Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Indistinguishability obfuscation from compact functional encryption
The arrival of indistinguishability obfuscation (i O i O) has transformed the cryptographic
landscape by enabling several security goals that were previously beyond our reach …
landscape by enabling several security goals that were previously beyond our reach …
Frequency-hiding order-preserving encryption
F Kerschbaum - Proceedings of the 22nd ACM SIGSAC Conference on …, 2015 - dl.acm.org
Order-preserving encryption allows encrypting data, while still enabling efficient range
queries on the encrypted data. This makes its performance and functionality very suitable for …
queries on the encrypted data. This makes its performance and functionality very suitable for …
From selective to adaptive security in functional encryption
In a functional encryption (FE) scheme, the owner of the secret key can generate restricted
decryption keys that allow users to learn specific functions of the encrypted messages and …
decryption keys that allow users to learn specific functions of the encrypted messages and …
Functional encryption for inner product with full function privacy
Functional encryption (FE) supports constrained decryption keys that allow decrypters to
learn specific functions of encrypted messages. In numerous practical applications of FE …
learn specific functions of encrypted messages. In numerous practical applications of FE …
Function-private functional encryption in the private-key setting
Functional encryption supports restricted decryption keys that allow users to learn specific
functions of the encrypted messages. Although the vast majority of research on functional …
functions of the encrypted messages. Although the vast majority of research on functional …
Maple: Scalable multi-dimensional range search over encrypted cloud data with tree-based index
Cloud computing promises users massive scale outsourced data storage services with much
lower costs than traditional methods. However, privacy concerns compel sensitive data to be …
lower costs than traditional methods. However, privacy concerns compel sensitive data to be …
Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption
This paper presents two non-generic and practically efficient private key multi-input
functional encryption (MIFE) schemes for the multi-input version of the inner product …
functional encryption (MIFE) schemes for the multi-input version of the inner product …
Limits on the power of indistinguishability obfuscation and functional encryption
Recent breakthroughs in cryptography have positioned indistinguishability obfuscation as a
“central hub” for almost all known cryptographic tasks, and as an extremely powerful …
“central hub” for almost all known cryptographic tasks, and as an extremely powerful …
Efficient functional encryption for inner-product values with full-hiding security
J Tomida, M Abe, T Okamoto - … Conference, ISC 2016, Honolulu, HI, USA …, 2016 - Springer
We construct an efficient non-generic private-key functional encryption (FE) for inner-product
values with full-hiding security, where confidentiality is assured not only for encrypted data …
values with full-hiding security, where confidentiality is assured not only for encrypted data …
Verifiable functional encryption
In light of security challenges that have emerged in a world with complex networks and
cloud computing, the notion of functional encryption has recently emerged. In this work, we …
cloud computing, the notion of functional encryption has recently emerged. In this work, we …