Dynamic collusion bounded functional encryption from identity-based encryption
From MaRDI portal
Publication:2170069
DOI10.1007/978-3-031-07085-3_25zbMath1496.94045OpenAlexW3184486001MaRDI QIDQ2170069
Brent Waters, Rishab Goyal, Rachit Garg, George Jingfeng Lu
Publication date: 30 August 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-07085-3_25
Related Items (2)
Bounded functional encryption for Turing machines: adaptive security from general assumptions ⋮ Functional encryption with secure key leasing
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Traitor-tracing from LWE made simple and attribute-based
- Hardness of non-interactive differential privacy from one-way functions
- Stronger security for reusable garbled circuits, general definitions and attacks
- Functional encryption for bounded collusions, revisited
- Bonsai trees, or how to delegate a lattice basis
- Functional encryption for Turing machines with dynamic bounded collusion from LWE
- Optimal bounded-collusion secure functional encryption
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Bounded-Collusion IBE from Key Homomorphism
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Identity-Based Cryptosystems and Signature Schemes
- Functional Encryption: Definitions and Challenges
- Semi-adaptive Security and Bundling Functionalities Made Generic and Easy
- Indistinguishability Obfuscation from Compact Functional Encryption
- Bounded CCA2-Secure Encryption
- Trapdoors for hard lattices and new cryptographic constructions
- Efficient Lattice (H)IBE in the Standard Model
- Conjunctive, Subset, and Range Queries on Encrypted Data
- New directions in cryptography
- An Identity Based Encryption Scheme Based on Quadratic Residues
- Indistinguishability Obfuscation from Functional Encryption
- Collusion resistant traitor tracing from learning with errors
- How to use indistinguishability obfuscation
- Fuzzy Identity-Based Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption
- Indistinguishability obfuscation from well-founded assumptions
This page was built for publication: Dynamic collusion bounded functional encryption from identity-based encryption