Pages that link to "Item:Q2829952"
From MaRDI portal
The following pages link to Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952):
Displaying 50 items.
- Post-quantum secure inner product functional encryption using multivariate public key cryptography (Q821514) (← links)
- Adaptively secure distributed PRFs from LWE (Q1631339) (← links)
- Hardness of \(k\)-LWE and applications in traitor tracing (Q1688407) (← links)
- Decentralized multi-client functional encryption for inner product (Q1710623) (← links)
- Practical fully secure unrestricted inner product functional encryption modulo \(p\) (Q1710625) (← links)
- Functional encryption for cubic polynomials and implementation (Q1981766) (← links)
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\) (Q2043324) (← links)
- Simple and efficient FE for quadratic functions (Q2043408) (← links)
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE (Q2055603) (← links)
- Impossibility results for lattice-based functional encryption schemes (Q2055607) (← links)
- Compact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \) (Q2055654) (← links)
- Tightly CCA-secure inner product functional encryption scheme (Q2055966) (← links)
- New lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertexts (Q2056698) (← links)
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification (Q2056782) (← links)
- Non-interactive anonymous router (Q2056804) (← links)
- Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumption (Q2057139) (← links)
- Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings (Q2061939) (← links)
- Functional encryption for set intersection in the multi-client setting (Q2068378) (← links)
- Functional encryption for attribute-weighted sums from \(k\)-Lin (Q2096503) (← links)
- Dynamic decentralized functional encryption (Q2096508) (← links)
- A tighter proof for CCA secure inner product functional encryption: genericity meets efficiency (Q2124234) (← links)
- Attribute-based access control for inner product functional encryption from LWE (Q2146083) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Adaptively secure laconic function evaluation for \(\mathsf{NC}^1\) (Q2152174) (← links)
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions (Q2170046) (← links)
- On the smoothing parameter and last minimum of random orthogonal lattices (Q2182065) (← links)
- Public key encryption with equality test from generic assumptions in the random oracle model (Q2215090) (← links)
- Unbounded inner-product functional encryption with succinct keys (Q2291401) (← links)
- A new approach to practical function-private inner product encryption (Q2317860) (← links)
- Verifiable inner product computation on outsourced database for authenticated multi-user data sharing (Q2666869) (← links)
- Adaptively secure inner product encryption from LWE (Q2691591) (← links)
- Succinct and adaptively secure ABE for ABP from \(k\)-Lin (Q2691593) (← links)
- Inner-product functional encryption with fine-grained access control (Q2691594) (← links)
- Decentralized multi-client functional encryption for set intersection with improved efficiency (Q2692968) (← links)
- Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys (Q2827708) (← links)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952) (← links)
- Achieving IND-CCA Security for Functional Encryption for Inner Products (Q2980849) (← links)
- Efficient Inner Product Encryption with Simulation-Based Security (Q3297490) (← links)
- Adaptive Simulation Security for Inner Product Functional Encryption (Q5041151) (← links)
- A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials (Q5041154) (← links)
- Collusion Resistant Traitor Tracing from Learning with Errors (Q5130846) (← links)
- CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions (Q5738751) (← links)
- Multi-input Inner-Product Functional Encryption from Pairings (Q5738891) (← links)
- Tightly secure inner product functional encryption: multi-input and function-hiding constructions (Q5896157) (← links)
- Unbounded inner product functional encryption from bilinear maps (Q5915907) (← links)
- Unbounded inner product functional encryption from bilinear maps (Q5919081) (← links)
- Bounded-collusion decentralized ABE with sublinear parameters (Q6040630) (← links)
- (Compact) Adaptively Secure FE for Attribute-Weighted Sums from k-Lin (Q6041293) (← links)
- Hierarchical identity-based inner product functional encryption (Q6065871) (← links)
- Fine-grained verifier NIZK and its applications (Q6088993) (← links)