Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Functional Encryption for Turing Machines - MaRDI portal

Functional Encryption for Turing Machines

From MaRDI portal
Publication:2796122

DOI10.1007/978-3-662-49096-9_6zbMath1388.94031OpenAlexW2294870584MaRDI QIDQ2796122

Amit Sahai, Prabhanjan V. Ananth

Publication date: 23 March 2016

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-49096-9_6




Related Items (32)

Limits on the adaptive security of Yao's garblingSuccinct garbling schemes from functional encryption through a local simulation paradigmFE and iO for Turing machines from minimal assumptionsThe MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacksFunctional encryption for Turing machines with dynamic bounded collusion from LWEAttribute-based access control for inner product functional encryption from LWEDelegating RAM Computations with Adaptive Soundness and PrivacySemi-adaptive Security and Bundling Functionalities Made Generic and EasyFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionSingle-Key to Multi-Key Functional Encryption with Polynomial LossAdaptive-secure identity-based inner-product functional encryption and its leakage-resilienceSimpler constructions of asymmetric primitives from obfuscationAdaptive security of practical garbling schemesFrom cryptomania to obfustopia through secret-key functional encryptionAttribute based encryption for deterministic finite automata from DLINBounded Collusion ABE for TMs from IBEOn the optimal succinctness and efficiency of functional encryption and attribute-based encryptionUnbounded quadratic functional encryption and more from pairingsBounded functional encryption for Turing machines: adaptive security from general assumptionsCollusion-resistant functional encryption for RAMsThe pseudorandom oracle model and ideal obfuscationStreaming functional encryptionTracing quantum state distinguishers via backtrackingCollusion resistant trace-and-revoke for arbitrary identities from standard assumptionsStrongly full-hiding inner product encryptionFully secure functional encryption with a large class of relations from the decisional linear assumptionCompact adaptively secure ABE from \(k\)-Lin: beyond \(\mathsf{NC}^1\) and towards \(\mathsf{NL} \)Chosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityConstrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegationPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving SoftwareBreaking the Sub-Exponential Barrier in Obfustopia




Cites Work




This page was built for publication: Functional Encryption for Turing Machines