A survey of provably secure searchable encryption
We survey the notion of provably secure searchable encryption (SE) by giving a complete
and comprehensive overview of the two main SE techniques: searchable symmetric …
and comprehensive overview of the two main SE techniques: searchable symmetric …
Privacy-preserving deep learning on machine learning as a service—a comprehensive survey
The exponential growth of big data and deep learning has increased the data exchange
traffic in society. Machine Learning as a Service,(MLaaS) which leverages deep learning …
traffic in society. Machine Learning as a Service,(MLaaS) which leverages deep learning …
A formal security analysis of the signal messaging protocol
The Signal protocol is a cryptographic messaging protocol that provides end-to-end
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
encryption for instant messaging in WhatsApp, Wire, and Facebook Messenger among …
Decentralizing attribute-based encryption
Abstract We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our
system, any party can become an authority and there is no requirement for any global …
system, any party can become an authority and there is no requirement for any global …
Functional encryption: Definitions and challenges
We initiate the formal study of functional encryption by giving precise definitions of the
concept and its security. Roughly speaking, functional encryption supports restricted secret …
concept and its security. Roughly speaking, functional encryption supports restricted secret …
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
We present two fully secure functional encryption schemes: a fully secure attribute-based
encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) …
encryption (ABE) scheme and a fully secure (attribute-hiding) predicate encryption (PE) …
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be
a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can …
a need to encrypt data stored at these sites. One drawback of encrypting data, is that it can …
Fuzzy identity-based encryption
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy
Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A …
Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A …
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
We present a new methodology for realizing Ciphertext-Policy Attribute Encryption (CP-ABE)
under concrete and noninteractive cryptographic assumptions in the standard model. Our …
under concrete and noninteractive cryptographic assumptions in the standard model. Our …
Efficient identity-based encryption without random oracles
We present the first efficient Identity-Based Encryption (IBE) scheme that is fully secure
without random oracles. We first present our IBE construction and reduce the security of our …
without random oracles. We first present our IBE construction and reduce the security of our …