As many services have changed from offline to online, a lot of personal information including user private data has been collected by and exchanged with various service providers. An issue raised in this process is that personal information can be exploited by multiple unwanted entities without the data owner’s knowledge. To solve this problem, functional encryption was proposed. It is suitable for data protection because even if a third-party uses the owner’s secret key for a function f, it cannot retrieve the original message x from the ciphertext. This means that information about x cannot be published, but is exposed only as f(x), the result of the function f. However, previous pairing-based public key functional encryption schemes for ...
Abstract - We construct new functional encryption schemes that combine the access control functional...
International audienceFunctional encryption is a modern public-key cryptographic primitive allowing ...
We construct functional encryption (FE) schemes for the orthogonality (OFE) relation where each ciph...
Functional encryption is a new public key paradigm that solves, in a non-interactive way, most of th...
Abstract. Functional encryption is a new paradigm in public-key encryption that allows users to fine...
In the standard setting of functional encryption (FE), we assume both the Central Authority (CA) and...
Functional encryption (FE) is a vast new paradigm for encryption scheme which allows tremendous flex...
International audienceFunctional Encryption (FE) has been widely studied in the last decade, as it p...
International audienceFunctional encryption is a modern public-key paradigm where a master secret ke...
We define the Unbounded Inner-Product functionality in the context of Public-Key Functional Encrypti...
Functional encryption allows the authorised parties to reveal partial information of the plaintext h...
Confidentiality can be usually achieved by conventional encryption, which hides sensitive data from ...
We extend the reach of functional encryption schemes that are provably secure under simple assumptio...
In the public-key setting, known constructions of function-private functional encryption (FPFE) were...
International audienceIn this paper, we extend Inner-Product Functional Encryption (IPFE), where the...
Abstract - We construct new functional encryption schemes that combine the access control functional...
International audienceFunctional encryption is a modern public-key cryptographic primitive allowing ...
We construct functional encryption (FE) schemes for the orthogonality (OFE) relation where each ciph...
Functional encryption is a new public key paradigm that solves, in a non-interactive way, most of th...
Abstract. Functional encryption is a new paradigm in public-key encryption that allows users to fine...
In the standard setting of functional encryption (FE), we assume both the Central Authority (CA) and...
Functional encryption (FE) is a vast new paradigm for encryption scheme which allows tremendous flex...
International audienceFunctional Encryption (FE) has been widely studied in the last decade, as it p...
International audienceFunctional encryption is a modern public-key paradigm where a master secret ke...
We define the Unbounded Inner-Product functionality in the context of Public-Key Functional Encrypti...
Functional encryption allows the authorised parties to reveal partial information of the plaintext h...
Confidentiality can be usually achieved by conventional encryption, which hides sensitive data from ...
We extend the reach of functional encryption schemes that are provably secure under simple assumptio...
In the public-key setting, known constructions of function-private functional encryption (FPFE) were...
International audienceIn this paper, we extend Inner-Product Functional Encryption (IPFE), where the...
Abstract - We construct new functional encryption schemes that combine the access control functional...
International audienceFunctional encryption is a modern public-key cryptographic primitive allowing ...
We construct functional encryption (FE) schemes for the orthogonality (OFE) relation where each ciph...