Filters








171 Hits in 4.8 sec

Unbounded Inner-Product Functional Encryption with Succinct Keys

Edouard Dufour-Sans, David Pointcheval
<span title="2019-07-01">2019</span> <i title="Zenodo"> Zenodo </i> &nbsp;
It is also the first Public-Key Inner-Product Functional Encryption Scheme with a constant-size public key (and master secret key), as well constant-size functional decryption keys: each consisting of  ...  In an Unbounded Inner-Product Functional Encryption scheme, a public key allows anyone to encrypt unbounded vectors, that are essentially mappings from N∗ to Zp.  ...  Inner-Product Functional Encryption.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.3405940">doi:10.5281/zenodo.3405940</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/jozttjkhtnhwjlv5y6jp44hryi">fatcat:jozttjkhtnhwjlv5y6jp44hryi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200310014811/https://zenodo.org/record/3405940/files/201907-%20Unbounded%20Inner%20Product%20Functional%20Encryption%20with%20Succinct%20Keys.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/22/35/22353f18753be1297805b0b3f6b8addf734b1a75.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.3405940"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

Functional Encryption for Bounded Collusions, Revisited [chapter]

Shweta Agrawal, Alon Rosen
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We provide a new construction of functional encryption (FE) for circuits in the bounded collusion model.  ...  data dependent component and a non-succinct data independent component.  ...  Thus, functionally, our scheme implies succinct FE supporting unbounded number of keys for low degree polynomials 4 : the encryptor can provide a succinct ciphertext for x, namely CT data (x), the key  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-70500-2_7">doi:10.1007/978-3-319-70500-2_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hfnrtum37nfnnce23dm5lou7hy">fatcat:hfnrtum37nfnnce23dm5lou7hy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170715224407/https://eprint.iacr.org/2016/361.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/7d/31/7d313f02a9b08709fb25f3b8204f3c70ed7dfca9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-70500-2_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A survey on functional encryption

Carla Mascia, Massimiliano Sala, Irene Villa
<span title="">2021</span> <i title="American Institute of Mathematical Sciences (AIMS)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jbbcig2iqnbuvngg7spzuoozwu" style="color: black;">Advances in Mathematics of Communications</a> </i> &nbsp;
<p style='text-indent:20px;'>Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and allows learning a function of the encrypted  ...  In this paper, we review all FE classes, describing their functionalities and main characteristics.  ...  Concurrently and independently, in [82] , Dufour-Sans and Pointcheval describe an unbounded IPE system supporting identity access control with succinct keys.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3934/amc.2021049">doi:10.3934/amc.2021049</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/l3j4d2kfwrbdvk7ff4hrg7leo4">fatcat:l3j4d2kfwrbdvk7ff4hrg7leo4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20211108230708/https://www.aimsciences.org/article/exportPdf?id=69dc52a9-c02d-44df-93c5-ee85e1d20d37" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3a/fb/3afbc8d3ebefca242c84a314d09c35ed8a960736.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.3934/amc.2021049"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Mergeable Functional Encryption [chapter]

Vincenzo Iovino, Karol Żebrowski
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In recent years, there has been great interest in Functional Encryption (FE), a generalization of traditional encryption where a token enables a user to learn a specific function of the encrypted data  ...  In a mFE system, given a ciphertext c 1 encrypting m 1 and a ciphertext c 2 encrypting m 2 , it is possible to produce in an oblivious way (i.e., given only the public-key and without knowledge of the  ...  We denote by x 1 b (resp. x 2 b ) the inner string encrypted in the ciphertext induced by the sequence s b with respect to the first (resp. second) public-key.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-68637-0_26">doi:10.1007/978-3-319-68637-0_26</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/drsf7y2eh5dxnfutsvl2dxvtdm">fatcat:drsf7y2eh5dxnfutsvl2dxvtdm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150318075640/http://eprint.iacr.org/2015/103.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2a/ab/2aabbfcc25773b31efbbae7aad8e769dc341ac20.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-68637-0_26"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Lattice-Based SNARGs and Their Application to More Efficient Obfuscation [chapter]

Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this work, we show that an ideal obfuscation of both the decryption function in a fully homomorphic encryption scheme and a variant of the verification algorithm of our new lattice-based SNARG yields  ...  Kilian [Kil92] gave the first succinct four-round interactive argument system for NP based on collision-resistant hash functions and probabilistically-checkable proofs (PCPs).  ...  Thus far, we have only considered the case of evaluating functions involving a single inner product.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-56617-7_9">doi:10.1007/978-3-319-56617-7_9</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5qejnchovjbzdht444ph35yiry">fatcat:5qejnchovjbzdht444ph35yiry</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170311125249/https://crypto.stanford.edu/~dwu4/papers/LatticeSNARGsFull.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/32/10/3210dc85a20ba07ea335450a75808367a6415e8f.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-56617-7_9"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A survey on Functional Encryption [article]

Carla Mascia, Massimiliano Sala, Irene Villa
<span title="2021-06-11">2021</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Functional Encryption (FE) expands traditional public-key encryption in two different ways: it supports fine-grained access control and it allows to learn a function of the encrypted data.  ...  In this paper, we review all FE classes, describing their functionalities and main characteristics.  ...  We acknowledge the financial support from BV TECH Spa under the project "Algebraic methods for Cloud Encryption".  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2106.06306v1">arXiv:2106.06306v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/i76bnyo2uvak5plpyexpntwb74">fatcat:i76bnyo2uvak5plpyexpntwb74</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210615114823/https://arxiv.org/ftp/arxiv/papers/2106/2106.06306.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/60/e0/60e0f15cb6aa48be793213cad8c0204fba606d52.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2106.06306v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks [chapter]

Shweta Agrawal
<span title="">2017</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We construct a functional encryption scheme for circuits which simultaneously achieves and improves upon the security of the current best known, and incomparable, constructions from standard assumptions  ...  Our scheme is secure based on the learning with errors (LWE) assumption. Our construction implies: * IIT Madras, India.  ...  We thank Aloni Cohen for pointing out an issue with an earlier version of the draft.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-63688-7_1">doi:10.1007/978-3-319-63688-7_1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/fqlsymnqybcu3bc6acwdlx2lku">fatcat:fqlsymnqybcu3bc6acwdlx2lku</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170711030700/http://eprint.iacr.org/2016/654.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/77/89/778935f2faf32b89f3e990eac3141a26c220188b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-63688-7_1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Efficient functional encryption for inner product with simulation-based security

Wenbo Liu, Qiong Huang, Xinjian Chen, Hongbo Li
<span title="2021-01-06">2021</span> <i title="Springer Science and Business Media LLC"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/nvdntm3qtfcjzjwo3aacs6zhtu" style="color: black;">Cybersecurity</a> </i> &nbsp;
In this paper, we construct an efficient private-key functional encryption (FE) for inner product with simulation-based security, which is much stronger than indistinguishability-based security, under  ...  Inner product encryption (IPE) is a special type of functional encryption where the decryption algorithm, given a ciphertext related to a vector x and a secret key related to a vector y, computes the inner  ...  Authors' contributions The first author constructed the scheme with careful security proofs and wrote the manuscript.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s42400-020-00067-1">doi:10.1186/s42400-020-00067-1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/d53xcpeqlvelri3speijrpd54m">fatcat:d53xcpeqlvelri3speijrpd54m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20210118161031/https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00067-1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/52/1d/521daf02ecfd3157b9b9a6045f4e562a0031e848.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1186/s42400-020-00067-1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> springer.com </button> </a>

On Extractability Obfuscation [chapter]

Elette Boyle, Kai-Min Chung, Rafael Pass
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
(adaptive-message) indistinguishability-secure functional encryption for an unbounded number of key queries and unbounded message spaces.  ...  . • We introduce a new notion of functional witness encryption, which enables encrypting a message m with respect to an instance x, language L, and function f , such that anyone (and only those) who holds  ...  Theorem 6.9 thus shows how to turn witness encryption to extractable witness encryption for the case of languages with polynomially many witness.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-54242-8_3">doi:10.1007/978-3-642-54242-8_3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3khqmnbqjbcw5jqiwbflbd62ui">fatcat:3khqmnbqjbcw5jqiwbflbd62ui</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190228110246/http://pdfs.semanticscholar.org/90f8/36fc73b7e7e0b89a7dcfd6b9bfcb98890762.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/90/f8/90f836fc73b7e7e0b89a7dcfd6b9bfcb98890762.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-54242-8_3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Spooky Encryption and Its Applications [chapter]

Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Lastly, it immediately yields a function secret sharing (FSS) scheme for all functions. We also define a notion of spooky-free encryption, which ensures that no spooky relationship is achievable.  ...  . , x n are encrypted under independent public keys. Given the ciphertexts {c i = Enc pk i (x i )} i , Alice outputs ciphertexts c 1 , . . . , c n that decrypt to y 1 , . . . , y n respectively.  ...  In that scheme (after some syntactic massaging) secret keys and single-key ciphertexts are vectors in Z n q , and decryption consists of computing the inner product modulo q, w = s, c , then rounding to  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53015-3_4">doi:10.1007/978-3-662-53015-3_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/oey3p4bthvasnd3bksxsy4imi4">fatcat:oey3p4bthvasnd3bksxsy4imi4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160909014055/http://eprint.iacr.org/2016/272.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/86/7a/867adf52b43dfa44c56d096737a0d588a8a978bc.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53015-3_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Function-Hiding Inner Product Encryption Is Practical [chapter]

Sam Kim, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, David J. Wu
<span title="">2018</span> <i title="Springer International Publishing"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Inner product encryption is a special case of functional encryption where both secret keys and ciphertext are associated with vectors.  ...  An inner product encryption scheme is function-hiding if the keys and ciphertexts reveal no additional information about both x and y beyond their inner product.  ...  [GKP + 13] showed how to construct succinct single-key functional encryption in the bounded collusion setting from the Learning with Errors (LWE) assumption.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-98113-0_29">doi:10.1007/978-3-319-98113-0_29</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3f6jf3igaza23nid3qgnzblbgq">fatcat:3f6jf3igaza23nid3qgnzblbgq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190305010301/http://pdfs.semanticscholar.org/ccff/3269d31da5270889ba2c4dbce4062c255c52.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cc/ff/ccff3269d31da5270889ba2c4dbce4062c255c52.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-319-98113-0_29"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Functional Encryption from (Small) Hardware Tokens [chapter]

Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Functional encryption (FE) enables fine-grained access control of encrypted data while promising simplified key management.  ...  Our token-based approach can be extended to support hierarchal functional encryption, function privacy, and more.  ...  Thus, our solution #1 is suitable for lower complexity functionalities (e.g., inner product functionality).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-42045-0_7">doi:10.1007/978-3-642-42045-0_7</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/odtsxwdsq5eizhy7jybjlzssr4">fatcat:odtsxwdsq5eizhy7jybjlzssr4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808041008/http://www.iis.sinica.edu.tw/~kmchung/download/token-FE.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/bf/ad/bfad16a4c3d25e0497c78c896cc7f659bab59500.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-42045-0_7"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits [chapter]

Nuttapong Attrapadung
<span title="">2017</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
All of our four fully secure schemes can deal with unbounded-size circuits, while enjoy succinctness, meaning that the key and ciphertext sizes are (less than or) proportional to corresponding circuit  ...  We ask: Problem 3: Is it possible to construct fully-secure KP-ABE with constantsize ciphertexts, fully-secure CP-ABE with constant-size keys (again, for unbounded-size circuits and with polynomial reductions  ...  Until recently, there were only ABE for simple classes such as boolean formulae [33, 10, 37, 40] and inner product predicate [34, 7, 41] .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-54388-7_1">doi:10.1007/978-3-662-54388-7_1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/x767dmtlmnbgbbkxumoyujjtga">fatcat:x767dmtlmnbgbbkxumoyujjtga</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170710140828/http://eprint.iacr.org/2017/023.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/3f/e7/3fe7e322de47f977c4784f01f55b329de193a38a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-54388-7_1"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Public-Key Encryption, Revisited: Tight Security and Richer Functionalities

Romain Gay
<span title="2019-03-01">2019</span> <i title="Zenodo"> Zenodo </i> &nbsp;
An encryption of a message m, together with a functional decryption key associated with the function f, decrypts the value f(m), without revealing any additional information about the encrypted message  ...  It generalizes the latter, in that a master secret key is used to generate so-called functional decryption keys, each of which is associated with a particular function.  ...  In this thesis, we present extensions of these functional encryption for inner products, and new functional encryption schemes with succinct ciphertexts that supports the evaluation of degree-2 polynomials  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.3405872">doi:10.5281/zenodo.3405872</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ypcfqlzjifephog53uenm4mqm4">fatcat:ypcfqlzjifephog53uenm4mqm4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201225164411/https://zenodo.org/record/3405873/files/201903-%20PhD%20thesis%20Public%20Key%20Encryption%2C%20Revisited%20Tight%20Security%20and%20Richer%20Functionalities.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/87/0b/870bb5a8573861f5def6ec3ebc63e37875c9d658.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.5281/zenodo.3405872"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> zenodo.org </button> </a>

VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data

Zhiguo Wan, Robert H. Deng
<span title="">2016</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/okrr6mjegfbtbjrfrxtci54s6i" style="color: black;">IEEE Transactions on Dependable and Secure Computing</a> </i> &nbsp;
We also propose a random challenge technique with ordering for verifying top-k search results, which can detect incorrect top-k results with probability close to 1.  ...  To fulfill these requirements, we design a Verifiable Privacy-preserving keyword Search scheme, called VPSearch, by integrating an adapted homomorphic MAC technique with a privacy-preserving multi-keyword  ...  function (inner product) over the authentication tags to obtain the results.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tdsc.2016.2635128">doi:10.1109/tdsc.2016.2635128</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ps54mbewdjcr5nazgehwrlg7aq">fatcat:ps54mbewdjcr5nazgehwrlg7aq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200318102508/https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=5215&amp;context=sis_research" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ac/4b/ac4b4f02596fc0727f904e1786d203e358d5a20e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tdsc.2016.2635128"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 171 results