| Open Document File Size: 302,61 KBShare Result on Facebook
City Palo Alto / / Company Google / A. Sahai S. P. / Verizon / ABE / Microsoft / the AES / / Country United States / / Currency USD / / Facility Microsoft Research ABSTRACT University / Building Blocks We / / IndustryTerm inner-products / setup algorithm / generation algorithm / polynomial time algorithms / sieve algorithm / inner products / deterministic single exponential time algorithm / party secure protocols / p.p.t. algorithms / decryption algorithm / party computing / main software-based technique / circuit applications / lattice algorithms / garbled circuit evaluation algorithm / polynomial-time algorithms / untrustworthy systems / Non-interactive verifiable computing / spam detection algorithm / multi-party secure protocols / leaky hardware / public-key algorithm / encryption systems / impossible using software / online phase / circuit generation algorithm / encryption algorithm / / Organization National Science Foundation / MIT / U.S. Securities and Exchange Commission / University of Toronto / / Person R. A. Popa / V / S. Gorbunov / V / Yael Kalaiā Raluca Ada / Ada Popa / Shafi Goldwasser / M. Bellare / V / / Position MP / token-based model for obfuscation / IND-CPA / evaluator / / ProvinceOrState California / / PublishedMedium Cryptology ePrint Archive / / RadioStation Katz / / Technology public-key algorithm / p.p.t. algorithms / Predicate encryption / two party secure protocols / circuit generation algorithm / lattice algorithms / fixed algorithm / 2.3 Functional Encryption / encryption algorithm / encoding algorithm / polynomial-time algorithms / garbled circuit evaluation algorithm / four p.p.t. algorithms / secure functional encryption / setup algorithm / private-index functional encryption / exponential time algorithm / private key / secret key / Succinct Functional Encryption / spam detection algorithm / inner product encryption / pdf / attribute-based encryption / encryption / multi-party secure protocols / cryptography / Worry-free encryption / key generation algorithm / public key / 2.2 Attribute-Based Encryption / sieve algorithm / FE encryption / polynomial time algorithms / simulation / decryption algorithm / Hierarchical predicate encryption / Fuzzy identity-based encryption / FHE encryption / FHE decryption algorithm / be decrypted only using the secret key / / URL http /
SocialTag |