Functional encryption

Results: 50



#Item
1Iron: Functional encryption using Intel SGX Sergey Gorbunov University of Waterloo Joint work with Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh.

Iron: Functional encryption using Intel SGX Sergey Gorbunov University of Waterloo Joint work with Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh.

Add to Reading List

Source URL: crypto-events.di.ens.fr

Language: English - Date: 2017-07-12 10:12:05
    2Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation Dan Boneh1 , Kevin Lewi1 , Mariana Raykova2 , Amit Sahai3 , Mark Zhandry1 , and Joe Zimmerman1 1  Stanford University

    Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation Dan Boneh1 , Kevin Lewi1 , Mariana Raykova2 , Amit Sahai3 , Mark Zhandry1 , and Joe Zimmerman1 1 Stanford University

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2015-05-25 22:53:51
      3Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

      Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2015-07-29 01:21:17
        4Hierarchical Functional Encryption Zvika Brakerski∗ Gil Segev†  Abstract

        Hierarchical Functional Encryption Zvika Brakerski∗ Gil Segev† Abstract

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-09-15 01:20:37
          5Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski∗ Gil Segev†

          Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski∗ Gil Segev†

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2014-10-22 01:56:45
            6From Selective to Adaptive Security in Functional Encryption Prabhanjan Ananth∗ UCLA  Zvika Brakerski†

            From Selective to Adaptive Security in Functional Encryption Prabhanjan Ananth∗ UCLA Zvika Brakerski†

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2015-02-16 17:56:27
              7Functional Encryption: Decentralized and Delegatable Nishanth Chandran∗ Vipul Goyal†

              Functional Encryption: Decentralized and Delegatable Nishanth Chandran∗ Vipul Goyal†

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2015-11-03 09:54:12
                8Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions Zvika Brakerski∗ Ilan Komargodski†

                Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions Zvika Brakerski∗ Ilan Komargodski†

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2016-02-04 03:37:02
                  9Functional Encryption for Turing Machines Amit Sahai† Department of Computer Science and Center for Encrypted Functionalities, UCLA, USA

                  Functional Encryption for Turing Machines Amit Sahai† Department of Computer Science and Center for Encrypted Functionalities, UCLA, USA

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2015-10-28 16:00:01