Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,217,184 papers from all fields of science
Search
Sign In
Create Free Account
Functional encryption
Functional encryption is a generalization of public-key encryption in which possessing a secret key allows one to learn a function of what the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Attribute-based encryption
Ciphertext
ID-based encryption
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs
Huijia Lin
,
Stefano Tessaro
Annual International Cryptology Conference
2017
Corpus ID: 26675847
We consider the question of finding the lowest degree L for which L-linear maps suffice to obtain IO. The current state of the…
Expand
2016
2016
Verifiable Functional Encryption
S. Badrinarayanan
,
Vipul Goyal
,
Aayush Jain
,
A. Sahai
International Conference on the Theory and…
2016
Corpus ID: 16527241
In light of security challenges that have emerged in a world with complex networks and cloud computing, the notion of functional…
Expand
Highly Cited
2015
Highly Cited
2015
Indistinguishability Obfuscation from Compact Functional Encryption
P. Ananth
,
Abhishek Jain
Annual International Cryptology Conference
2015
Corpus ID: 2782076
The arrival of indistinguishability obfuscation (\(i\mathrm {O}\)) has transformed the cryptographic landscape by enabling…
Expand
Highly Cited
2015
Highly Cited
2015
From Selective to Adaptive Security in Functional Encryption
P. Ananth
,
Zvika Brakerski
,
G. Segev
,
V. Vaikuntanathan
Annual International Cryptology Conference
2015
Corpus ID: 1370693
In a functional encryption (FE) scheme, the owner of the secret key can generate restricted decryption keys that allow users to…
Expand
Highly Cited
2015
Highly Cited
2015
A Punctured Programming Approach to Adaptively Secure Functional Encryption
Brent Waters
Annual International Cryptology Conference
2015
Corpus ID: 1353238
We propose the first construction for achieving adaptively secure functional encryption (FE) for poly-sized circuits (without…
Expand
Highly Cited
2015
Highly Cited
2015
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation
D. Boneh
,
Kevin Lewi
,
Mariana Raykova
,
A. Sahai
,
Mark Zhandry
,
Joe Zimmerman
International Conference on the Theory and…
2015
Corpus ID: 11349747
Deciding “greater-than” relations among data items just given their encryptions is at the heart of search algorithms on encrypted…
Expand
Highly Cited
2014
Highly Cited
2014
Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More
Nuttapong Attrapadung
IACR Cryptology ePrint Archive
2014
Corpus ID: 1517465
Dual system encryption techniques introduced by Waters in Crypto’09 are powerful approaches for constructing fully secure…
Expand
Highly Cited
2013
Highly Cited
2013
Attribute-Based Functional Encryption on Lattices
Xavier Boyen
Theory of Cryptography Conference
2013
Corpus ID: 8489567
We introduce a broad lattice manipulation technique for expressive cryptography, and use it to realize functional encryption for…
Expand
Highly Cited
2012
Highly Cited
2012
Functional Encryption for Regular Languages
Brent Waters
Annual International Cryptology Conference
2012
Corpus ID: 11663191
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is…
Expand
Highly Cited
2010
Highly Cited
2010
Worry-free encryption: functional encryption with public keys
A. Sahai
,
Hakan Seyalioglu
Conference on Computer and Communications…
2010
Corpus ID: 6097511
In this work, we put forward the notion of Worry-Free Encryption. This allows Alice to encrypt confidential information under Bob…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE