Functional encryption

Results: 50



#Item
11

Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps Prabhanjan Ananth∗

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-11-22 03:25:27
    12

    Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption Dan Boneh∗ Ananth Raghunathan†

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2014-09-15 06:13:04
      13

      Indistinguishability Obfuscation from Compact Functional Encryption Prabhanjan Ananth∗ Abhishek Jain†

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2015-09-02 18:52:48
        14

        Indistinguishability Obfuscation from Functional Encryption for Simple Functions Prabhanjan Ananth∗ Abhishek Jain†

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2015-10-28 14:46:18
          15

          Interpolating Predicate and Functional Encryption from Learning With Errors Shweta Agrawal ∗

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-09-22 05:13:43
            16

            Compactness vs Collusion Resistance in Functional Encryption∗ Baiyu Li† Daniele Micciancio‡ Abstract

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2016-06-02 20:14:22
              17Cryptography / Key management / Zeroisation / Encryption / Password / USB / Key / Disk encryption

              Collaborative Protection Profile for USB Portable Storage Device. USB iTC: Functional Requirements 1. Security Requirements The individual functional security requirements for a USB Portable Storage Device are

              Add to Reading List

              Source URL: www.commoncriteriaportal.org

              Language: English - Date: 2015-03-09 11:24:03
              18

              Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits Sanjam Garg UCLA Mariana Raykova

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2013-07-21 10:06:46
                19Cryptography / Public-key cryptography / Cryptographic protocols / Ciphertext indistinguishability / Homomorphic encryption / Adaptive chosen-ciphertext attack / Optimal asymmetric encryption padding / RSA / Secure multi-party computation / Chosen-ciphertext attack / Malleability / ID-based encryption

                Controlled Functional Encryption Muhammad Naveed1 , Shashank Agrawal1 , Manoj Prabhakaran1 , Xiaofeng Wang2 , Erman Ayday3 , Jean-Pierre Hubaux3 and Carl A. Gunter1 1 University of Illinois at Urbana-Champaign

                Add to Reading List

                Source URL: web.engr.illinois.edu

                Language: English - Date: 2014-08-27 22:14:05
                UPDATE