Indistinguishability obfuscation from compact functional encryption

P Ananth, A Jain - Annual Cryptology Conference, 2015 - Springer
The arrival of indistinguishability obfuscation (i O i O) has transformed the cryptographic
landscape by enabling several security goals that were previously beyond our reach …

Frequency-hiding order-preserving encryption

F Kerschbaum - Proceedings of the 22nd ACM SIGSAC Conference on …, 2015 - dl.acm.org
Order-preserving encryption allows encrypting data, while still enabling efficient range
queries on the encrypted data. This makes its performance and functionality very suitable for …

From selective to adaptive security in functional encryption

P Ananth, Z Brakerski, G Segev… - Annual Cryptology …, 2015 - Springer
In a functional encryption (FE) scheme, the owner of the secret key can generate restricted
decryption keys that allow users to learn specific functions of the encrypted messages and …

Functional encryption for inner product with full function privacy

P Datta, R Dutta, S Mukhopadhyay - … on Practice and Theory in Public-Key …, 2016 - Springer
Functional encryption (FE) supports constrained decryption keys that allow decrypters to
learn specific functions of encrypted messages. In numerous practical applications of FE …

Function-private functional encryption in the private-key setting

Z Brakerski, G Segev - Journal of Cryptology, 2018 - Springer
Functional encryption supports restricted decryption keys that allow users to learn specific
functions of the encrypted messages. Although the vast majority of research on functional …

Maple: Scalable multi-dimensional range search over encrypted cloud data with tree-based index

B Wang, Y Hou, M Li, H Wang, H Li - … of the 9th ACM symposium on …, 2014 - dl.acm.org
Cloud computing promises users massive scale outsourced data storage services with much
lower costs than traditional methods. However, privacy concerns compel sensitive data to be …

Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption

P Datta, T Okamoto, J Tomida - IACR International Workshop on Public …, 2018 - Springer
This paper presents two non-generic and practically efficient private key multi-input
functional encryption (MIFE) schemes for the multi-input version of the inner product …

Limits on the power of indistinguishability obfuscation and functional encryption

G Asharov, G Segev - SIAM Journal on Computing, 2016 - SIAM
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a
“central hub” for almost all known cryptographic tasks, and as an extremely powerful …

Efficient functional encryption for inner-product values with full-hiding security

J Tomida, M Abe, T Okamoto - … Conference, ISC 2016, Honolulu, HI, USA …, 2016 - Springer
We construct an efficient non-generic private-key functional encryption (FE) for inner-product
values with full-hiding security, where confidentiality is assured not only for encrypted data …

Verifiable functional encryption

S Badrinarayanan, V Goyal, A Jain, A Sahai - International Conference on …, 2016 - Springer
In light of security challenges that have emerged in a world with complex networks and
cloud computing, the notion of functional encryption has recently emerged. In this work, we …