Multi-input Functional Encryption and Its Application in Outsourcing Computation
From MaRDI portal
Publication:2801771
DOI10.1007/978-3-319-29814-6_18zbMath1384.94081OpenAlexW2472411143MaRDI QIDQ2801771
Haixia Xu, Yuan-yuan Ji, Peili Li
Publication date: 21 April 2016
Published in: Information and Communications Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-29814-6_18
Cites Work
- Functional Encryption Without Obfuscation
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Non-Interactive Secure Multiparty Computation
- How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
- Functional Encryption with Bounded Collusions via Multi-party Computation
- Functional Encryption: Definitions and Challenges
- Functional Encryption for Inner Product Predicates from Learning with Errors
- A Punctured Programming Approach to Adaptively Secure Functional Encryption
- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
- Conjunctive, Subset, and Range Queries on Encrypted Data
- Predicate Privacy in Encryption Systems
- Multi-Client Non-interactive Verifiable Computation
- On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
- Multi-input Functional Encryption
- Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products
- Reusable garbled circuits and succinct functional encryption
This page was built for publication: Multi-input Functional Encryption and Its Application in Outsourcing Computation