Functional encryption

Functional encryption is a generalization of public-key encryption in which possessing a secret key allows one to learn a function of what the… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Indistinguishability obfuscation (IO) is a tremendous notion, powerful enough to give rise to almost any known cryptographic… (More)
  • figure 1
  • figure 5
Is this relevant?
Highly Cited
2015
Highly Cited
2015
The arrival of indistinguishability obfuscation (iO) has transformed the cryptographic landscape by enabling several security… (More)
  • figure 1
  • figure 11
Is this relevant?
Highly Cited
2013
Highly Cited
2013
Garbled circuits, introduced by Yao in the mid 80s, allow computing a function f on an input x without leaking anything about f… (More)
Is this relevant?
Highly Cited
2013
Highly Cited
2013
We introduce the problem of Multi-Input Functional Encryption, where a secret key SKf can correspond to an n-ary function f that… (More)
  • figure 2
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Functional encryption is an emerging paradigm for publickey encryption that enables fine-grained control of access to encrypted… (More)
  • figure 1
Is this relevant?
Highly Cited
2012
Highly Cited
2012
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In this paper, we present two fully secure functional encryption schemes. Our first result is a fully secure attribute-based… (More)
  • table 1
  • table 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We initiate the formal study of functional encryption by giving precise definitions of the concept and its security. Roughly… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
We provide a formalization of the emergent notion of “functional encryption,” as well as introduce various security notions for… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
This paper presents a fully secure functional encryption scheme for a wide class of relations, that are specified by non-monotone… (More)
  • figure 1
Is this relevant?