Functional Encryption: Definitions and Challenges
Top Cited Papers
- 1 January 2011
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 47 references indexed in Scilit:
- Efficient Lattice (H)IBE in the Standard ModelLecture Notes in Computer Science, 2010
- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for NegationLecture Notes in Computer Science, 2010
- Predicate Encryption with Partial Public KeysLecture Notes in Computer Science, 2010
- Conjunctive Broadcast and Attribute-Based EncryptionLecture Notes in Computer Science, 2009
- Identity-based encryption with efficient revocationPublished by Association for Computing Machinery (ACM) ,2008
- Generalized Identity Based and Broadcast Encryption SchemesLecture Notes in Computer Science, 2008
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and ExtensionsJournal of Cryptology, 2007
- Secure Identity Based Encryption Without Random OraclesLecture Notes in Computer Science, 2004
- Efficient Selective-ID Secure Identity-Based Encryption Without Random OraclesLecture Notes in Computer Science, 2004
- Public Key Encryption with Keyword SearchLecture Notes in Computer Science, 2004