Filters








28,643 Hits in 6.6 sec

Functional encryption

Dan Boneh, Amit Sahai, Brent Waters
2012 Communications of the ACM  
enCryption is a method for users to securely share data over an insecure network or storage server.  ...  challenging the conventional wisdom of the time.  ...  Secure constructions. Secure constructions for complex functionalities must prevent collusion attacks.  ... 
doi:10.1145/2366316.2366333 fatcat:syexjsiuvrgfjgp67sxfwcaicm

Backward-Leak Uni-Directional Updatable Encryption from Public Key Encryption [article]

Yao Jiang Galteland, Jiaxin Pan
2022 IACR Cryptology ePrint Archive  
We propose two novel generic constructions of UE schemes that are secure in the backward-leak uni-directional key update setting from public key encryption (PKE) schemes: the first one requires a key and  ...  We show that security in the backward-leak uni-directional key updates setting is equivalent to the no-directional one.  ...  Generic Constructions of UE from PKE. Our third contribution is constructing two generic constructions of UE schemes with backward-leak uni-directional key update from PKE schemes.  ... 
dblp:journals/iacr/GaltelandP22 fatcat:g4wb376tx5b77emdllyeh6sqom

Partially Encrypted Deep Learning using Functional Encryption

Theo Ryffel, David Pointcheval, Francis R. Bach, Edouard Dufour-Sans, Romain Gay
2019 Neural Information Processing Systems  
Machine learning on encrypted data has received a lot of attention thanks to recent breakthroughs in homomorphic encryption and secure multi-party computation.  ...  Breakthroughs in fully homomorphic encryption (FHE) [15, 18] and secure multi-party computation (SMPC) [19, 39] have made computation on encrypted data practical and implementations of neural networks  ...  Community's Seventh Framework Programme (FP7/2007-2013 Grant Agreement no. 339563 -CryptoCloud), the European Community's Horizon 2020 Project FENTEC (Grant Agreement no. 780108), the Google PhD fellowship, and  ... 
dblp:conf/nips/RyffelPBDG19 fatcat:dqwvdgh6bvh4jjs55qbfpxplpm

Homomorphic Encryption [chapter]

Shai Halevi
2017 Tutorials on the Foundations of Cryptography  
We briefly discuss the three generations of FHE constructions since Gentry's breakthrough result in 2009, and cover in detail the thirdgeneration scheme of Gentry, Sahai, and Waters (GSW).  ...  In this tutorial we study FHE and describe its different properties, relations with other concepts in cryptography, and constructions.  ...  A construction based on LWE was first described by Clear and McGoldrick [25], and later significantly simplified by Mukherjee and Wichs [73] and improved further by Peikert and Shiehian [80] .  ... 
doi:10.1007/978-3-319-57048-8_5 fatcat:owa6tq4hl5aafmrrghnn5f6csq

Mergeable Functional Encryption [chapter]

Vincenzo Iovino, Karol Żebrowski
2017 Lecture Notes in Computer Science  
In recent years, there has been great interest in Functional Encryption (FE), a generalization of traditional encryption where a token enables a user to learn a specific function of the encrypted data  ...  In this paper we put forward a new generalization of FE that we call M ergeable FE (mFE).  ...  and in the message size, and the tokens generated using KeyGen for machine M have size q(λ, |M |), where q is a polynomial and |M | is the size of the Turing machine. • Input-specific running-time: A  ... 
doi:10.1007/978-3-319-68637-0_26 fatcat:drsf7y2eh5dxnfutsvl2dxvtdm

Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption [article]

Ghous Amjad, Sarvar Patel, Giuseppe Persiano, Kevin Yeo, Moti Yung
2021 IACR Cryptology ePrint Archive  
Furthermore, our constructions simultaneously provide forward and backward privacy that are the de-facto standard security notions for dynamic STE schemes (Stefanov et al.  ...  Encrypted multi-maps support queries for specific labels that return the associated value tuple.  ...  If SKE is an IND-CPA-secure encryption, 2ch s FB is a volume-hiding, forward private and type-II backward private L-secure dynamic, encrypted multi-map scheme.  ... 
dblp:journals/iacr/AmjadPPYY21 fatcat:xid546qbvzeynbmikxz6fyb23m

Privacy in Encrypted Content Distribution Using Private Broadcast Encryption [chapter]

Adam Barth, Dan Boneh, Brent Waters
2006 Lecture Notes in Computer Science  
We construct a private broadcast scheme, with a strong privacy guarantee against an active attacker, while achieving ciphertext length, encryption time, and decryption time comparable with the non-private  ...  We propose a new mechanism, private broadcast encryption, to protect the privacy of users of encrypted file systems and content delivery systems.  ...  The first construction is a generic construction from any asymmetric key encryption scheme that has key indistinguishability from chosen-ciphertext attacks (IK-CCA) [1] .  ... 
doi:10.1007/11889663_4 fatcat:eqzpgt36qrcf5fl4uqrcr5bzm4

Controlled Functional Encryption

Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl Gunter
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
and general classes of functions; and evaluating the performance of our constructions on various application scenarios.  ...  Our main contributions in this work include developing and formally defining the notion of C-FE; designing theoretical and practical constructions of C-FE schemes achieving these definitions for specific  ...  We design theoretical and practical constructions of C-FE schemes achieving these definitions for specific and general classes of functions.  ... 
doi:10.1145/2660267.2660291 dblp:conf/ccs/NaveedAPWAHG14 fatcat:v5aalr2t6faj3kzcdvigqd5z6u

CryptoNN: Training Neural Networks over Encrypted Data [article]

Runhua Xu, James B.D. Joshi, Chao Li
2019 arXiv   pre-print
We present performance evaluation and security analysis of the underlying crypto scheme and show through our experiments that CryptoNN achieves accuracy that is similar to those of the baseline neural  ...  We also construct a functional encryption scheme for basic arithmetic computation to support the requirement of the proposed CryptoNN framework.  ...  To be specific, the prediction phase only covers the secure feed-forward and normal feed-forward, and gets the output of the neural network model.  ... 
arXiv:1904.07303v2 fatcat:4istxfizvbelbhkuhjkpbevuaa

Decentralized Dynamic Broadcast Encryption [chapter]

Duong Hieu Phan, David Pointcheval, Mario Strefler
2012 Lecture Notes in Computer Science  
We extend the security notions of adaptive IND-CPA and IND-CCA from [26] to our case.  ...  A broadcast encryption system generally involves three kinds of entities: the group manager that deals with the membership, the encryptor that encrypts the data to the registered users according to a specific  ...  If PKE is an IND-CCA-secure PKE, MAC is a SUF-CMA-secure MAC, SKE is a IND-secure SKE, and F is a pseudo-random generator, then this scheme is a forward-secure IND-ACCA-secure BE scheme: Adv ind−acca DBE  ... 
doi:10.1007/978-3-642-32928-9_10 fatcat:wppq2g5mvfdevat25zwabwaxlm

Interactive Encryption and Message Authentication [chapter]

Yevgeniy Dodis, Dario Fiore
2014 Lecture Notes in Computer Science  
We observe that our 2-round PKMA scheme is both replay-secure and (passively) deniable, and our 2-round PKE scheme is both replayand forward-secure.  ...  It is well known that no non-interactive signature (resp. encryption) scheme can be deniable (resp. forward-secure), since the signature (resp. ciphertext) can later "serve as an evidence of the sender's  ...  Building Forward Secure (Interactive) PKE. Below we show that our construction of interactive encryption from IND−CPA-secure encryption proposed in Section 3.1 achieves strong forward security.  ... 
doi:10.1007/978-3-319-10879-7_28 fatcat:c77p7phskrht3kiamsbh7h2y54

Partially Encrypted Machine Learning using Functional Encryption [article]

Theo Ryffel, Edouard Dufour-Sans, Romain Gay, Francis Bach, David Pointcheval
2021 arXiv   pre-print
Machine learning on encrypted data has received a lot of attention thanks to recent breakthroughs in homomorphic encryption and secure multi-party computation.  ...  decryption key which allows one to learn a specific function evaluation of some encrypted data.  ...  Functional key generation 94 ± 5ms Evaluation time 2.97 ± 0.07s Encryption time 12.1 ± 0.3 s Discrete logarithms time 24 ± 9ms Table 1 : Average runtime for the FE scheme using a 2,7 GHz Intel Core i7  ... 
arXiv:1905.10214v5 fatcat:xpfogoacljgalbpj75qzjn2y3y

Binary Tree Encryption: Constructions and Applications [chapter]

Jonathan Katz
2004 Lecture Notes in Computer Science  
security, and adaptively-secure encryption.  ...  This survey presents the basic definitions of BTE and also highlights some recent applications of BTE to forward-secure encryption, identitybased and hierarchical identity-based encryption, chosen-ciphertext  ...  I would also like to thank the program chairs for ICISC 2003 (Jong In Lim and Dong Hoon Lee) for inviting me to present this survey, and for a very enjoyable visit to Korea.  ... 
doi:10.1007/978-3-540-24691-6_1 fatcat:e5md7abcwjbchnbajljwe7qjre

Plaintext-Checkable Encryption [chapter]

Sébastien Canard, Georg Fuchsbauer, Aline Gouget, Fabien Laguillaumie
2012 Lecture Notes in Computer Science  
We provide efficient generic random-oracle constructions for PCE based on any probabilistic or deterministic encryption scheme; we also give a practical construction in the standard model.  ...  Deterministic/probabilistic encryption, unlinkability, group signature with VLR and backward unlinkability.  ...  As for the previous construction, the idea is to use a secure encryption scheme whose randomness is generated using a secure pseudo-random generator with a seed depending on the message and the random  ... 
doi:10.1007/978-3-642-27954-6_21 fatcat:ur4pmqah2fb57hmg2cfzs2vly4

Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption [chapter]

Dan Boneh, Ananth Raghunathan, Gil Segev
2013 Lecture Notes in Computer Science  
We put forward a new notion, function privacy, in identitybased encryption and, more generally, in functional encryption.  ...  for specific identities.  ...  This is in contrast to the setting of deterministic public-key encryption (DPKE) [8] , where similar inherent difficulties arise when formalizing notions of security.  ... 
doi:10.1007/978-3-642-40084-1_26 fatcat:rcr2f6ra4jh5nppzxvvco3sgme
« Previous Showing results 1 — 15 out of 28,643 results