International audienceFunctional Encryption (FE) has been widely studied in the last decade, as it provides a very useful tool for restricted access to sensitive data: from a ciphertext, it allows specific users to learn a function of the underlying plaintext. In practice, many users may be interested in the same function on the data, say the mean value of the inputs, for example. The conventional definition of FE associates each function to a secret decryption functional key and therefore all the users get the same secret key for the same function. This induces an important problem: if one of these users (called a traitor) leaks or sells the decryption functional key to be included in a pirate decryption tool, then there is no way to trace...
International audienceIn this paper, we extend Inner-Product Functional Encryption (IPFE), where the...
We propose a novel variant of functional encryption which supports ciphertext updates, dubbed cipher...
Functional encryption for inner product (FE-IP) allows an authorized user to obtain the inner produc...
International audienceFunctional Encryption (FE) has been widely studied in the last decade, as it p...
In the standard setting of functional encryption (FE), we assume both the Central Authority (CA) and...
Functional Encryption (FE) has been extensively studied in the recent years, mainly focusing on the ...
As many services have changed from offline to online, a lot of personal information including user p...
This thesis considers a number of challenging aspects in multi-user cryptosystems such as traitor tr...
We extend the reach of functional encryption schemes that are provably secure under simple assumptio...
International audienceFunctional encryption is a new paradigm in public-key encryption that allows u...
International audienceFunctional encryption is a modern public-key paradigm where a master secret ke...
Functional encryption (FE) is a vast new paradigm for encryption scheme which allows tremendous flex...
In a Multi-Input Functional Encryption (MIFE) scheme, n clients each obtain a secret encryption key ...
3École polytechnique fédérale de Lausanne Motivated by privacy and usability requirements in various...
International audienceWe present new constructions of multi-input functional encryption (MIFE) schem...
International audienceIn this paper, we extend Inner-Product Functional Encryption (IPFE), where the...
We propose a novel variant of functional encryption which supports ciphertext updates, dubbed cipher...
Functional encryption for inner product (FE-IP) allows an authorized user to obtain the inner produc...
International audienceFunctional Encryption (FE) has been widely studied in the last decade, as it p...
In the standard setting of functional encryption (FE), we assume both the Central Authority (CA) and...
Functional Encryption (FE) has been extensively studied in the recent years, mainly focusing on the ...
As many services have changed from offline to online, a lot of personal information including user p...
This thesis considers a number of challenging aspects in multi-user cryptosystems such as traitor tr...
We extend the reach of functional encryption schemes that are provably secure under simple assumptio...
International audienceFunctional encryption is a new paradigm in public-key encryption that allows u...
International audienceFunctional encryption is a modern public-key paradigm where a master secret ke...
Functional encryption (FE) is a vast new paradigm for encryption scheme which allows tremendous flex...
In a Multi-Input Functional Encryption (MIFE) scheme, n clients each obtain a secret encryption key ...
3École polytechnique fédérale de Lausanne Motivated by privacy and usability requirements in various...
International audienceWe present new constructions of multi-input functional encryption (MIFE) schem...
International audienceIn this paper, we extend Inner-Product Functional Encryption (IPFE), where the...
We propose a novel variant of functional encryption which supports ciphertext updates, dubbed cipher...
Functional encryption for inner product (FE-IP) allows an authorized user to obtain the inner produc...