Predicate Encryption for Circuits from LWE

From MaRDI portal
Publication:3457082

DOI10.1007/978-3-662-48000-7_25zbMath1369.94538OpenAlexW2296067100MaRDI QIDQ3457082

Hoeteck Wee, Sergey Gorbunov, Vinod Vaikuntanathan

Publication date: 10 December 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: http://hdl.handle.net/1721.1/112960




Related Items (65)

Adaptive Simulation Security for Inner Product Functional EncryptionA New Paradigm for Public-Key Functional Encryption for Degree-2 PolynomialsConstraining and Watermarking PRFs from Milder AssumptionsDeniable Attribute Based Encryption for Branching Programs from LWEFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionSingle-Key to Multi-Key Functional Encryption with Polynomial LossMemory lower bounds of reductions revisitedFaster Gaussian sampling for trapdoor lattices with arbitrary modulusToward non-interactive zero-knowledge proofs for NP from LWEAttribute-based proxy re-encryption from standard latticesTowards a Simpler Lattice Gadget ToolkitFrom cryptomania to obfustopia through secret-key functional encryptionMatrix PRFs: constructions, attacks, and applications to obfuscationPredicate encryption from bilinear maps and one-sided probabilistic rankAttribute based encryption for deterministic finite automata from DLINAdaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear GroupsFunctional commitments for all functions, with transparent setup and from SISOn the optimal succinctness and efficiency of functional encryption and attribute-based encryptionMulti-key and multi-input predicate encryption from learning with errorsZero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group EncryptionSignature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice AssumptionsTowards Tightly Secure Lattice Short Signature and Id-Based EncryptionVerifiable Functional EncryptionPrivately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness(Compact) adaptively secure FE for attribute-weighted sums from \(k\)-linLattice-based SNARKs: publicly verifiable, preprocessing, and recursively composable (extended abstract)Fully collusion resistant trace-and-revoke functional encryption for arbitrary identitiesCumulatively all-lossy-but-one trapdoor functions from standard assumptionsMulti-input attribute based encryption and predicate encryptionHow to build a trapdoor function from an encryption schemeConstrained (Verifiable) Pseudorandom Function from Functional EncryptionA survey on functional encryptionMore efficient verifiable functional encryptionStreaming functional encryptionAttribute-based multi-input FE (and more) for attribute-weighted sumsCompact lattice gadget and its applications to hash-and-sign signaturesAccess control encryption with efficient verifiable sanitized decryptionInner-product functional encryption with fine-grained access controlMulti-party functional encryptionDirect computation of branching programs and its applications to more efficient lattice-based cryptographyAdaptively simulation-secure attribute-hiding predicate encryptionImproved inner-product encryption with adaptive security and full attribute-hidingZero-knowledge arguments for matrix-vector relations and lattice-based group encryptionCollusion Resistant Traitor Tracing from Learning with ErrorsMinimizing locality of one-way functions via semi-private randomized encodingsPrivate Puncturable PRFs from Standard Lattice AssumptionsCryptography with UpdatesUnnamed ItemWatermarking cryptographic functionalities from standard lattice assumptionsConstrained pseudorandom functions from functional encryptionMatch me if you can: matchmaking encryption and its applicationsTag-based ABE in prime-order groups via pair encodingRevocable attribute-based proxy re-encryptionNew lattice two-stage sampling technique and its applications to functional encryption -- stronger security and smaller ciphertextsIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationNon-interactive anonymous routerChosen ciphertext attacks secure inner-product functional encryption from learning with errors assumptionTuring Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded FunctionsFully Secure Functional Encryption for Inner Products, from Standard AssumptionsCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive SecurityA new Gaussian sampling for trapdoor lattices with arbitrary modulusFunctional encryption for attribute-weighted sums from \(k\)-LinAmplifying the security of functional encryption, unconditionallyCovert authentication from latticesHomomorphic Encryption



Cites Work


This page was built for publication: Predicate Encryption for Circuits from LWE