搜索结果: 1-15 共查到“军队指挥学 Functional encryption”相关记录97条 . 查询时间(0.14 秒)
Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions
Functional Encryption Attribute Based Encryption Inner Product
2019/7/23
Functional encryption (FE) that bases on user attributes has many useful practical applications. For example, a company may only authorize department heads of other sections to query the average sale ...
From Single-Input to Multi-Client Inner-Product Functional Encryption
Decentralized multi-client functional encryption inner products
2019/5/21
We present a new generic construction of multi-client functional encryption (MCFE) for inner products from single-input functional inner-product encryption and standard pseudorandom functions. In spit...
Ad Hoc Multi-Input Functional Encryption
cryptographic protocols multi input functional encryption
2019/4/8
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the data from eavesdroppers, but using specialized encryption one can hope to hide the data (to the extent ...
Optimal Bounded-Collusion Secure Functional Encryption
Bounded-Key Functional Encryption Correlated Garbling
2019/3/22
We construct private-key and public-key functional encryption schemes secure against adversaries that corrupt an a-priori bounded number of users and obtain their functional keys, from minimal assumpt...
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions
functional encryption inner product tight security
2019/2/27
Tightly secure cryptographic schemes have been extensively studied in the fields of chosen-ciphertext secure public-key encryption (CCA-secure PKE), identity-based encryption (IBE), signature and more...
Decentralizing Inner-Product Functional Encryption
Decentralized multi-client functional encryption inner products
2019/1/9
Multi-client functional encryption (MCFE) is a more flexible variant of functional encryption whose functional decryption involves multiple ciphertexts from different parties. Each party holds a diffe...
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
Functional encryption Adaptive security Succinctness
2018/11/6
Functional encryption (FE) is advanced encryption that enables us to issue functional decryption keys where functions are hardwired. When we decrypt a ciphertext of a message mm by a functional decryp...
Multi-Client Functional Encryption with Repetition for Inner Product
Functional Encryption Inner Product Multi-Client
2018/11/2
Recently, Chotard et al. proposed a variant of functional encryption for Inner Product, where several parties can independently encrypt inputs, for a specific time-period or label, such that functiona...
Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo $p$
Inner Product Functional Encryption Adaptive Security Diffie-Hellman Assumptions
2018/9/6
Functional encryption is a modern public-key cryptographic primitive allowing an encryptor to finely control the information revealed to recipients from a given ciphertext. Abdalla, Bourse, De Caro, a...
Succinct Garbling Schemes from Functional Encryption through a Local Simulation Paradigm
garbling schemes succinct randomized encodings adaptive security
2018/8/21
We study a simulation paradigm, referred to as local simulation, in garbling schemes. This paradigm captures simulation proof strategies in which the simulator consists of many local simulators that g...
Unbounded Inner Product Functional Encryption from Bilinear Maps
functional encryption inner product function hiding
2018/7/20
Inner product functional encryption (IPFE), introduced by Abdalla et al. (PKC2015), is a kind of functional encryption supporting only inner product functionality. All previous IPFE schemes are bounde...
Polynomial Functional Encryption Scheme with Linear Ciphertext Size
Functional Encryption Hybrid Scheme
2018/6/13
Our main idea is to generically combine two abstract encryption schemes that satisfies some special properties. We also gives an instantiation of our scheme by combining ElGamal scheme and Ring-LWE ba...
Unbounded Inner Product Functional Encryption, with Succinct Keys
Unbounded Vectors Functional Encryption Inner Product
2018/5/28
In 2015, Abdalla et al. introduced Inner Product Functional Encryption, where both ciphertexts and decryption keys are vectors of fixed size nn, and keys enable the computation of an inner product bet...
Upgrading to Functional Encryption
Functional encryption CCA secure encryption Obfuscation
2018/3/23
The notion of Functional Encryption (FE) has recently emerged as a strong primitive with several exciting applications. In this work, we initiate the study of the following question: Can existing publ...
Making Public Key Functional Encryption Function Private, Distributively
public-key cryptography functional encryption
2018/3/8
We then consider the problem of hosting services in the untrusted cloud. Boneh, Gupta, Mironov, and Sahai (Eurocrypt 2014) first studied such application and gave a construction based on indistinguish...