International audienceWe present a new generic construction of multi-client functional encryption (MCFE) for inner products from single-input functional inner-product encryption and standard pseudorandom functions. In spite of its simplicity, the new construction supports labels, achieves security in the standard model under adaptive corruptions, and can be instantiated from the plain DDH, LWE, and Paillier assumptions. Prior to our work, the only known constructions required discrete-log-based assumptions and the random-oracle model. Since our new scheme is not compatible with the compiler from Abdalla et al. (PKC 2019) that decentralizes the generation of the functional decryption keys, we also show how to modify the latter transformation...
In the recent years, many research lines on Functional Encryption (FE) have been suggested and stud...
International audienceResearch on (Decentralized) Multi-Client Functional Encryption (or (D)MCFE) is...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
International audienceWe present a new generic construction of multi-client functional encryption (M...
Multi-client functional encryption (MCFE) is an extension of functional encryption (FE) in which the...
We consider a situation where multiple parties, owning data that have to be frequently updated, agre...
Multi-client functional encryption (MCFE) is a more flexible variant of Functional ENcryption whose ...
We present new constructions of multi-input functional encryption (MIFE) schemes for the inner-produ...
International audienceFunctional encryption is a modern public-key paradigm where a master secret ke...
In a Multi-Input Functional Encryption (MIFE) scheme, n clients each obtain a secret encryption key ...
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the dat...
We construct new functional encryption schemes that combine the access control functionality of attr...
International audienceWe introduce Dynamic Decentralized Functional Encryption (DDFE), a generalizat...
International audienceMulti-Client Functional Encryption (MCFE) and Multi-Input Functional Encryptio...
International audienceInner product functional encryption (IPFE) is a primitive which produces, from...
In the recent years, many research lines on Functional Encryption (FE) have been suggested and stud...
International audienceResearch on (Decentralized) Multi-Client Functional Encryption (or (D)MCFE) is...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...
International audienceWe present a new generic construction of multi-client functional encryption (M...
Multi-client functional encryption (MCFE) is an extension of functional encryption (FE) in which the...
We consider a situation where multiple parties, owning data that have to be frequently updated, agre...
Multi-client functional encryption (MCFE) is a more flexible variant of Functional ENcryption whose ...
We present new constructions of multi-input functional encryption (MIFE) schemes for the inner-produ...
International audienceFunctional encryption is a modern public-key paradigm where a master secret ke...
In a Multi-Input Functional Encryption (MIFE) scheme, n clients each obtain a secret encryption key ...
Consider sources that supply sensitive data to an aggregator. Standard encryption only hides the dat...
We construct new functional encryption schemes that combine the access control functionality of attr...
International audienceWe introduce Dynamic Decentralized Functional Encryption (DDFE), a generalizat...
International audienceMulti-Client Functional Encryption (MCFE) and Multi-Input Functional Encryptio...
International audienceInner product functional encryption (IPFE) is a primitive which produces, from...
In the recent years, many research lines on Functional Encryption (FE) have been suggested and stud...
International audienceResearch on (Decentralized) Multi-Client Functional Encryption (or (D)MCFE) is...
Classical cryptographic primitives do not allow for any fine-grained access control over encrypted ...