A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption
[chapter]
2013
Lecture Notes in Computer Science
We put forward a new notion, function privacy, in identitybased encryption and, more generally, in functional encryption. ...
In light of such an inherent difficulty, any meaningful notion of function privacy must be based on the minimal assumption that, from the adversary's point of view, identities that correspond to its given ...
Nevertheless, our notion is inspired by that of [8] , and we refer the reader to Section 2 for an elaborate discussion (in particular, we discuss a somewhat natural DPKE-based approach for designing function-private ...
doi:10.1007/978-3-642-40084-1_26
fatcat:rcr2f6ra4jh5nppzxvvco3sgme
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption
[chapter]
2010
Lecture Notes in Computer Science
We present two fully secure functional encryption schemes: a fully secure attribute-based encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) scheme for inner-product ...
In both cases, previous constructions were only proven to be selectively secure. Both results use novel strategies to adapt the dual system encryption methodology introduced by Waters. ...
Hierarchical Identity Based Encryption (HIBE) [23, 26] expands the functionality of identity based encryption to include a hierarchical structure on identities, where identities can delegate secret keys ...
doi:10.1007/978-3-642-13190-5_4
fatcat:sazrfsry65gpzh5bwxm2idfl7q
A survey on functional encryption
2021
Advances in Mathematics of Communications
<p style='text-indent:20px;'>Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and allows learning a function of the encrypted ...
In this paper, we review all FE classes, describing their functionalities and main characteristics. ...
We would like to thank Andrea Gelpi, Marco Pedicini, and Michela Iezzi for their interest and valuable discussion on the subject. We also thank the anonymous referee for the helpful comments. ...
doi:10.3934/amc.2021049
fatcat:l3j4d2kfwrbdvk7ff4hrg7leo4
A survey on Functional Encryption
[article]
2021
arXiv
pre-print
Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and it allows to learn a function of the encrypted data. ...
In this paper, we review all FE classes, describing their functionalities and main characteristics. ...
We acknowledge the financial support from BV TECH Spa under the project "Algebraic methods for Cloud Encryption". ...
arXiv:2106.06306v1
fatcat:i76bnyo2uvak5plpyexpntwb74
Parallel Homomorphic Encryption
[chapter]
2013
Lecture Notes in Computer Science
In the problem of private outsourced computation, a client wishes to delegate the evaluation of a function f on a private input x to an untrusted worker without the latter learning anything about x and ...
Unlike previous constructions, our reductions are not based on secret sharing and are fully-hiding in the sense that the privacy of the input is guaranteed even if the adversary sees all the client's queries ...
Introduction In the problem of private outsourced computation, a client wishes to delegate the evaluation of a function f on a private input x to an untrusted worker without the latter learning anything ...
doi:10.1007/978-3-642-41320-9_15
fatcat:3z4ewh3w6vaqrndo32bqsdrala
Functional encryption
2012
Communications of the ACM
enCryption is a method for users to securely share data over an insecure network or storage server. ...
challenging the conventional wisdom of the time. ...
Identity-based encryption. ...
doi:10.1145/2366316.2366333
fatcat:syexjsiuvrgfjgp67sxfwcaicm
Searchable Encryption: A Review
2017
International Journal of Security and Its Applications
In this paper, Searchable Encryption (SE) techniques which allow accessing data on encrypted cloud were reviewed. ...
As a solution, the data is encrypted before sending to the cloud. However, the normal searching mechanism could not get through the encrypted data. ...
SI is used for the first time search while DI is applied on the next query submission.
Identity-Based Encryption Identity-Based Encryption (IBE) algorithm was initiated in 1984 by Shamir [31] . ...
doi:10.14257/ijsia.2017.11.12.07
fatcat:j2k35dounbe2lddx5meonusv4q
Controlled Functional Encryption
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14
As in functional encryption, C-FE allows a user (client) to learn only certain functions of encrypted data, using keys obtained from an authority. ...
Motivated by privacy and usability requirements in various scenarios where existing cryptographic tools (like secure multi-party computation and functional encryption) are not adequate, we introduce a ...
like Identity Based Encryption (IBE), Attribute Based Encryption (ABE), etc. as special cases [57, 34, 17, 44, 52, 31, 33, 28, 30 ]. ...
doi:10.1145/2660267.2660291
dblp:conf/ccs/NaveedAPWAHG14
fatcat:v5aalr2t6faj3kzcdvigqd5z6u
Function-Private Subspace-Membership Encryption and Its Applications
[chapter]
2013
Lecture Notes in Computer Science
Boneh, Raghunathan, and Segev (CRYPTO '13) have recently put forward the notion of function privacy and applied it to identity-based encryption, motivated by the need for providing predicate privacy in ...
Among our applications, we significantly improve the function privacy of the identity-based encryption schemes of Boneh et al.: whereas their schemes are function private only for identities that are highly ...
Opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of DARPA or IARPA. ...
doi:10.1007/978-3-642-42033-7_14
fatcat:jta3wmrqtre53fyyas5tieb5tq
On the Relationship between Functional Encryption, Obfuscation, and Fully Homomorphic Encryption
[chapter]
2013
Lecture Notes in Computer Science
We first introduce the notion of Randomized Functional Encryption (RFE), a generalization of Functional Encryption dealing with randomized functionalities of interest in its own right, and show how to ...
We investigate the relationship between Functional Encryption (FE) and Fully Homomorphic Encryption (FHE), demonstrating that, under certain assumptions, a Functional Encryption scheme supporting evaluation ...
Their work was partially supported by NSF Contract CCF-1018064 and is based on research sponsored by DARPA under agreement numbers FA8750-11-C-0096 and FA8750-11-2-0225. The U.S. ...
doi:10.1007/978-3-642-45239-0_5
fatcat:gml6vajgqjhevgm6ydofrok6pi
AES Image Encryption (Advanced Encryption Standard)
2021
International Journal for Research in Applied Science and Engineering Technology
Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. ...
In this paper , an algorithm in which the image is an input to AES Encryption to get the encrypted image and then input it to AES Decryption to get the original image is proposed and explained which will ...
AES key schedule (identically to encryption) and then use the appropriate key in the exclusive-or. ...
doi:10.22214/ijraset.2021.39542
fatcat:3yfh4rozunftbpolwsauswmih4
Functional Encryption: Origins and Recent Developments
[chapter]
2013
Lecture Notes in Computer Science
In this talk, we will present the notion of functional encryption and recent progress in the area. We will begin by describing the concept and origins of functional encryption. ...
Next, we will describe intuitively why current bilinear map based constructions appear to be "stuck" with boolean formula type functionality even in the public index setting. ...
In subsequent works [6, 16] the concept evolved to hide the metadata. ...
doi:10.1007/978-3-642-36362-7_4
fatcat:lkyl4yf5qnepxpt2f36sdylxw4
Functional Encryption Without Obfuscation
[chapter]
2015
Lecture Notes in Computer Science
Achieving full security without the lossiness of complexity leveraging is just as important for FE for circuits as it was for identity-based encryption (IBE) ten years ago [Wat05, Gen06, Wat09], for both ...
Can we construct a fully secure functional encryption scheme for general circuits without an exponential loss in the security reduction? ...
Efficient identity-based encryption without random oracles. ...
doi:10.1007/978-3-662-49099-0_18
fatcat:axvvtnq4dfaalmp6txlimt2v5u
Functional Encryption: Definitions and Challenges
[chapter]
2011
Lecture Notes in Computer Science
We then present a natural simulation-based definition and show that it (provably) cannot be satisfied in the standard model, but can be satisfied in the random oracle model. ...
We show that defining security for functional encryption is non-trivial. First, we show that a natural game-based definition is inadequate for some functionalities. ...
In Identity-Based Encryption (IBE) [Sha84] ciphertexts and private keys are associated with strings (a.k.a identities) and a key can decrypt a ciphertext if the two strings are equal. ...
doi:10.1007/978-3-642-19571-6_16
fatcat:iiz6j7bhezfifglqjtwbi7rwom
Worry-free encryption
2010
Proceedings of the 17th ACM conference on Computer and communications security - CCS '10
Our notion can be seen as a functional encryption scheme but in a public-key setting. ...
In this work, we put forward the notion of Worry-Free Encryption. ...
We now address function hiding. ...
doi:10.1145/1866307.1866359
dblp:conf/ccs/SahaiS10
fatcat:iobb2euxarhq5d5gte3t6xker4
« Previous
Showing results 1 — 15 out of 16,973 results