Back to Results
First PageMeta Content
ID-based encryption / Ciphertext indistinguishability / RSA / Semantic security / Cipher / Advanced Encryption Standard / Cryptography / Homomorphic encryption / Verifiable computing


Open Document

File Size: 302,61 KB

Share Result on Facebook

City

Palo Alto / /

Company

Google / A. Sahai S. P. / Verizon / ABE / Microsoft / the AES / /

Country

United States / /

Currency

USD / /

Facility

Microsoft Research ABSTRACT University / Building Blocks We / /

IndustryTerm

inner-products / setup algorithm / generation algorithm / polynomial time algorithms / sieve algorithm / inner products / deterministic single exponential time algorithm / party secure protocols / p.p.t. algorithms / decryption algorithm / party computing / main software-based technique / circuit applications / lattice algorithms / garbled circuit evaluation algorithm / polynomial-time algorithms / untrustworthy systems / Non-interactive verifiable computing / spam detection algorithm / multi-party secure protocols / leaky hardware / public-key algorithm / encryption systems / impossible using software / online phase / circuit generation algorithm / encryption algorithm / /

Organization

National Science Foundation / MIT / U.S. Securities and Exchange Commission / University of Toronto / /

Person

R. A. Popa / V / S. Gorbunov / V / Yael Kalaiā€  Raluca Ada / Ada Popa / Shafi Goldwasser / M. Bellare / V / /

Position

MP / token-based model for obfuscation / IND-CPA / evaluator / /

ProvinceOrState

California / /

PublishedMedium

Cryptology ePrint Archive / /

RadioStation

Katz / /

Technology

public-key algorithm / p.p.t. algorithms / Predicate encryption / two party secure protocols / circuit generation algorithm / lattice algorithms / fixed algorithm / 2.3 Functional Encryption / encryption algorithm / encoding algorithm / polynomial-time algorithms / garbled circuit evaluation algorithm / four p.p.t. algorithms / secure functional encryption / setup algorithm / private-index functional encryption / exponential time algorithm / private key / secret key / Succinct Functional Encryption / spam detection algorithm / inner product encryption / pdf / attribute-based encryption / encryption / multi-party secure protocols / cryptography / Worry-free encryption / key generation algorithm / public key / 2.2 Attribute-Based Encryption / sieve algorithm / FE encryption / polynomial time algorithms / simulation / decryption algorithm / Hierarchical predicate encryption / Fuzzy identity-based encryption / FHE encryption / FHE decryption algorithm / be decrypted only using the secret key / /

URL

http /

SocialTag