Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,378,897 papers from all fields of science
Search
Sign In
Create Free Account
Functional encryption
Functional encryption is a generalization of public-key encryption in which possessing a secret key allows one to learn a function of what the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Attribute-based encryption
Ciphertext
ID-based encryption
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2018
Review
2018
VERIFIABLE COMPUTATIONS: APPROACHES AND PERSPECTIVES
Burtyka Babenko L. K.
2018
Corpus ID: 212597048
The paper reviews various existing approaches to construct verifiable computing schemes. Such schemes allow a weak client to…
Expand
2017
2017
A Quantum-Classical Scheme towards Quantum Functional Encryption
Aditya Ahuja
arXiv.org
2017
Corpus ID: 1102925
Quantum encryption is a well studied problem for both classical and quantum information. However, little is known about quantum…
Expand
2017
2017
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption
Fuyuki Kitagawa
,
R. Nishimaki
,
Keisuke Tanaka
IACR Cryptology ePrint Archive
2017
Corpus ID: 3626713
We show that indistinguishability obfuscation (IO) for all circuits can be constructed solely from secret-key functional…
Expand
2016
2016
Unifying Security Notions of Functional Encryption
Sanjam Garg
,
Akshayaram Srinivasan
IACR Cryptology ePrint Archive
2016
Corpus ID: 17137217
Functional Encryption (FE) generalizes the notion of traditional encryption system by providing fine-grained access to data. In a…
Expand
2016
2016
Practical Functional Encryption for Bilinear Forms
Carmen Elisabetta Zaira Baltico
,
D. Catalano
,
D. Fiore
IACR Cryptology ePrint Archive
2016
Corpus ID: 16216095
We present a practically efficient functional encryption scheme for the class of functionalities that can be expressed via…
Expand
2014
2014
On Extractability (a.k.a. Differing-Inputs) Obfuscation
Elette Boyle
2014
Corpus ID: 14988930
,
2014
2014
Flexible Attribute-Based Encryption, Revisited
A. Seiko
2014
Corpus ID: 54695714
Flexible attribute-based encryption, which is a variant of ciphertext-policy attributebase encryption, allows one to loosen a…
Expand
2014
2014
Functional Encryption for Secured Big Data Analytics
Nilotpal Chakraborty
,
G. Patra
2014
Corpus ID: 26912734
Big Data has gained a lot of interest now a days due to the enormous scope it introduces for a better understanding of the…
Expand
2013
2013
Multi-Input Functional Encryption
S. D. Gordon
,
Jonathan Katz
,
Feng-Hao Liu
,
E. Shi
,
Hong-Sheng Zhou
IACR Cryptology ePrint Archive
2013
Corpus ID: 215824788
Functional encryption (FE) is a powerful primitive enabling fine-grained access to encrypted data. In an FE scheme, secret keys…
Expand
2011
2011
On the Relationship Between Functional Encryption and Fully Homomorphic Encryption
J. Alwen
,
R. Gennaro
,
Dov S. Gordon
2011
Corpus ID: 15709835
In a recent paper by Boneh et al. [BSW11], the authors define of a new cryptographic primitive called functional encryption…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE