to get the original image is proposed and explained which will  ...  AES key schedule (identically to encryption) and then use the appropriate key in the exclusive-or.  ... 
doi:10.22214/ijraset.2021.39542 fatcat:3yfh4rozunftbpolwsauswmih4

Functional Encryption: Origins and Recent Developments [chapter]

Brent Waters
2013 Lecture Notes in Computer Science  
In this talk, we will present the notion of functional encryption and recent progress in the area. We will begin by describing the concept and origins of functional encryption.  ...  Next, we will describe intuitively why current bilinear map based constructions appear to be "stuck" with boolean formula type functionality even in the public index setting.  ...  In subsequent works [6, 16] the concept evolved to hide the metadata.  ... 
doi:10.1007/978-3-642-36362-7_4 fatcat:lkyl4yf5qnepxpt2f36sdylxw4

Functional Encryption Without Obfuscation [chapter]

Sanjam Garg, Craig Gentry, Shai Halevi, Mark Zhandry
2015 Lecture Notes in Computer Science  
Achieving full security without the lossiness of complexity leveraging is just as important for FE for circuits as it was for identity-based encryption (IBE) ten years ago [Wat05, Gen06, Wat09], for both  ...  Can we construct a fully secure functional encryption scheme for general circuits without an exponential loss in the security reduction?  ...  Efficient identity-based encryption without random oracles.  ... 
doi:10.1007/978-3-662-49099-0_18 fatcat:axvvtnq4dfaalmp6txlimt2v5u

Functional Encryption: Definitions and Challenges [chapter]

Dan Boneh, Amit Sahai, Brent Waters
2011 Lecture Notes in Computer Science  
We then present a natural simulation-based definition and show that it (provably) cannot be satisfied in the standard model, but can be satisfied in the random oracle model.  ...  We show that defining security for functional encryption is non-trivial. First, we show that a natural game-based definition is inadequate for some functionalities.  ...  In Identity-Based Encryption (IBE) [Sha84] ciphertexts and private keys are associated with strings (a.k.a identities) and a key can decrypt a ciphertext if the two strings are equal.  ... 
doi:10.1007/978-3-642-19571-6_16 fatcat:iiz6j7bhezfifglqjtwbi7rwom

Worry-free encryption

Amit Sahai, Hakan Seyalioglu
2010 Proceedings of the 17th ACM conference on Computer and communications security - CCS '10  
Our notion can be seen as a functional encryption scheme but in a public-key setting.  ...  In this work, we put forward the notion of Worry-Free Encryption.  ...  We now address function hiding.  ... 
doi:10.1145/1866307.1866359 dblp:conf/ccs/SahaiS10 fatcat:iobb2euxarhq5d5gte3t6xker4
« Previous Showing results 1 — 15 out of 16,973 results