Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference23 articles.
1. Boneh D, Sahai A, Waters B (2011) Functional encryption: definitions and challenges. Springer, London, pp 253–273
2. Sahai A, Waters B (2005) Fuzzy identity-based encryption. Springer, London, pp 457–473
3. Goldwasser S, Gordon SD, Goyal V, Jain A, Katz J, Liu F-H, Sahai A, Shi E, Zhou H-S (2014) Multi-input functional encryption. Springer, London, pp 578–602
4. Chotard J, Sans ED, Gay R, Phan DH, Pointcheval D (2018) Decentralized multi-client functional encryption for inner product. In: International Conference on the Theory and Application of Cryptology and Information Security. (Springer: London, pp 703–732)
5. van de Kamp T, Stritzl D, Jonker W, Peter A (2019) Two-client and multi-client functional encryption for set intersection. Australasian Conference on Information Security and Privacy. Springer, Germany, pp 97–115