Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

Security aspects of blockchain technology intended for industrial applications

SM Idrees, M Nowostawski, R Jameel, AK Mourya - Electronics, 2021 - mdpi.com
Blockchain technology plays a significant role in the industrial development. Many industries
can potentially benefit from the innovations blockchain decentralization technology and …

Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based

C Gentry, A Sahai, B Waters - … in Cryptology–CRYPTO 2013: 33rd Annual …, 2013 - Springer
We describe a comparatively simple fully homomorphic encryption (FHE) scheme based on
the learning with errors (LWE) problem. In previous LWE-based FHE schemes, multiplication …

Candidate indistinguishability obfuscation and functional encryption for all circuits

S Garg, C Gentry, S Halevi, M Raykova, A Sahai… - SIAM Journal on …, 2016 - SIAM
In this work, we study indistinguishability obfuscation and functional encryption for general
circuits: Indistinguishability obfuscation requires that given any two equivalent circuits C_0 …

How to use indistinguishability obfuscation: deniable encryption, and more

A Sahai, B Waters - Proceedings of the forty-sixth annual ACM …, 2014 - dl.acm.org
We introduce a new technique, that we call punctured programs, to apply indistinguishability
obfuscation towards cryptographic problems. We use this technique to carry out a systematic …

Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits

D Boneh, C Gentry, S Gorbunov, S Halevi… - Advances in Cryptology …, 2014 - Springer
We construct the first (key-policy) attribute-based encryption (ABE) system with short secret
keys: the size of keys in our system depends only on the depth of the policy circuit, not its …

Candidate multilinear maps from ideal lattices

S Garg, C Gentry, S Halevi - … 32nd Annual International Conference on the …, 2013 - Springer
We describe plausible lattice-based constructions with properties that approximate the
sought-after multilinear maps in hard-discrete-logarithm groups, and show an example …

Fine-grained and controlled rewriting in blockchains: Chameleon-hashing gone attribute-based

D Derler, K Samelin, D Slamanig… - Cryptology ePrint …, 2019 - eprint.iacr.org
Blockchain technologies recently received a considerable amount of attention. While the
initial focus was mainly on the use of blockchains in the context of cryptocurrencies such as …

Fully secure functional encryption for inner products, from standard assumptions

S Agrawal, B Libert, D Stehlé - Annual International Cryptology …, 2016 - Springer
Functional encryption is a modern public-key paradigm where a master secret key can be
used to derive sub-keys SK_F associated with certain functions F in such a way that the …

Attribute-based encryption for circuits

S Gorbunov, V Vaikuntanathan, H Wee - Journal of the ACM (JACM), 2015 - dl.acm.org
In an attribute-based encryption (ABE) scheme, a ciphertext is associated with an ℓ-bit public
index ind and a message m, and a secret key is associated with a Boolean predicate P. The …