Functional encryption

Results: 50



#Item
11Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps Prabhanjan Ananth∗

Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps Prabhanjan Ananth∗

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-11-22 03:25:27
    12Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption Dan Boneh∗ Ananth Raghunathan†

    Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption Dan Boneh∗ Ananth Raghunathan†

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2014-09-15 06:13:04
      13Indistinguishability Obfuscation from Compact Functional Encryption Prabhanjan Ananth∗ Abhishek Jain†

      Indistinguishability Obfuscation from Compact Functional Encryption Prabhanjan Ananth∗ Abhishek Jain†

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2015-09-02 18:52:48
        14Indistinguishability Obfuscation from Functional Encryption for Simple Functions Prabhanjan Ananth∗ Abhishek Jain†

        Indistinguishability Obfuscation from Functional Encryption for Simple Functions Prabhanjan Ananth∗ Abhishek Jain†

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2015-10-28 14:46:18
          15Interpolating Predicate and Functional Encryption from Learning With Errors Shweta Agrawal ∗

          Interpolating Predicate and Functional Encryption from Learning With Errors Shweta Agrawal ∗

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-09-22 05:13:43
            16Compactness vs Collusion Resistance in Functional Encryption∗ Baiyu Li† Daniele Micciancio‡  Abstract

            Compactness vs Collusion Resistance in Functional Encryption∗ Baiyu Li† Daniele Micciancio‡ Abstract

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-06-02 20:14:22
              17Collaborative Protection Profile for USB Portable Storage Device.  USB iTC: Functional Requirements 1. Security Requirements The individual functional security requirements for a USB Portable Storage Device are

              Collaborative Protection Profile for USB Portable Storage Device. USB iTC: Functional Requirements 1. Security Requirements The individual functional security requirements for a USB Portable Storage Device are

              Add to Reading List

              Source URL: www.commoncriteriaportal.org

              Language: English - Date: 2015-03-09 11:24:03
              18Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits Sanjam Garg UCLA  Mariana Raykova

              Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits Sanjam Garg UCLA Mariana Raykova

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2013-07-21 10:06:46
                19Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1  University of Illinois at Urbana-Champaign

                Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1 University of Illinois at Urbana-Champaign

                Add to Reading List

                Source URL: web.engr.illinois.edu

                Language: English - Date: 2014-08-27 22:14:05