Author:
De Caro Angelo,Iovino Vincenzo
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference38 articles.
1. Abdalla M., Bellare M., Neve G.: Robust encryption. In: Micciancio D. (ed.) TCC 2010: 7th Theory of Cryptography Conference, Zurich, 9–11 Feb. Lecture Notes in Computer Science, vol. 5978, pp. 480–497. Springer, Berlin (2010).
2. Agrawal S., Freeman D.M., Vaikuntanathan V.: Functional encryption for inner product predicates from learning with errors. In: Lee D.H., Wang X. (eds.) Advances in Cryptology—ASIACRYPT 2011, Seoul, 4–8 Dec 2011. Lecture Notes in Computer Science, vol. 7073, pp. 21–40 . Springer, Berlin (2011).
3. Agrawal S., Gorbunov S., Vaikuntanathan V., Wee H.: Functional encryption: new perspectives and lower bounds. In: Canetti R., Garay J.A. (eds.) Advances in Cryptology—CRYPTO 2013, Part II, Santa Barbara, 18–22 Aug 2013. Lecture Notes in Computer Science, vol. 8043, pp. 500–518. Springer, Berlin (2013).
4. Agrawal S., Agrawal S., Badrinarayanan S., Kumarasubramanian A., Prabhakaran M., Sahai A.: Function private functional encryption and property preserving encryption: new definitions and positive results. Cryptology ePrint Archive, Report 2013/744, Version posted on 6 Mar 2014.
http://eprint.iacr.org/2013/744/20140306:053744
(2014).
5. Agrawal S., Agrawal S., Badrinarayanan S., Kumarasubramanian A., Prabhakaran M., Sahai A.: On the practical security of inner product functional encryption. In: Proceedings of Public-Key Cryptography—PKC 2015—18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, 30 Mar–1 Apr 2015, pp. 777–798 (2015).
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献