메뉴 건너뛰기




Volumn 7778 LNCS, Issue , 2013, Pages 143-161

On the semantic security of functional encryption schemes

Author keywords

Adaptive token extraction; Functional encryption; Inner product encryption; Semantic security; SIS problem

Indexed keywords

ASYMMETRIC ENCRYPTION; ATTACK SCENARIOS; COMPOSITIONALITY; CRYPTOGRAPHIC PRIMITIVES; E-PRINTS; FUNCTIONAL ENCRYPTIONS; IMPOSSIBILITY RESULTS; INNER PRODUCT; SECURITY DEFINITIONS; SEMANTIC SECURITY; SIS PROBLEM;

EID: 84873954709     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-36362-7_10     Document Type: Conference Paper
Times cited : (24)

References (15)
  • 2
    • 84873951093 scopus 로고    scopus 로고
    • On the semantic security of functional encryption schemes
    • ePrint Archive, Report 2012/474 Full version of this paper
    • Barbosa, M., Farshim, P.: On the semantic security of functional encryption schemes. Cryptology ePrint Archive, Report 2012/474 (2012) Full version of this paper
    • (2012) Cryptology
    • Barbosa, M.1    Farshim, P.2
  • 3
    • 84957629783 scopus 로고    scopus 로고
    • Relations among Notions of Security for Public-Key Encryption Schemes
    • Advances in Cryptology - CRYPTO '98
    • Bellare,M., Desai, A., Pointcheval, D., Rogaway, P.: Relations among Notions of Security for Public-Key Encryption Schemes. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 26-45. Springer, Heidelberg (1998) (Pubitemid 128118995)
    • (1998) LECTURE NOTES in COMPUTER SCIENCE , Issue.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 4
    • 84873974883 scopus 로고    scopus 로고
    • Semantically-secure functional encryption: Possibility results, impossibility results and the quest for a general definition
    • ePrint Archive, Report 2012/515
    • Bellare, M., O'Neill, A.: Semantically-secure functional encryption: possibility results, impossibility results and the quest for a general definition. Cryptology ePrint Archive, Report 2012/515 (2012)
    • (2012) Cryptology
    • Bellare, M.1    O'Neill, A.2
  • 5
    • 79953230454 scopus 로고    scopus 로고
    • Functional Encryption: Definitions and Challenges
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Boneh, D., Sahai, A., Waters, B.: Functional Encryption: Definitions and Challenges. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 253-273. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 253-273
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 6
    • 51849137205 scopus 로고    scopus 로고
    • Trapdoors for hard lattices and new cryptographic constructions
    • Dwork, C. (ed.) ACM
    • Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: Dwork, C. (ed.) STOC 2008, pp. 197-206. ACM (2008)
    • (2008) STOC 2008 , pp. 197-206
    • Gentry, C.1    Peikert, C.2    Vaikuntanathan, V.3
  • 7
    • 33645593031 scopus 로고    scopus 로고
    • The Foundations of Cryptography
    • Cambridge University Press
    • Goldreich, O.: The Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 9
    • 84865477351 scopus 로고    scopus 로고
    • Functional Encryption with Bounded Collusions via Multi-party Computation
    • Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
    • Gorbunov, S., Vaikuntanathan, V., Wee, H.: Functional Encryption with Bounded Collusions via Multi-party Computation. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 162-179. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7417 , pp. 162-179
    • Gorbunov, S.1    Vaikuntanathan, V.2    Wee, H.3
  • 11
    • 84859986507 scopus 로고    scopus 로고
    • Lattice Signatures without Trapdoors
    • Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. Springer, Heidelberg
    • Lyubashevsky, V.: Lattice Signatures without Trapdoors. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol. 7237, pp. 738-755. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7237 , pp. 738-755
    • Lyubashevsky, V.1
  • 12
    • 38749097694 scopus 로고    scopus 로고
    • Worst-case to average-case reductions based on gaussian measures
    • Micciancio, D., Regev, O.: Worst-case to average-case reductions based on gaussian measures. SIAM Journal on Computing 37(1), 267-302 (2007)
    • (2007) SIAM Journal on Computing , vol.37 , Issue.1 , pp. 267-302
    • Micciancio, D.1    Regev, O.2
  • 13
    • 84937420653 scopus 로고    scopus 로고
    • Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case
    • Yung, M. (ed.) CRYPTO 2002. Springer, Heidelberg
    • Nielsen, J.B.: Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 111-126. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 111-126
    • Nielsen, J.B.1
  • 14
    • 79953210180 scopus 로고    scopus 로고
    • Definitional issues in functional encryption
    • ePrint Archive, Report 2010/556
    • O'Neill, A.: Definitional issues in functional encryption. Cryptology ePrint Archive, Report 2010/556 (2010)
    • (2010) Cryptology
    • O'Neill, A.1
  • 15
    • 84865452842 scopus 로고    scopus 로고
    • Functional Encryption for Regular Languages
    • Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
    • Waters, B.: Functional Encryption for Regular Languages. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 218-235. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7417 , pp. 218-235
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.