Author:
Alwen Joël,Barbosa Manuel,Farshim Pooya,Gennaro Rosario,Gordon S. Dov,Tessaro Stefano,Wilson David A.
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Lecture Notes in Computer Science;B. Adida,2007
2. Agrawal, S., Gorbunov, S., Vaikuntanathan, V., Wee, H.: Functional encryption: new perspectives and lower bounds. Cryptology ePrint Archive, Report 2012/468 (2012)
3. Lecture Notes in Computer Science;M. Barbosa,2013
4. Lecture Notes in Computer Science;M. Bellare,2010
5. Lecture Notes in Computer Science;M. Bellare,2003
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Match Me if You Can: Matchmaking Encryption and Its Applications;Journal of Cryptology;2021-04-21
2. A survey on functional encryption;Advances in Mathematics of Communications;2021
3. Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions;2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA);2020-10
4. Match Me if You Can: Matchmaking Encryption and Its Applications;Advances in Cryptology – CRYPTO 2019;2019
5. Proxy Re-Encryption and Re-Signatures from Lattices;Applied Cryptography and Network Security;2019