Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience
From MaRDI portal
Publication:2152060
DOI10.1007/978-3-030-65277-7_30zbMath1492.94175OpenAlexW3107233151MaRDI QIDQ2152060
Siu-Ming Yiu, Xiangning Wang, Linru Zhang, Yuechen Chen
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-65277-7_30
hash proof systembounded-retrieval modelidentity-based access controlinner-product functional encryption
Cites Work
- Unnamed Item
- Unnamed Item
- Practical functional encryption for quadratic functions with applications to predicate encryption
- Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
- Randomness is linear in space
- Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio
- Unbounded inner-product functional encryption with succinct keys
- From quadratic functions to polynomials: generic functional encryption from standard assumptions
- Functional Encryption for Turing Machines
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Cryptanalysis of GGH15 Multilinear Maps
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions
- Identity-Based Encryption Resilient to Continual Auxiliary Leakage
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Cryptanalysis of the Multilinear Map over the Integers
- Achieving Leakage Resilience through Dual System Encryption
- Functional Encryption: Definitions and Challenges
- Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Leakage-Resilient Signatures
- Public-Key Encryption Schemes with Auxiliary Inputs
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Delegating Capabilities in Predicate Encryption Systems
- Public-Key Encryption in the Bounded-Retrieval Model
- Practical Identity-Based Encryption Without Random Oracles
- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- A Leakage-Resilient Mode of Operation
- Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13
- On cryptography with auxiliary input
- Cryptanalyses of Candidate Branching Program Obfuscators
- Efficient Identity-Based Encryption Without Random Oracles
- Fuzzy Identity-Based Encryption
- Reusable garbled circuits and succinct functional encryption
- Multi-input Inner-Product Functional Encryption from Pairings
- Side channel cryptanalysis of product ciphers
- Public-Key Cryptosystems Resilient to Key Leakage
- Theory of Cryptography
- Theory of Cryptography
- Theory of Cryptography
This page was built for publication: Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience