A survey of provably secure searchable encryption

C Bösch, P Hartel, W Jonker, A Peter - ACM Computing Surveys (CSUR), 2014‏ - dl.acm.org
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …

Privacy-preserving deep learning on machine learning as a service—a comprehensive survey

HC Tanuwidjaja, R Choi, S Baek, K Kim - IEEE Access, 2020‏ - ieeexplore.ieee.org
The exponential growth of big data and deep learning has increased the data exchange
traffic in society. Machine Learning as a Service,(MLaaS) which leverages deep learning …

A formal security analysis of the signal messaging protocol

K Cohn-Gordon, C Cremers, B Dowling, L Garratt… - Journal of …, 2020‏ - Springer
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …

Decentralizing attribute-based encryption

A Lewko, B Waters - Annual international conference on the theory and …, 2011‏ - Springer
Abstract We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our
system, any party can become an authority and there is no requirement for any global …

Functional encryption: Definitions and challenges

D Boneh, A Sahai, B Waters - Theory of Cryptography: 8th Theory of …, 2011‏ - Springer
We initiate the formal study of functional encryption by giving precise definitions of the
concept and its security. Roughly speaking, functional encryption supports restricted secret …

Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption

A Lewko, T Okamoto, A Sahai, K Takashima… - Advances in Cryptology …, 2010‏ - Springer
We present two fully secure functional encryption schemes: a fully secure attribute-based
encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) …

Attribute-based encryption for fine-grained access control of encrypted data

V Goyal, O Pandey, A Sahai, B Waters - … of the 13th ACM conference on …, 2006‏ - dl.acm.org
As more sensitive data is shared and stored by third-party sites on the Internet, there will be
a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can …

Fuzzy identity-based encryption

A Sahai, B Waters - Advances in Cryptology–EUROCRYPT 2005: 24th …, 2005‏ - Springer
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy
Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A …

Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization

B Waters - International workshop on public key cryptography, 2011‏ - Springer
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE)
under concrete and noninteractive cryptographic assumptions in the standard model. Our …

Efficient identity-based encryption without random oracles

B Waters - Advances in Cryptology–EUROCRYPT 2005: 24th …, 2005‏ - Springer
We present the first efficient Identity-Based Encryption (IBE) scheme that is fully secure
without random oracles. We first present our IBE construction and reduce the security of our …