메뉴 건너뛰기




Volumn 8043 LNCS, Issue PART 2, 2013, Pages 500-518

Functional encryption: New perspectives and lower bounds

Author keywords

[No Author keywords available]

Indexed keywords

FINE-GRAINED CONTROL; FUNCTIONAL ENCRYPTIONS; IMPOSSIBILITY RESULTS; INDISTINGUISHABILITY; MULTIPARTY COMPUTATION; PSEUDO-RANDOM FUNCTIONS; PUBLIC-KEY ENCRYPTION; SIMULATION-BASED SECURITY;

EID: 84884471094     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-40084-1_28     Document Type: Conference Paper
Times cited : (105)

References (41)
  • 1
    • 84861657923 scopus 로고    scopus 로고
    • Functional encryption for threshold functions (or fuzzy IBE) from lattices
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. Springer, Heidelberg
    • Agrawal, S., Boyen, X., Vaikuntanathan, V., Voulgaris, P., Wee, H.: Functional encryption for threshold functions (or fuzzy IBE) from lattices. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 280-297. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7293 , pp. 280-297
    • Agrawal, S.1    Boyen, X.2    Vaikuntanathan, V.3    Voulgaris, P.4    Wee, H.5
  • 2
    • 83055162353 scopus 로고    scopus 로고
    • Functional encryption for inner product predicates from learning with errors
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
    • Agrawal, S., Freeman, D.M., Vaikuntanathan, V.: Functional encryption for inner product predicates from learning with errors. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 21-40. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7073 , pp. 21-40
    • Agrawal, S.1    Freeman, D.M.2    Vaikuntanathan, V.3
  • 3
    • 80053054006 scopus 로고    scopus 로고
    • Efficient selective identity-based encryption without random oracles
    • Boneh, D., Boyen, X.: Efficient selective identity-based encryption without random oracles. J. Cryptology 24(4), 659-693 (2011)
    • (2011) J. Cryptology , vol.24 , Issue.4 , pp. 659-693
    • Boneh, D.1    Boyen, X.2
  • 4
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 5
    • 84873954709 scopus 로고    scopus 로고
    • On the semantic security of functional encryption schemes
    • Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. Springer, Heidelberg
    • Barbosa, M., Farshim, P.: On the semantic security of functional encryption schemes. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 143-161. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.7778 , pp. 143-161
    • Barbosa, M.1    Farshim, P.2
  • 7
    • 38049061524 scopus 로고    scopus 로고
    • On the Necessity of Rewinding in Secure Multiparty Computation
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Backes, M., Müller-Quade, J., Unruh, D.: On the Necessity of Rewinding in Secure Multiparty Computation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 157-173. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 157-173
    • Backes, M.1    Müller-Quade, J.2    Unruh, D.3
  • 8
    • 0025137207 scopus 로고
    • The round complexity of secure protocols
    • extended abstract
    • Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols (extended abstract). In: STOC, pp. 503-513 (1990)
    • (1990) STOC , pp. 503-513
    • Beaver, D.1    Micali, S.2    Rogaway, P.3
  • 9
    • 84873974883 scopus 로고    scopus 로고
    • Semantically-secure functional encryption: Possibility results, impossibility results and the quest for a general definition
    • Report 2012/515
    • Bellare, M., O'Neill, A.: Semantically-secure functional encryption: Possibility results, impossibility results and the quest for a general definition. Cryptology ePrint Archive, Report 2012/515 (2012)
    • (2012) Cryptology ePrint Archive
    • Bellare, M.1    O'Neill, A.2
  • 10
    • 33748619223 scopus 로고    scopus 로고
    • How to play almost any mental game over the net - Concurrent composition via super-polynomial simulation
    • Barak, B., Sahai, A.: How to play almost any mental game over the net - concurrent composition via super-polynomial simulation. In: FOCS, pp. 543-552 (2005)
    • (2005) FOCS , pp. 543-552
    • Barak, B.1    Sahai, A.2
  • 11
    • 79953230454 scopus 로고    scopus 로고
    • Functional encryption: Definitions and challenges
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Boneh, D., Sahai, A., Waters, B.: Functional encryption: Definitions and challenges. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 253-273. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 253-273
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 13
    • 35248897599 scopus 로고    scopus 로고
    • A forward-secure public-key encryption scheme
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 255-271. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 255-271
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 14
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • Cocks, C.: An identity based encryption scheme based on quadratic residues. IMA Int. Conf., 360-363 (2001)
    • (2001) IMA Int. Conf. , pp. 360-363
    • Cocks, C.1
  • 15
    • 84947254092 scopus 로고    scopus 로고
    • Key-insulated public key cryptosystems
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65-82. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 65-82
    • Dodis, Y.1    Katz, J.2    Xu, S.3    Yung, M.4
  • 16
    • 0024984004 scopus 로고
    • Witness indistinguishable and witness hiding protocols
    • Feige, U., Shamir, A.: Witness indistinguishable and witness hiding protocols. In: STOC, pp. 416-426 (1990)
    • (1990) STOC , pp. 416-426
    • Feige, U.1    Shamir, A.2
  • 17
    • 84884481521 scopus 로고    scopus 로고
    • Attribute-based encryption for circuits from multilinear maps
    • Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. Springer, Heidelberg
    • Garg, S., Gentry, C., Halevi, S., Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part II. LNCS, vol. 8043, pp. 479-499. Springer, Heidelberg (2013)
    • (2013) LNCS , vol.8043 , pp. 479-499
    • Garg, S.1    Gentry, C.2    Halevi, S.3    Sahai, A.4    Waters, B.5
  • 18
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792-807 (1986)
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 19
    • 33748600953 scopus 로고    scopus 로고
    • On the impossibility of obfuscation with auxiliary input
    • Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS, pp. 553-562 (2005)
    • (2005) FOCS , pp. 553-562
    • Goldwasser, S.1    Kalai, Y.T.2
  • 20
    • 84883367708 scopus 로고    scopus 로고
    • Succinct functional encryption and its power: Reusable garbled circuits and beyond
    • to appear
    • Goldwasser, S., Kalai, Y.T., Popa, R.A., Vaikuntanathan, V., Zeldovich, N.: Succinct functional encryption and its power: Reusable garbled circuits and beyond. In: STOC (to appear, 2013)
    • (2013) STOC
    • Goldwasser, S.1    Kalai, Y.T.2    Popa, R.A.3    Vaikuntanathan, V.4    Zeldovich, N.5
  • 21
    • 84858314370 scopus 로고    scopus 로고
    • Bounded-collusion IBE from key homomorphism
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Goldwasser, S., Lewko, A., Wilson, D.A.: Bounded-collusion IBE from key homomorphism. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 564-581. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 564-581
    • Goldwasser, S.1    Lewko, A.2    Wilson, D.A.3
  • 22
    • 85050160774 scopus 로고
    • Probabilistic encryption and how to play mental poker keeping secret all partial information
    • Goldwasser, S., Micali, S.: Probabilistic encryption and how to play mental poker keeping secret all partial information. In: STOC, pp. 365-377 (1982)
    • (1982) STOC , pp. 365-377
    • Goldwasser, S.1    Micali, S.2
  • 24
    • 84865477351 scopus 로고    scopus 로고
    • Functional encryption with bounded collusions via multi-party computation
    • Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
    • Gorbunov, S., Vaikuntanathan, V., Wee, H.: Functional encryption with bounded collusions via multi-party computation. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 162-179. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7417 , pp. 162-179
    • Gorbunov, S.1    Vaikuntanathan, V.2    Wee, H.3
  • 26
    • 0345253860 scopus 로고    scopus 로고
    • A pseudorandom generator from any one-way function
    • Håstad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM J. Comput. 28(4), 1364-1396 (1999)
    • (1999) SIAM J. Comput. , vol.28 , Issue.4 , pp. 1364-1396
    • Håstad, J.1    Impagliazzo, R.2    Levin, L.A.3    Luby, M.4
  • 28
    • 84884484659 scopus 로고    scopus 로고
    • Lower bounds and impossibility results for concurrent self composition
    • Lindell, Y.: Lower bounds and impossibility results for concurrent self composition. The Journal of Cryptology (2004)
    • (2004) The Journal of Cryptology
    • Lindell, Y.1
  • 29
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption
    • Gilbert, H. (ed.) EUROCRYPT 2010. Springer, Heidelberg
    • Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B.: Fully secure functional encryption: Attribute-based encryption and (Hierarchical) inner product encryption. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 62-91. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 30
    • 38749151314 scopus 로고    scopus 로고
    • Input-indistinguishable computation
    • Micali, S., Pass, R., Rosen, A.: Input-indistinguishable computation. In: FOCS, pp. 367-378 (2006)
    • (2006) FOCS , pp. 367-378
    • Micali, S.1    Pass, R.2    Rosen, A.3
  • 31
    • 79953210180 scopus 로고    scopus 로고
    • Definitional issues in functional encryption
    • Report 2010/556
    • O'Neill, A.: Definitional issues in functional encryption. Cryptology ePrint Archive, Report 2010/556 (2010), http://eprint.iacr.org/
    • (2010) Cryptology ePrint Archive
    • O'Neill, A.1
  • 32
    • 35248833045 scopus 로고    scopus 로고
    • Simulation in quasi-polynomial time and its application to protocol composition
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Pass, R.: Simulation in quasi-polynomial time and its application to protocol composition. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 160-176. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 160-176
    • Pass, R.1
  • 33
    • 0036957024 scopus 로고    scopus 로고
    • Concurrent zero knowledge with logarithmic round-complexity
    • Prabhakaran, M., Rosen, A., Sahai, A.: Concurrent zero knowledge with logarithmic round-complexity. In: 43rd FOCS, pp. 366-375 (2002)
    • (2002) 43rd FOCS , pp. 366-375
    • Prabhakaran, M.1    Rosen, A.2    Sahai, A.3
  • 34
    • 84858307151 scopus 로고    scopus 로고
    • How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
    • Cramer, R. (ed.) TCC 2012. Springer, Heidelberg
    • Parno, B., Raykova, M., Vaikuntanathan, V.: How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption. In: Cramer, R. (ed.) TCC 2012. LNCS, vol. 7194, pp. 422-439. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7194 , pp. 422-439
    • Parno, B.1    Raykova, M.2    Vaikuntanathan, V.3
  • 35
    • 4544347480 scopus 로고    scopus 로고
    • New notions of security: Achieving universal composability without trusted setup
    • Prabhakaran, M., Sahai, A.: New notions of security: achieving universal composability without trusted setup. In: STOC, pp. 242-251 (2004)
    • (2004) STOC , pp. 242-251
    • Prabhakaran, M.1    Sahai, A.2
  • 36
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
    • Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
    • (1985) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 38
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Sahai, A.,Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 39
  • 40
    • 84873978451 scopus 로고    scopus 로고
    • Attribute-based encryption for circuits from multilinear maps
    • Report 2012/592
    • Sahai, A., Waters, B.: Attribute-based encryption for circuits from multilinear maps. Cryptology ePrint Archive, Report 2012/592 (2012)
    • (2012) Cryptology ePrint Archive
    • Sahai, A.1    Waters, B.2
  • 41
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • extended abstract
    • Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167 (1986)
    • (1986) FOCS , pp. 162-167
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.