Author:
Wang Huige,Chen Kefei,Zhang Yuan,Zhao Yunlei
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference41 articles.
1. Agrawal S, Kumarasubramanian A, Prabhakaran M, Sahai A (2015) On the practical security of inner product functional encryption. In: Katz J.
2. (ed) Advance in PKC 2015, vol 9020. Springer, Berlin Heidelberg, pp 777-798
3. Ananth P, Brakerski Z, Segev G, Vaikuntanathan V (2015) From selective to adaptive security in functional encryption. In: Gennaro R, Robshaw M (eds) Advance in CRYPTO, vol 2015, pp 657–677
4. Ananth P, Sahai A (2017) Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps. In: Coron JS., Nielsen J (eds) Advances in EUROCRYPT 2017, vol 10210, Springer, Berlin Heidelberg. pp 152–181
5. Baltico CEZ, Catalano D, Fiore D, Gay R (2017) Practical functional encryption for quadratic functions with applications to predicate encryption. In CRYPTO 2017:67–98
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. FENet;Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics;2023-04-24
2. Towards Faster Functional Encryption for Privacy-preserving Machine Learning;2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA);2021-12
3. Practical CCA-Secure Functional Encryptions for Deterministic Functions;Security and Communication Networks;2020-09-08